02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.2.3.2 Organizational Model<br />

The various organizational models for CSIRTs are described in Section 2.2, “Types <strong>of</strong><br />

CSIRTs.” The last part <strong>of</strong> that section details <strong>the</strong> categories used in <strong>the</strong> survey.<br />

The largest number <strong>of</strong> participating CSIRTS (34%) identified <strong>the</strong> centralized CSIRT model as<br />

<strong>the</strong>ir current organizational model. 60 This type <strong>of</strong> team is situated in one location and usually<br />

performs CSIRT work 100% <strong>of</strong> <strong>the</strong> time. The rest <strong>of</strong> <strong>the</strong> teams were fairly evenly distributed<br />

across <strong>the</strong> following categories: ad hoc team (13%), coordination center (13%), combined<br />

team (17%) and distributed part-time team (21%).<br />

The only correlation between sector and team model in <strong>the</strong> survey data was in <strong>the</strong> information<br />

and communication sector, where most participating CSIRTs identified <strong>the</strong>mselves as<br />

having some type <strong>of</strong> distributed team, whe<strong>the</strong>r it was ad hoc, dedicated distributed, or combined.<br />

There was no o<strong>the</strong>r correlation in <strong>the</strong> data collected between what sector <strong>the</strong> CSIRT<br />

was located in and what type <strong>of</strong> CSIRT model <strong>the</strong> team had.<br />

3.2.4 CSIRT Authority<br />

“Authority” describes <strong>the</strong> control that <strong>the</strong> CSIRT has over its own actions and <strong>the</strong> actions <strong>of</strong><br />

its constituents related to computer security and incident response. Authority is <strong>the</strong> basic relationship<br />

<strong>the</strong> CSIRT has to <strong>the</strong> organization it serves.<br />

According to <strong>the</strong> Handbook for CSIRTs, <strong>the</strong>re are three levels <strong>of</strong> authority or relationships<br />

that a CSIRT can have with its constituency [West-Brown 03]:<br />

• Full authority: The CSIRT can make decisions, without management approval, to direct<br />

response and recovery actions. For example, a CSIRT with full authority would be able to<br />

tell a system administrator to disconnect a system from <strong>the</strong> network during an intruder attack.<br />

• Shared authority: The CSIRT participates in <strong>the</strong> decision process regarding what actions<br />

to take during a computer security incident, but can only influence, not make, <strong>the</strong> decision.<br />

• No authority: The CSIRT cannot make any decisions or take any actions on its own. The<br />

CSIRT can only act as an advisor to an organization, providing suggestions, mitigation<br />

strategies, or recommendations. The CSIRT cannot enforce any actions. For example, <strong>the</strong><br />

CERT/CC is a CSIRT that has no authority over its constituency, which is <strong>the</strong> Internet<br />

community.<br />

60<br />

See Table 2 for descriptions <strong>of</strong> team models.<br />

CMU/SEI-2003-TR-001 53

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!