02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

and recovery operations (incident response on-site). O<strong>the</strong>rs provide technical advice and recommendations<br />

through phone, email, and documentation (incident response support). And<br />

o<strong>the</strong>rs facilitate <strong>the</strong> exchange <strong>of</strong> incident data, response and mitigation strategies (incident<br />

response coordination). <strong>Incident</strong> Analysis is not only <strong>the</strong> technical analysis <strong>of</strong> <strong>the</strong> incident<br />

report but also includes sub-services such as forensics evidence ga<strong>the</strong>ring and tracking and<br />

tracing intruders. These two functions are sub-services because not all CSIRTs perform <strong>the</strong>se<br />

types <strong>of</strong> analysis.<br />

In talking with and observing various teams, it can be seen that most teams perform incident<br />

handling in some form. What that incident response work is varies from team to team. Some<br />

teams spend <strong>the</strong>ir day reviewing intrusion detection system (IDS) logs. When <strong>the</strong>y see an<br />

alert or abnormal network traffic <strong>the</strong>ir response is to pass that alert on to ano<strong>the</strong>r part <strong>of</strong> <strong>the</strong><br />

organization to handle. O<strong>the</strong>r teams may spend <strong>the</strong>ir day watching IDS logs but when an alert<br />

goes <strong>of</strong>f, <strong>the</strong>y send someone to analyze and investigate and determine <strong>the</strong> response. Still o<strong>the</strong>r<br />

teams may do no IDS monitoring and instead staff a help desk to receive and handle security<br />

incident reports. When <strong>the</strong>y receive reports <strong>the</strong>y may go to <strong>the</strong> affected machine to perform<br />

diagnostic procedures and forensic analysis to determine what is wrong and capture any necessary<br />

evidence. O<strong>the</strong>r teams that coordinate incident response activities may rarely analyze a<br />

system, but instead make sure information about ongoing threats and attacks are published to<br />

<strong>the</strong> constituency, so <strong>the</strong> constituency can take <strong>the</strong> appropriate steps to protect <strong>the</strong>mselves.<br />

As we reviewed <strong>the</strong> literature, we found that <strong>the</strong> descriptions and identification <strong>of</strong> <strong>the</strong> range<br />

<strong>of</strong> services a CSIRT can provide is very similar, although <strong>the</strong>se are discussed at various levels<br />

depending on <strong>the</strong> focus <strong>of</strong> <strong>the</strong> publication (e.g., management perspective versus technical). It<br />

should also be noted that <strong>of</strong>ten different authors refer to <strong>the</strong>se services with slightly different<br />

names.<br />

To find out what types <strong>of</strong> services current teams are <strong>of</strong>fering, we asked participants in <strong>the</strong><br />

CSIRT Organizational Survey 68 to indicate which services <strong>the</strong>y currently provide. The most<br />

frequently reported service was, <strong>of</strong> course, incident handling (97%). Those who said <strong>the</strong>y did<br />

not perform incident handling were military coordination centers. The next most frequently<br />

<strong>of</strong>fered services were<br />

• publish advisories or alerts (72%) 69<br />

• perform security policy development (72%)<br />

68<br />

69<br />

As <strong>the</strong> new CSIRT Services document was not complete when <strong>the</strong> survey was created, <strong>the</strong> list <strong>of</strong><br />

services on <strong>the</strong> survey was only a subset <strong>of</strong> <strong>the</strong> new services list.<br />

In creating <strong>the</strong> pilot survey we did not distinguish between writing advisories or forwarding advisories<br />

written by o<strong>the</strong>rs. We included both in this service. In any future surveys we may choose to<br />

make a distinction.<br />

CMU/SEI-2003-TR-001 67

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!