02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• perform artifact analysis (66%)<br />

• perform virus handling (66%)<br />

• provide and answer a hotline (62%)<br />

• monitor IDS (62%)<br />

• produce technical documents (62%)<br />

• do training or security awareness (59%)<br />

• perform some type <strong>of</strong> technology watch or monitoring service (55%)<br />

• perform forensic evidence collection (55%)<br />

• track and trace intruders (52%)<br />

• pursue legal investigations (44%)<br />

The least <strong>of</strong>fered services were<br />

• penetration testing (17%)<br />

• security configuration administration (24%)<br />

The o<strong>the</strong>r least <strong>of</strong>fered services were<br />

• vulnerability handling (41%)<br />

• vulnerability assessments (28%)<br />

• vulnerability scanning (31%)<br />

• doing security product development (34%)<br />

• monitoring network and system logs (38%)<br />

Pr<strong>of</strong>iling <strong>of</strong> <strong>the</strong> teams by organizational location and services provided <strong>the</strong> following results:<br />

70<br />

• When <strong>the</strong> CSIRT is its own department, only 14% perform penetration testing or vulnerability<br />

assessments. Less than half perform forensic evidence collection, tracking and<br />

tracing intruders, and legal investigations.<br />

• When <strong>the</strong> CSIRT is located within <strong>the</strong> IT department, 100% perform incident handling<br />

and IDS monitoring. 92% produced advisories and 83% perform artifact analysis, virus<br />

handling, and security policy development.<br />

• When <strong>the</strong> CSIRT is located within <strong>the</strong> security team, 75% perform forensic evidence collection,<br />

pursue legal investigations, and provide a hotline service and a technical watch<br />

service. 25% perform penetration testing, vulnerability scanning, vulnerability assess-<br />

70<br />

Any services not mentioned were only listed by a small number <strong>of</strong> <strong>the</strong> teams.<br />

68 CMU/SEI-2003-TR-001

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!