02.07.2014 Views

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

State of the Practice of Computer Security Incident Response Teams ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

− perform penetration testing, if this service is part <strong>of</strong> <strong>the</strong> CSIRT activities<br />

• vulnerability handlers<br />

− analyze, test, track, and record vulnerability reports and vulnerability artifacts<br />

− determine exposure <strong>of</strong> constituency or parent organizational sites<br />

− research or develop patches and fixes as part <strong>of</strong> <strong>the</strong> vulnerability response effort<br />

− interact with <strong>the</strong> constituency, <strong>the</strong> CSIRT, s<strong>of</strong>tware application developers, external<br />

experts (CERT/CC, FedCIRC, vendors) and o<strong>the</strong>rs (media, law enforcement, or legal<br />

personnel) as required<br />

− disseminate information on vulnerabilities and corresponding fixes, patches, or<br />

workarounds<br />

Pr<strong>of</strong>essional staff that may be asked to work as part <strong>of</strong> an extended CSIRT include<br />

• platform specialists who assist in analysis and response efforts by providing expertise in<br />

supported technologies or operating systems (e.g., UNIX, Windows, mainframes, applications,<br />

databases). They may also perform incident handling, vulnerability handling, or<br />

infrastructure tasks if needed.<br />

• network or system administrators to administer CSIRT equipment and peripheral devices<br />

and maintain <strong>the</strong> infrastructure for CSIRT services. This could include deploying and<br />

maintaining secure servers, secure email, an incident tracking system and data repository,<br />

and any o<strong>the</strong>r internal systems required by <strong>the</strong> CSIRT.<br />

• web developers to maintain any CSIRT internal or external web site. The web developers<br />

would also work in conjunction with CSIRT staff to create new content and corresponding<br />

designs for any team web site.<br />

• trainers to develop and deliver curriculum for teaching not only new incident handlers in<br />

<strong>the</strong> CSIRT, but also perhaps to teach constituency members. They may also develop and<br />

provide security awareness training to <strong>the</strong> constituency and any parent organization.<br />

• technical writers to assist and facilitate <strong>the</strong> CSIRT in <strong>the</strong> development <strong>of</strong> publications<br />

such as advisories, best practices, or o<strong>the</strong>r technical documents<br />

• representatives from <strong>the</strong> legal department to help develop and review any non-disclosure<br />

agreements, outsourcing contracts, or service level agreements. They may also provide<br />

guidance regarding liability issues related to ongoing incidents and advise <strong>the</strong> CSIRT regarding<br />

any laws or regulations with which <strong>the</strong> organization and <strong>the</strong> team must comply.<br />

• representatives from human resources to develop policies and procedures for removing<br />

internal employees found engaging in unauthorized or illegal computer activity. They<br />

may also help implement security training within <strong>the</strong> constituency and help develop job<br />

descriptions and interview processes for finding and hiring CSIRT staff.<br />

• representatives from public or media relations who work with <strong>the</strong> CSIRT to handle any<br />

media inquiries and help develop information disclosure policies and practices<br />

• existing security groups, including physical security, that will work with <strong>the</strong> CSIRT to<br />

exchange information about computer incidents and possibly share responsibility for resolving<br />

issues involving computer or data <strong>the</strong>ft<br />

CMU/SEI-2003-TR-001 75

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!