19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 6.64 Remedial action in connection with security<br />

incidents<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management, Head of <strong>IT</strong> Section,<br />

Administrator<br />

As soon as the cause of a security incident has been identified, the measures<br />

needed to deal with it should be selected and implemented. This requires first<br />

of all containing and removing the problem, and then restoring the "normal"<br />

state of affairs.<br />

Supplying the necessary expert knowledge<br />

To investigate and deal with a security weakness, it is essential to have the<br />

relevant technical knowledge. <strong>The</strong>refore either staff must have the appropriate<br />

training or else experts will have to be called in. For this purpose, a list<br />

containing the contact addresses of appropriate internal and external experts<br />

from the various subject areas must be prepared so that they can be called<br />

upon for advice without delay. External experts include<br />

- Computer Emergency Response Teams (CERTs) (see also S 2.35<br />

Obtaining information on security weaknesses of the system),<br />

- vendors and distributors of the <strong>IT</strong> systems concerned (see also S 4.107 Use of<br />

vendor resources),<br />

- vendors and distributors of security systems used such as anti-virus programs,<br />

firewalls, access control etc.,<br />

- external consultants with specialist security expertise.<br />

Restoring secure operations<br />

To eliminate any security weaknesses, the <strong>IT</strong> systems concerned must be<br />

taken off the network and all the files which could provide any information<br />

about the nature and cause of the problem which has occurred must be backed<br />

up. This includes especially all relevant log files. As the entire <strong>IT</strong> system<br />

should be viewed as insecure or as having been tampered with, the operating<br />

system and all the applications must be examined for changes. In addition to<br />

programs, configuration files and user files must also be examined for possible<br />

manipulation. It is appropriate here to use checksum procedures. However,<br />

this presupposes that the checksums associated with the "secure" condition<br />

have been ascertained in advance and transferred to write-protected data<br />

media (see also S 4.93 Regular integrity checking).<br />

To be certain that any Trojan horses left behind by an adversary have really<br />

been removed, the original files should be reimported from write-protected<br />

data media. Care should be taken here that all security-relevant configurations<br />

and patches are also imported as well. Where files are reimported from data<br />

backups, steps must be taken to ensure that these have not been affected by the<br />

security incident, i.e. they have not already been infected with the computer<br />

virus. On the other hand, examination of the data backups may be helpful in<br />

order to establish when the attack began or when infection with a computer<br />

virus occurred.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

List of addresses of<br />

experts<br />

Investigation of the<br />

affected <strong>IT</strong> systems<br />

Be cautious about<br />

importing data backups

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!