Overwhelmed by the Complexity of Security? This May Help


What Is Incident Response? Contrary to public perception, incident response is a process and not a one-off event. For incident response to be truly successful, teams have to use an integrated and organized method to tackle any incident. Here are the five important steps of an effective incident response program: Preparation
Lessons Learned About Security
At the core of every incident response program that works, is preparation. Even the best incident response group cannot tackle an incident effectively when there are no preset guidelines. A solid plan should be there to support the team. To successfully address security events, this plan should include four elements: IR policy development and documentation, communication guidelines, threat intelligence feeds, and cyber hunting exercises.
The 4 Most Unanswered Questions about Security
Detection and Reporting This phase is focused on monitoring security events to spot, warn, and report on probable security incidents. * Security event monitoring is possible with the help of intrusion prevention systems, firewalls, and data loss control measures. * To detect potential security incidents, the team should correlate alerts within an SIEM (Security Information and Event Management) solution. * Before alerts are issued, analysts create an incident ticket, present initial findings, and lay down a preliminary incident classification. * When reporting, there must be room for regulatory reporting escalations. Triage and Analysis This is where most efforts to properly scope and understand the security incident takes place. Resources must be utilized to gather data from tools and systems for deeper analysis and to spot compromise indicators. Team members must be very skilled and knowledgeable in live system responses and digital forensics, along with malware and memory analysis. As evidence is gathered, analysts must concentrate focus on three main areas: a. Endpoint Analysis > Determine the tracks of the threat actor > Get the artifacts required to create a timeline of activities > Conduct a thorough analysis of a detailed copy of systems from a forensic perspective, and let RAM go through it and identify main artifacts to find out the events that happened on a device b. Binary Analysis > Check dubious binaries or tools the attacker used and document those programs’ functionalities. Enterprise Hunting > Scrutinize current systems and event log technologies to know the scope of compromise. > Document all machines, accounts, etc. that may have been compromised for damage containment and neutralization. Containment and Neutralization This counts among the most critical steps of incident response. The technique for containment and neutralization is anchored on the intelligence and indicators of compromise spotted during the analysis step. After system restoration and security verification, normal operations can continue. Post-Incident Activity After the incident has been resolved, there is still more work to do. Any information that can help prevent similar issues in the future must be properly documented. This phase can be split into the following: > completion of incident report for the improvement of the incident response plan and prevention of similar security problems in the future > post-incident monitoring to keep threat actors from reappearing > updates of threat intelligence feeds > identifying preventative measures> identifying preventative techniques > improving coordination across the organization for proper implementation of new security methods

Related Posts

This entry was posted in Software. Bookmark: permalink.

Best Links

Copyright © 2017 Chem TV