Last Updated: 2015-04-27 16:37:32 UTC
by Richard Porter (Version: 1)
I’ve been asked a few times this year ($dayjob) to discuss and review incident handling practices with some of our clients. This topic seems to have come up to the surface again, and with some breaches getting main-stream coverage, it only makes sense. Taking a look at some of our past posts here on the ISC, I was pleasantly greeted with a long history on this topic (see list below).
- Incident Response vs. Incident Handling 6 years ago by Adrien de Beaupre
- 2 Cheat Sheets for Incident Handling 6 years ago by Lenny
- Incident Handling 101 7 years ago by Mari Nichols
- Live CD for Remote Incident Handling 4 years ago by Joel
- XSS Incident Handling 7 years ago by Jason
- BURP 1.6.10 Released 2 months ago by Rob VandenBrink
- Get Wisdom as Cheaply as You Can 3 months ago by Russell
- Incident Handling: Home Heating 101 9 years ago by David
- Evernote Security Issue 2 years ago by ScottF
- New ISO Standards on Vulnerability Handling and Disclosure 1 year ago by Rob VandenBrink
- Incident Response at Sony 4 months ago by Rick
- The Sub Critical Control? Evidence Collection 3 years ago by Richard
- Why patch management is ALSO REQUIRED in ICS infrastructure 3 months ago by Manuel Humberto Santander Pelaacuteez
- CSAM: My Storage Array SSHs Outbound! 6 months ago by Dr. J.
- Learning from the breaches that happens to others Part 2 1 year ago by Chris
For those that have not seen it yet should read the 2015 Verizon Data Breach Report (DBIR) . A couple of notes on DBIR (very brief as it seems everyone is reviewing it ), we are getting better. The entry on page 5 that is called out stuck with me “In 70% of the attacks where we know the motive for the attack, there’s a secondary victim.” Some homework, go read page 5!
The second take away from DBIR tells me that we can prevent quite a bit. Remember where prevention stops, incident handling starts. If you jump to page 15 a big lesson that you’d THINK we’ve learned? PATCH ““99.9% of the exploited vulnerabilities had been compromised more than a year after the associated CVE was published.”
In my travels it has been observed that more companies are starting to negotiate contracts with outside incident management firms proactively. This is a great sign, one thing I am still noting an area of weakness is in the internal incident handling skills. We should still have some staff that at least understands the process (thinking evidence handling here). These staffers should act as both liaison to contract staff and aid with guidance to management.
Most, if not all, companies that I have visited have solid policies and standards in place. Along with a surprising number that including marketing and public relations. It seems we are getting a little better here. Note: Have a list of those that are cleared to speak to any media, your average journalist will eat an engineer alive. Know when to say “I cannot comment on that”
Parting references I use for incident management:
The Practice of Network Security Monitoring: Understanding Incident Detection and Response by Richard Bejtlich Link: http://amzn.com/1593275099