420 likes | 961 Views
Incident Response. James Moore, CIFI/CISSP Chief Executive Officer, T3i, Inc. Chairman, Information Systems Forensics Association. What is an Incident?.
E N D
Incident Response James Moore, CIFI/CISSP Chief Executive Officer, T3i, Inc. Chairman, Information Systems Forensics Association
What is an Incident? An event in which an information asset is compromised in terms of theft, defacement, alteration, destruction, or disclosure either maliciously or unintentionally.
Examples of Incidents • Web site defacement • Customer Credit Cards #s stolen • Laptop stolen • Computer room flooded • Power outage • Employee terminated • Company secrets sent to competitors • Complaints of MA from organization against other Internet citizens
The IRT defined Incident Response Team – a group typically comprised of virtual team members from key areas who respond to incidents affecting information assets. This team methodically executes Intrusion Response, Disaster Recovery and Business Continuity plans (as appropriate).
IRTThe Perfect World • Information Security technical staff augments traditional I.T. staff. • Director of Information Security or CISO has IRT as a dedicated team and full authority to act • A trained and empowered Public Relations team for dissemination
Team OrganizationWhere you and I live.. • Management may not understand the implications of not supporting an IRT until AFTER an incident • Budgets are limited • Skill sets for the team leadership are rare and expensive • Often times there will be “jurisdiction” issues with the I.T. or other groups
Team Organization • In most instances, the size/budget of a company will dictate the team organization. • Rarely will a dedicated IRT exists except in the largest of companies • Most often utilized approach is leveraging the “virtual team” method
Team OrganizationThe Virtual Team • Leader is highly trained and a dedicated role • Virtual team consists of elements from various internal organizations • Stronger empowerment is required • During an incident, members are dedicated and responsible to the IRT Leader
Training the IRT Clear understanding of the Policies and Mission Goals of the organization and the IRT
Training the IRT • Policy understanding • Involved in the creation of the policy • Involved in the policy reviews • Regular process reviews • Walkthroughs • Members tasked with audits • “Live Fire” • Expertise Training When NOT to discover your parachute isn’t packed correctly
Team authority • One of the most critical factors in development of the IRT • Often overlooked by senior management • Lack of authority causes process to break down • Can often increase the recovery time significantly. • IRT Leader should have the authority of an executive during an incident.
Team authority Issues to consider when granting team authority: • Signing authority for purchasing new equipment • Working with public organizations (FBI, Local law enforcement, etc.) • HR Issues • Denying access to building / restricted areas to suspect employees • Sequestering of evidence • Decision to prosecute or recover • Release of information
Gaining management support • Probably the most difficult task in the IRT process • Best approach: • Business Impact Analysis!!! • Cost justifies expenditures • Identifies the risks and costs of mitigation
BIA • Targets costs to organization for events or all types…. • The IRT can reduce impact by: • Lowering time to recovery • Stopping an intrusion in progress
BIA • Identifies potential impact on customer confidence and market perception
BIA • BIA allows executive teams to see the real dangers that face their information assets
BIA • Identify time & cost sensitive business operations and systems • Determines financial exposure • Recommended Disaster Readiness Strategies
Retail Brokerage Credit Card Sales Authorization Home Shopping Channels Airline Reservation Centers Package Shipping Service Manufacturing Industry Banking Industry Transportation Industry $6.5 Million $2.6 Million $110,000 $90,000 $28,250 $26,761 $17,093 $9,435 Business Impact Analysis Cost of Data Loss (per hour) Source: Contingency Planning Research & Strategic Research Corporation
Impact of an Event A serious event can irrevocably impair or destroy the largest company • Over 40% of companies hit by a serious disaster never resume operations • Of those that do resume operations, another 30% still fail within two years Source: Contingency Planning Research & Strategic Research Corporation
What is Business Continuity Planning? Planning for maintaining/resuming normal operations during events caused by nature, technical problems or human error. • Large time commitment and expense associated with creating a BCP • Selling BCP to executive management
What does BCP consist of? • Disaster Recovery • Emergency Response (ERT, IRT) • Crisis Management • Includes steps to take • Before an event • During a event • After a event
Disaster Recovery Procedures written on how to respond, coordinate, and document the event • Risk Impact Analysis • Determine cost of impact • Determine probability
Threats • Natural • Flood • Fire • Storm • Man Made • Vandalism • Terrorism • Hardware failure • Intrusions • Virus, Trojan Horse, Worms • Denial of Service Attacks • Data Diddling • Social Engineering
Insiders • Often motivated by a perception of unfair treatment by management, or if suborned by an outsider • Use authorized access for unauthorized disruptive purposes. 78% of all Intrusions !!
Levels of Alert • Level Green • Nominal Vigilance • Level Blue • Heightened Awareness. • May suggest out-of-schedule Vulnerability Analysis be performed. • Level Yellow • Alert with active monitoring and all teams on standby • Level Red • Alert High with 24x7 monitoring and IRT on hot standby
Alert and Response • Effective monitoring systems • IDS and HIDS • Signature based • Heurist • Anomaly based • Flow based • Trip Wires • SMNP Monitoring • Surveillance Systems • Remember Information Assets are not just computer!
Alert and Response • Operational framework for alert and response • SNMP Alert Systems • Pager Alert Systems • 24x7 Staff • Outsourced monitoring
Alert and Response • Effective Triage team • Technical in nature • Determine extent and status of incident • Should be able to determine if incident is Malicious or Unintentional • Should be able to perform triage without evidence spoiling
Alert and Response • Understanding of “Investigate or Recover” policy • Critical to the success of the process • Can save an organization significant dollars • It recovery is initiated, investigation may be impossible
Investigate or Recover? • Recovery most likely will “spoil” evidence • Rebooting many systems “pops” log files • Some Trojans remove themselves by the booting process • Investigation most likely will delay systems interruptions • A detailed forensic investigation may take days
Investigate or Recover? • Planning is key! • Have warm standby systems • Effective DR or BCP plan can allow for an investigation to proceed while recovery is effected • Logging • Centralized logging (according to DOJ guidelines)
INVESTIGATIVE AXIOM: Treat every incident as if it will end up in a criminal prosecution.
Testing the IRT • The IRT should periodically and regularly test the plan and report the results • Methods of testing include: • Mock intrusion • Walkthrough • Document Lessons Learned • Adjustments to policy if necessary
Review • Incidents are made of a variety of events • The IRT is a highly trained group with far reaching authority • Management support is critical to IRT success • Justification for IRT expenditure is done through BIA • Risk Management – Foundation for IRT • BCP and DR • Threats to Information Assets • Alert and Response • Investigate or Recover • Testing the plan
Questions James Moore Chief Executive Officer, T3i, Inc. Chairman, Information Systems Forensics Association mahakala@cyberwarrior.org www.gaissa.org www.infoforensics.org