Recovery and Post Incident Response - Paiet/Tech-Journal-for-Everything GitHub Wiki
Containment techniques
- Segmentation
- Create VLAN for quarantine
- Firewall rules
- Isolation
- Host isolation
- No communication with other hosts on the network
- Although not completely disconnected
- Bypass firewall or just create rules to completely isolate
- No communication with other hosts on the network
- Attacker isolation
- Honeypot
- Sandbox
- Host isolation
- Removal
- Completely disconnect affected system
- Reverse engineering - Eradication techniques
- NIST SP 800-88
- FBI Disposal of Media Policy and Procedures
- Sanitization
- Clear
- Overwriting
- Minimum 3x overwrite with 1's and 0's or both
- Cryptographic overwrites
- Purge
- Degaussing
- Strong magnetic fields
- Destroy
- Disintegration, Incineration, Pulverization, and/or Melting
- Shredding
- Typically outsourced
- Clear
- Reconstruction/reimage
- Reinstall the OS
- Use imaging software to recover OS
- Proper corrective steps must be taken if system was compromised by exploiting vuln in OS or app in image
- Secure disposal
Validation
-
Patching
- Start with directly affected systems and work your way out
-
Permissions
- Look for violation of least privilege
- Do this for all accounts
-
Scanning
- Run vulnerability scans to verify that remediation steps have been successful
-
Verify logging/communication to security monitoring
- Check all logging systems for proper configuration
- Test alerts as well
- Check all logging systems for proper configuration
-
Corrective actions
-
Lessons learned report
- Helps figure out...
- What went right and what went wrong
- How could incident have been prevented
- How it could be prevented in the future
- Changes the may need to be made in the incident response plan
- Changes that may need to be made in everyday security policy
- Helps figure out...
-
Change control process
- Revert to proper change control procedures
- This is to document the incidence response actions
- Change Controls may have been bypassed in favor of speed to action
- This is to document the incidence response actions
- Revert to proper change control procedures
-
Update incident response plan
-
Incident summary report
-
Formal Incident Report
- Tells the incident "story" in detail
- Becomes a reference for future incidents and policy initiatives
- Legal document
-
Elements
- Root Cause Analysis
- Timeline of incident and responses
- Evidence details
- Fallout
- Monetary
- Reputation
- Validation results
- Discovered weaknesses in policy/procedures
-
Remember to secure the report!!!
- Sensitive information
- Retain and destroy per policy