About Us
Services
Blog
Blog
Blog
Industries
Resources
The preparation phase assembles the elements, information, and personnel necessary to execute an appropriate response to an incident. An often overlooked starting point is the effort to reduce the quantity and severity or impact of incidents. This is accomplished through controls implementation, based on your organization’s internal controls and risk management activities. As we mentioned in a previous blog, leveraging a documented risk assessment can provide insight into what residual risks remain after applying specific mitigations or other forms of risk treatment.
The second phase of the IR process involves identifying that an incident has occurred. Specific systems and tools may generate alerts via email or dashboards that require further triage and analysis. During this phase, responders begin to determine the extent of an incident and the impact on the organization. The extent may be limited to a specific system, application, or network zone. An attacker may have succeeded in compromising a service that may lead to an enterprise-wide compromise. Detailed investigation activities and procedures may determine if a reported security event is a valid incident or false positive. Given the volume of security event data and the importance of timely response to an actual incident, organizations increasingly rely on automation and context-based functionality to triage and validate suspicious event data. Analyzing the “what” and “where” characteristics of the incident will assist with incident classification and set the stage for the subsequent IR process phase.
The third phase of the incident response plan is defined in three parts which coalesce into a group of steps intended to limit damage, address threats and vulnerabilities, and restore systems and services to normal operations. Due to the variety of incidents and attack vectors, containment procedures can be very different for particular incidents. Self-propagating malware originating from third-party systems may involve isolating specific networks and systems, while systems actively targeted due to a software vulnerability might be disabled or modified at a service or configuration level.
The eradication sub-phase can include a range of elements from systems and services, to user accounts and specific malware programs. Identifying and eliminating the target elements may require a coordinated effort with multiple technical teams and resources, in addition to the core members of the IR team. Eradication steps vary based on the specific incident’s characteristics. Procedures may entail the removal of identified malware or disabling compromised accounts.
After eradication, it is time to recover. Steps include restoring systems and services to normal operations. As it relates to identified vulnerabilities, systems may be remediated (software patch installations, configuration changes). Depending on the remediation requirements, the recovery phase can occur over a prolonged period of time, with the intent of preventing or reducing the likelihood of a repeat incident. Keep in mind that the IR process phases include an inner loop that iterates between “Detection & Analysis” and “Containment, Eradication, and Recovery”. During incidents, there may be situations where an additional system is identified as compromised or infected, requiring further iterations of containment and eradication prior to full recovery.
We have reached the least exciting and most misunderstood section of the IR process – post-incident activity. This is more than just closing a ticket or decompressing from weeks of late-night meetings and pizza deliveries. Post-incident activity or lessons learned includes the formal documentation of the event, a review of the results and metrics, and identification of areas for correction or continuous improvement. In some cases, post-incident actions may lead to updates in processes (change management, patch management, password resets) or documentation (configuration standards, procedures, and policies. This phase is essential to the regular maintenance of and improvement of the incident response process.
Malicious actors are agnostic to an organization’s policies. They will find ways to infiltrate an organization, compromise target systems, and achieve their goals and objectives. These incidents, these violations of policy and computer security practices, must be met with a solid Incident Response capability. NIST has published detailed guidance for organizations to adopt this phased incident management process and develop an incident response function in NIST SP 800-61. While the IR Plan and overall IR phases are important, associated policies and procedures should not be overlooked. Key components of an Incident Response policy, plan, and procedures are detailed below:
The best incident response plans are tailored to the organization, straightforward to follow, and provide a clear escalation path. Choose tools and automation resources wisely to manage your incidents, simplify reporting, and continuously grow and improve your organization’s capabilities.
We look forward to talking to you about your upcoming Security Test, Compliance Assessment, and Managed Security Services priorities. Our expert security consultants and QSAs are fully certified and have decades of experience helping businesses like yours stay safe from cyber threats. Set up a time to chat with us about your biggest payment security and compliance challenges so we can partner with you to solve them!