Security Manager's Journal: Plans and processes are made to be revised
The company's incident-response plan needs to be updated. That's normal -- no plan is carved in stone.
Computerworld - We security managers are always documenting processes and plans. It's a task without end, because you have to dust off those documents every once in a while and think about how they could be updated. Organizations' needs are always changing, and so is technology, so what was a great plan a couple of years earlier might have some gaping holes now.
Such was the case with our incident-response plan. I had reason to review it recently, and it clearly needed modernization.
One thing I have learned over the years is that it's a mistake to start from scratch with these things. When you model a security program against a standard, it is likely to receive less scrutiny in an audit, since it will be in a form that is recognizable and accepted in the industry. That's why I decided to use the incident-response recommendations from the National Institute of Standards and Technology (NIST) as our starting point. Every organization will want to customize its plan for its own needs, but building on a widely used and solid framework is a big help.
With NIST's recommendations as our guide, we broke our incident-response process into four phases: preparation; detection and analysis; containment and eradication; and post-incident analysis.
Preparation is in many ways the most important phase. It includes identifying the members of the crisis action team (CAT). Besides representatives from information security, we wanted the CAT to include Windows and Unix engineers, network engineers, help desk personnel and local law enforcement officials.
Having chosen these people, we obtained full and redundant contact information for all of them, so we could be sure we'd be able to get in touch with them if there were an incident. Then we designated certain conference rooms to serve as "war rooms" and secured a dedicated call-in bridge and an email-enabled distribution list. In this phase we also lined up all the relevant tools we might need to detect or respond to incidents, including packet capturing, malware analysis, event monitoring and forensics tools. Finally, we identified trusted third parties to be on call in case we need expert assistance.
You can never know how a security incident will unfold. With that in mind, in the detection and analysis phase, we didn't try to enumerate every possible scenario. Instead, we listed common events that we see as major concerns. These include malware infestations, phishing attacks, unauthorized access, data loss, denial-of-service attacks and theft. We are also defining which sorts of events should trigger activation of the CAT. For example, a single PC hit by malware is insufficient, but the detection of malware that's quickly propagating could well require a full CAT response. To help us decide when the cavalry is needed, we are creating a matrix to lay out the criteria for escalation.
For the third phase, containment and eradication, we are establishing guidelines on whether an event requires evidence collection, damage assessment and identification of the attackers. We are also preparing checklists to help ensure proper eradication and containment of whatever malicious activity the incident involves. For example, a checklist might address what to do when a Windows server is compromised.
For the post-incident phase, we are describing how to ensure that we have gathered all the information necessary for criminal or administrative action, and we are including recommendations on post-mortems so we can identify what went well and what needs improvement.
Once the incident-response process document is complete, we'll start scheduling training sessions and then regular testing of the plan so we can maintain confidence that we are able to effectively respond to any incident.
This week's journal is written by a real security manager, "Mathias Thurman," whose name and employer have been disguised for obvious reasons. Contact him at email@example.com.
Join in the discussions about security! computerworld.com/blogs/security
More by Mathias Thurman
- Security Manager's Journal: Stopping vendors from making us a Target
- Security Manager's Journal: Thousands of dollars in phone calls? Management hates that.
- Security Manager's Journal: Another step toward eliminating data loss
- Security Manager's Journal: Siccing MDM on personal mobile devices
- Security Manager's Journal: An admin surfing on a server? That's a big no-no
- Security Manager's Journal: Time to tweak the security policies
- Security Manager's Journal: Found: 30 unmanaged servers that shouldn't be
- Security Manager's Journal: The ins and outs of extending DLP
- Security Manager's Journal: Move to hosted email opens new vulnerabilities
- Security Manager's Journal: Two big goals for 2014 budget won't require a lot of money
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts