LU5 MO13 (1)
By the end of this module, you should be able to:
Explain the steps in preparing for a cybersecurity incident
Describe how to respond in an incident
List the steps in an incident investigation
Cybersecurity incidents can be classified into two broad areas:
Weak Account Types
Poor Access Control
Strong authentication should be required on all user accounts.
User accounts should be routinely reviewed for security.
Accounts may need to be deleted or strengthened as necessary.
The following accounts should be prohibited:
Shared accounts
Generic accounts
Guest accounts
Access Control: The mechanism to control who can access what.
Physical Access Control: Implementation of fencing, hardware locks, and mantraps to limit physical access to systems.
Technical Access Control: Policies/technologies that restrict users from accessing certain data on computers.
Implementation of Access Control Models to enforce access permissions.
Identification: The process of recognizing users.
Example: A delivery driver presenting an employee badge.
Authentication: Validating user credentials.
Example: Checking the driver’s badge.
Authorization: Granting permission for actions.
Example: Allowing the driver to pick up a package.
Access: The right to access specific resources.
Accounting: A preserved record of who accessed the network, resource interactions, and disconnections.
Object: A specific resource (e.g., a file).
Subject: A user or process (e.g., computer user).
Operation: Action taken by the subject over an object (e.g., deleting a file).
Object: SALARY.XLSX
Owner: MWiley
Access Level: Read-only for department managers.
Authentication: Requires username and password.
Final access operation: Opening the document.
Access control schemes provide standards for managing controlled access. Five major schemes include:
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Rule-Based Access Control
Attribute-Based Access Control (ABAC)
Provides ownership to users over their objects.
Owners can assign permissions to other users.
Weaknesses:
Relies on end user decisions for security.
Permissions may be inherited by programs executed by users.
Most restrictive; users cannot set controls.
Key Elements:
Labels: Classification of objects indicating importance.
Levels: Hierarchical structure for privileges.
Permissions based on job functions.
Users assigned to roles, which define permissions.
Assigns roles dynamically based on rules.
Utilized for managing user access across systems.
Combines multiple attributes for access policies.
Utilizes an If-Then-Else structure for rule formatting.
Set of permissions attached to an object that dictate which subjects can access them.
Limitations:
Inefficiency in managing numerous ACLs in large organizations.
Time-consuming to change individual ACLs.
A written guide for responding to security incidents.
Actions include:
Preparation
Identification
Containment
Eradication
Recovery
Lessons Learned
Incident definitions
Incident response teams
Reporting requirements
Retention policy
Stakeholder management
Communication plan
Tabletop: Informal discussions about potential incidents.
Walkthrough: Reviews of the plan by IT personnel.
Simulation: Hands-on tests of the plan against realistic scenarios.
Models that represent the actions of threat actors.
MITRE ATT&CK
The Diamond Model of Intrusion Analysis
Cyber Kill Chain
Utilize SOAR runbooks and playbooks.
Execute containment actions.
Implement configuration changes.
SOAR platforms help manage and respond to security alerts.
Playbook: Checklist for manual incident response steps.
Runbook: Automation of conditional steps in response procedures.
Limit attack spread using network segmentation.
Segregation based on trust principles and sensitivity levels.
Adjustments necessary for prevention and mitigation of attacks.
Areas for configuration changes include:
Firewall rules
URL filters
Digital certificates
Data loss prevention settings
Mobile device management settings
An investigation is required for every cybersecurity incident to:
Identify causes and prevent future incidents.
Comply with regulatory requirements.
Analyze data sources
Conduct digital forensics
Analyze log sources and data to identify attack vectors.
Use logs from security systems, network devices, and applications.
Challenges include volume, multiple formats, and managing log retention.
Accumulate data from various sources:
IP monitors
Metadata
Analyzers
Vulnerability scans
Forensic science applies to legal queries; digital forensics focuses on cybercrime evidence recovery from various devices.
Secure the crime scene
Preserve evidence
Establish chain of custody
Examine evidence
Enable recovery
Damage control and immediate response setup.
Quarantine equipment, document the scene, and conduct interviews.
Ensure that digital evidence remains intact and secure.
Use tamper-evident and tamper-resistant bags for evidence collection.
Record handling and custodianship of evidence continuously.
Include all serial numbers, custody durations, and shipment processes in documentation.
Follow the order of volatility when analyzing data to preserve fragile information.
Create a mirror image of systems before examination.
Focus on recovering data and learning from security incidents.
Strategic intelligence collection assists in policy adjustments.
Examples include:
DD imaging utility
Memdump for memory captures
WinHex
Autopsy
Digital forensic workstations and mobile forensics tools are critical resources.
In cloud incidents, audit rights are significant for logging reviews.
Quick communication with cloud providers is crucial to understand incident impacts and scope.
By the end of this module, you should be able to:
Explain the steps in preparing for a cybersecurity incident
Describe how to respond in an incident
List the steps in an incident investigation
Cybersecurity incidents can be classified into two broad areas:
Weak Account Types
Poor Access Control
Strong authentication should be required on all user accounts.
User accounts should be routinely reviewed for security.
Accounts may need to be deleted or strengthened as necessary.
The following accounts should be prohibited:
Shared accounts
Generic accounts
Guest accounts
Access Control: The mechanism to control who can access what.
Physical Access Control: Implementation of fencing, hardware locks, and mantraps to limit physical access to systems.
Technical Access Control: Policies/technologies that restrict users from accessing certain data on computers.
Implementation of Access Control Models to enforce access permissions.
Identification: The process of recognizing users.
Example: A delivery driver presenting an employee badge.
Authentication: Validating user credentials.
Example: Checking the driver’s badge.
Authorization: Granting permission for actions.
Example: Allowing the driver to pick up a package.
Access: The right to access specific resources.
Accounting: A preserved record of who accessed the network, resource interactions, and disconnections.
Object: A specific resource (e.g., a file).
Subject: A user or process (e.g., computer user).
Operation: Action taken by the subject over an object (e.g., deleting a file).
Object: SALARY.XLSX
Owner: MWiley
Access Level: Read-only for department managers.
Authentication: Requires username and password.
Final access operation: Opening the document.
Access control schemes provide standards for managing controlled access. Five major schemes include:
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
Role-Based Access Control (RBAC)
Rule-Based Access Control
Attribute-Based Access Control (ABAC)
Provides ownership to users over their objects.
Owners can assign permissions to other users.
Weaknesses:
Relies on end user decisions for security.
Permissions may be inherited by programs executed by users.
Most restrictive; users cannot set controls.
Key Elements:
Labels: Classification of objects indicating importance.
Levels: Hierarchical structure for privileges.
Permissions based on job functions.
Users assigned to roles, which define permissions.
Assigns roles dynamically based on rules.
Utilized for managing user access across systems.
Combines multiple attributes for access policies.
Utilizes an If-Then-Else structure for rule formatting.
Set of permissions attached to an object that dictate which subjects can access them.
Limitations:
Inefficiency in managing numerous ACLs in large organizations.
Time-consuming to change individual ACLs.
A written guide for responding to security incidents.
Actions include:
Preparation
Identification
Containment
Eradication
Recovery
Lessons Learned
Incident definitions
Incident response teams
Reporting requirements
Retention policy
Stakeholder management
Communication plan
Tabletop: Informal discussions about potential incidents.
Walkthrough: Reviews of the plan by IT personnel.
Simulation: Hands-on tests of the plan against realistic scenarios.
Models that represent the actions of threat actors.
MITRE ATT&CK
The Diamond Model of Intrusion Analysis
Cyber Kill Chain
Utilize SOAR runbooks and playbooks.
Execute containment actions.
Implement configuration changes.
SOAR platforms help manage and respond to security alerts.
Playbook: Checklist for manual incident response steps.
Runbook: Automation of conditional steps in response procedures.
Limit attack spread using network segmentation.
Segregation based on trust principles and sensitivity levels.
Adjustments necessary for prevention and mitigation of attacks.
Areas for configuration changes include:
Firewall rules
URL filters
Digital certificates
Data loss prevention settings
Mobile device management settings
An investigation is required for every cybersecurity incident to:
Identify causes and prevent future incidents.
Comply with regulatory requirements.
Analyze data sources
Conduct digital forensics
Analyze log sources and data to identify attack vectors.
Use logs from security systems, network devices, and applications.
Challenges include volume, multiple formats, and managing log retention.
Accumulate data from various sources:
IP monitors
Metadata
Analyzers
Vulnerability scans
Forensic science applies to legal queries; digital forensics focuses on cybercrime evidence recovery from various devices.
Secure the crime scene
Preserve evidence
Establish chain of custody
Examine evidence
Enable recovery
Damage control and immediate response setup.
Quarantine equipment, document the scene, and conduct interviews.
Ensure that digital evidence remains intact and secure.
Use tamper-evident and tamper-resistant bags for evidence collection.
Record handling and custodianship of evidence continuously.
Include all serial numbers, custody durations, and shipment processes in documentation.
Follow the order of volatility when analyzing data to preserve fragile information.
Create a mirror image of systems before examination.
Focus on recovering data and learning from security incidents.
Strategic intelligence collection assists in policy adjustments.
Examples include:
DD imaging utility
Memdump for memory captures
WinHex
Autopsy
Digital forensic workstations and mobile forensics tools are critical resources.
In cloud incidents, audit rights are significant for logging reviews.
Quick communication with cloud providers is crucial to understand incident impacts and scope.