Incydent Response Playbook

10 December 2017

Incident source

  • Any attacks affecting critical assets
  • Denial-of-Service attacks that isolate or impede critical service or network performance
  • Malicious logic (virus) attacks that isolate enclaves
  • Administrator/root-level access obtained by unauthorized personnel

 

  • Significant trends suspected in incidents or events
  • Indication of multiple suspected systems
  • Suspected e-mail spoofing
  • Unauthorized probes or scans of the network

 

  • Unusual system performance or behavior
  • Unplanned system crashes, outages, or configurationchanges
  • Suspicious files identified on a server Missing data, files, or programs
  • Unexplained access privilege changes Poor security practices
  • Unusual after-hours system activity Simultaneous logins by the same user from differentIP addresses
  • Unauthorized activity by privileged users

 

  • System compromise internal
  • System compromise cloud
  • Theft of confidential information
  • Theft or loss of mobile device/media
  • Malware
  • Phishing

 

Incydent Responder playbook with flow

  • https://www.incidentresponse.com/playbooks/malware-outbreak
  • https://www.incidentresponse.com/playbooks/phishing
  • https://www.incidentresponse.com/playbooks/data-theft
  • https://www.incidentresponse.com/playbooks/virus-outbreak
  • https://www.incidentresponse.com/playbooks/ddos
  • https://www.incidentresponse.com/playbooks/unauthorized-access
  • https://www.incidentresponse.com/playbooks/elevation-of-privilege
  • https://www.incidentresponse.com/playbooks/root-access
  • https://www.incidentresponse.com/playbooks/improper-computer-usage

Handbook

  • http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
  • https://www.sans.org/reading-room/whitepapers/incident/incident-handlers-handbook-33901
  • https://resources.sei.cmu.edu/asset_files/Handbook/2003_002_001_14102.pdf
  • https://www.nasa.gov/pdf/589502main_ITS-HBK-2810.09-02%20%5BNASA%20Information%20Security%20Incident%20Management%5D.pdf
  • https://www.cybersecuritycoalition.be/content/uploads/cybersecurity-incident-management-guide-EN.pdf

Other resources

  • https://www.crest-approved.org/wp-content/uploads/2014/11/CSIR-Procurement-Guide.pdf
  • https://www.it-cube.net/wp-content/uploads/2017/09/Exabeam_Incident_Response_for_Top_3_Security_Scenarios.pdf
  •  

SANS Checklists & Step-by-Step Guides

8 November 2016

Microsoft Improving Web Application Security Threats and Countermeasures

13 March 2016

decompile / bug bounty of manufacturer firmware

13 March 2016

Protection of system security

3 November 2015

CISSP exam preparation

My study on CISSP | 28 April 2015

Egzaminy:

  • https://www.skillset.com/certifications/cissp

Open security training - CISSP

Baseline Exam

  • 100-Question Baseline Exam (22 pages) (pdf)
  • Answers to 100-Question Exam (22 pages) (pdf)

 Final Exam

  • 250-Question Final Exam (53 pages) (pdf)
  • Answers to 250-Question Final Exam (53 pages) (pdf)

 

http://ptgmedia.pearsoncmg.com/images/9780789749598/samplepages/0789749599.pdf

http://samples.sainsburysebooks.co.uk/9781118176122_sample_399791.pdf

http://files.meetup.com/768823/CISSPc%20qs.pdf

http://www.certificationking.net/others/CISSP%20brain%20dumpid=19.htm

http://www.certificationking.com/CISSP-s.zip

http://www.cisspexampractice.com/public/uiExamDemoOverview.aspx

CISSP Candidate Information Biulletin

 

source:CISSP® CBK® 2015 WHAT WAS ADDED

WHAT IS NEW WITHIN EACH OF THE DOMAINS

Below you have the list of new domains on the left and the new topics that were introduced within each of the domains on the left.   I welcome your help to complete it with even more details.  If you know of topics and links that could be added, please send an email to [email protected] and let me know. 

NEW DOMAIN NAME

NEW TOPICS THAT WERE ADDED

 

Security &  Risk Management

 

Threat Modeling

More details were added about threat modeling

 

Asset Security

Acquisition

Integrate security risk consideration into acquisition and practice

Hardware, Software, and services

Third Party assessment and monitoring

(on site assessment, document exchange and review, process/policy review)

Minimum security requirements

Service-level requirements

 

Security Engineering

Mobile Systems

This is NOT referring to Phones and other tools.  It is referring to laptop as mobile devices and the risk associated with those mobile devices.

 

Internet of things (IoT)

http://www.itworld.com/article/2906805/welcome-to-the-internet-of-things-please-check-your-privacy-at-the-door.html?phint=newt%3Ditworld_today&phint=idg_eid%3D4d76928f948553d246266242f20ee850#tk.ITWNLE_nlt_tonight_2015-04-08

 

and

 

 

https://www.ftc.gov/news-events/press-releases/2015/01/ftc-report-internet-things-urges-companies-adopt-best-practices

 

and

 

http://spectrum.ieee.org/telecom/security/how-to-build-a-safer-internet-of-things

 

and

 

The Cyber Defense Magazine also has some interesting articles on the challenge of IOT at:

http://www.cyberdefensemagazine.com/newsletters/march-2015/index.html

 

Embedded Systems

Smart Appliance, devices with a computer.

 

 

Communications & Network Security

Converged protocols (e.g., FCoE, MPLS, VoIP, iSCSI)

 

Software Defined Networks

see:  https://www.opennetworking.org/sdn-resources/sdn-definition

Video to watch:

https://www.youtube.com/watch?v=DiChnu_PAzA

and

If you wish to learn more:  https://www.youtube.com/watch?v=l25Ukkmk6Sk

 

Storage and Network Convergence

iSCSI and FCoE

http://www.redbooks.ibm.com/redbooks/pdfs/sg247986.pdf

Read chapter one of the document above for a quick overview.

 

Content Distribution Networks

Akamai

Cloudflare

Amazon CloudFront

and Others

 

 

Identity and Access Management

Session Management

Desktop Sessions Desktop sessions can be controlled and protected through several means including but not limited to the following: Screensavers

Timeouts

Automatic Logouts

Session/ Login limitation

Schedule Limitations

 

Registration and Proofing of Identity

 

Cloud Identity Services

Security Assessment and Testing

 

This is mostly a new domain that goes in a lot more depth about Security Assessment and Penetration Testing.  The two document below will give you most of what you need to know.

 

See:   Penetrating Testing Guidelines from the PCI DSS Council
https://www.pcisecuritystandards.org/documents/Penetration_Testing_Guidance_March_2015.pdf

 

And

 

NIST SP  800-115Technical Guide to  Information Security Testing  and Assessment

http://csrc.nist.gov/publications/nistpubs/800-115/SP800-115.pdf

 

Security Operations

Asset Management and asset inventory

https://www.sei.cmu.edu/productlines/frame_report/config.man.htm

 

 

Configuration Management

http://acqnotes.com/Attachments/IEEE%20Guide%20to%20Software%20Configuration%20Management.pdf

 

WhiteListing and Blacklisting
understand advantages and Disadvantages

 

Coverage of Sandboxing

http://en.wikipedia.org/wiki/Sandbox_%28computer_security%29

 

 

A bit more details on Patch Management

Technologies http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-40r3.pdf

Read chapter 3 of the document above about the challenge of Patch Management

 

Software Development Security

Integrated Product Team (IPT)

http://www.acq.osd.mil/se/docs/DoD-IPPD-Handbook-Aug98.pdf

 

DevOps and its principles

http://itrevolution.com/the-three-ways-principles-underpinning-devops/

http://theagileadmin.com/what-is-devops/

 

Software Assurance

http://en.wikipedia.org/wiki/Software_assurance

 

 

 


 

Clement and Nathalie
Site owners and Founders

Strony "testowe" zawierające błędy i problemy bezpieczństwa

6 April 2015
Kategorie SecCase

Video

6 April 2015
Kategorie SecCase

Szkolenia i tutoriale

6 April 2015
Kategorie SecCase

Programowanie

6 April 2015
Kategorie SecCase

Bazy sygnatur malware

6 April 2015
Kategorie SecCase

Strony internetowe

6 April 2015
Kategorie SecCase

Książki

6 April 2015
Kategorie SecCase

Oficjalne dokumenty

6 April 2015
Kategorie SecCase

Istotne akty prawne

6 April 2015
Kategorie SecCase