Stages of Incident Response-
1. method 1
2. method 2
Method1(7-steps)
- Preparation
- Identification
categories based on incident type - Containment
- Investigation
- Iradication
- Recovery
- Follow up
Method2(4-steps)
- Preparation
- Detection and Analysis
- Containment, Eradication and Recovery
- Post-Incident Activity
--------
http://csrc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf
The incident response plan should include the following elements:
Mission
Strategies and goals
Senior management approval
Organizational approach to incident response
How the incident response team will communicate with the rest of the organization and with other
organizations
Metrics for measuring the incident response capability and its effectiveness
Roadmap for maturing the incident response capability
How the program fits into the overall organization
Procedure elements
Sharing information with outside parties
the media
law enforcement
incident handling talk to other outside parties -ISP,s/w vendors,
--
http://csrc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf
Handling an incidence rspons
preparation
detection and analysis
containment,eradication, recovery
postincident activity
incident handling chk
recommendtn
-----
http://technet.microsoft.com/en-us/library/cc700825.aspx
To instigate a successful incident response plan, you should:
Make an initial assessment.
Communicate the incident.
Contain the damage and minimize the risk.
Identify the type and severity of the compromise.
Protect evidence.
Notify external agencies if appropriate.
Recover systems.
Compile and organize incident documentation.
Assess incident damage and cost.
Review the response and update policies.
---------
Primary Phases of the CSIRT .....................................................................................16
a) Identification................................................................................................................16
i) Triage Role ................................................................................................................17
ii) Identification Tasks................................................................................................17
b) Containment................................................................................................................19
c) Eradication...................................................................................................................20
d) Recovery ......................................................................................................................21
e) Lessons Learned..........
---------
Other sources-
http://ptgmedia.pearsoncmg.com/images/1578702569/samplechapter/1578702569.pdf (stages)
https://msisac.cisecurity.org/resources/guides/documents/Incident-Response-Guide.pdf (has warning) [useful url)
Comments