SlideShare a Scribd company logo
1 of 21
Incident Response
Anshul Gupta
Introduction
• EventVs Incident
• Incident Response and Computer Forensics
• Incident Response Framework
• Incident Response Steps
EventVS Incident
• Event:An event is an observed change to the normal behaviour of a system,
environment, process, workflow or person. Examples: routerACL's were
updated, firewall policy was pushed.
• Incident: An incident is a human-caused, malicious event that leads to (or
may lead to) a significant disruption of business. Examples: attacker posts
company credentials online, attacker steals customer credit card database.
•Note: All incidents are events, but all events are not
incidents.
How Incident Response & Computer Forensics
Fits
Incident Response Framework
Incident Response
• Pre-incident preparation Take actions to prepare the organization and the CSIRT
before an incident occurs.
• Detection of incidents Identify a potential computer security incident.
• Initial response Perform an initial investigation, recording the basic details
surrounding the incident, assembling the incident response team, and notifying the
individuals who need to know about the incident.
• Formulate response strategy Based on the results of all the known facts, determine
the best response and obtain management approval. Determine what civil, criminal,
administrative, or other actions are appropriate to take, based on the conclusions
drawn from the investigation.
Incident Response (Cont...)
• Investigate the incident Perform a thorough collection of data. Review the
data collected to determine what happened, when it happened, who did it,
and how it can be prevented in the future.
• Reporting Accurately report information about the investigation in a manner
useful to decision makers.
• Resolution Employ security measures and procedural changes, record
lessons learned, and develop long-term fixes for any problems identified.
Pre-Incident Preparation
• Preparation leads to successful incident response. During this phase, organization needs to
prepare both the organization itself as a whole and the CSIRT members, prior to responding
to a computer security incident.
• Preparing the CSIRT
The CSIRT is defined during the pre-incident preparation phase. Your organization will assemble a team of
experts to handle any incidents that occur. Preparing the CSIRT includes considering at least the following:
• The hardware needed to investigate computer security incidents
• The software needed to investigate computer security incidents
• The documentation (forms and reports) needed to investigate computer security incidents
• The appropriate policies and operating procedures to implement your response strategies
• The training your staff or employees require to perform incident response in a manner that promotes
successful forensics, investigations, and remediation.
Detection of Incidents
• No matter how you detect an incident, it is paramount to record all of the known
details. An initial response checklist to make sure you record the pertinent facts. The
initial response checklist should account for many details, not all of which will be
readily discernible immediately after an incident is detected. Record the known
facts. Some of the critical details include the following:
• Current time and date
• Who/what reported the incident
• Nature of the incident
• When the incident occurred
• Hardware/software involved
• Points of contact for involved personnel
Detection of Incidents (Cont..)
Initial Response
• One of the first steps of any investigation is to obtain enough information
an appropriate response.
• Assembling the CSIRT
• Collecting network-based and other data
• Determining the type of incident that has occurred
• Assessing the impact of the incident.
• Initial Response will not involve touching the affected system.
Formulate a Response Strategy
• Considering theTotality of Circumstances
• How many resources are need to investigate an incident?
• How critical are the affected systems?
• How sensitive is the compromised or stolen information?
• Who are the potential perpetrators?
• What is the apparent skill of the attacker?
• How much system and user downtime is involved?
• What is the overall loss?
Formulate a Response Strategy (Cont..)
• Considering Appropriate Responses:
Formulate a Response Strategy (Cont..)
• Response Strategy option should be quantified with pros and cons related to the
following:
• Estimated loss
• Network downtime and its operations.
• User downtime and its impact to operations.
• Whether or not your organization is legally compelled to take certain action.
• Public disclosure of the incident and its impact to the organization's reputation/business.
• Taking Action
• Legal Action
• Administrative Action
Investigate the Incident
• The investigation phase involves determining the who, what, when, where,
how, and why surrounding an incident.
• A computer security investigation can be divided into two phases:
• Data Collection
• Forensic Analysis
Investigate the Incident - Phase Steps (Data
Collection)
Investigate the Incident - Phase Steps
(Forensic Analysis)
Reporting
• Reports accurately describe the details of an incident, that are understandable to decision
makers, that can withstand the barrage of legal scrutiny, and that are produced in a timely
manner.
• Some guidelines to ensure that the reporting phase does not become your CSIRT’s nemesis:
• Document immediately All investigative steps and conclusions need to be documented as soon as possible.
Writing something clearly and concisely at the moment you discover evidence saves time, promotes
accuracy, and ensures that the details of the investigation can be communicated more clearly to others at
any moment, which is critical if new personnel become involved or are assigned to lead the investigation.
• Write concisely and clearly Enforce the “write it tight” philosphy. Documenting investigative steps requires
discipline and organization. Write everything down in a fashion that is understandable to you and others.
Discourage shorthand or shortcuts. Vague notations, incomplete scribbling, and other unclear
documentation can lead to redundant efforts, forced translation of notes, confirmation of notes, and a
failure to comprehend notes made by yourself or others.
• Use a standard format Develop a format for your reports and stick to it. Create forms, outlines, and
templates that organize the response process and foster the recording of all pertinent data.This makes
report writing scalable, saves time, and promotes accuracy.
Resolution
• The goal of the resolution phase is to implement host-based, network-based, and
procedural countermeasures to prevent an incident from causing further damage and to
return your organization to a secure, healthy operational status. In other words, in this
phase, you contain the problem, solve the problem, and take steps to prevent the problem
from occurring again.
• The following steps are often taken to resolve a computer security incident:
• Identify organization’s top priorities. Which of the following is the most critical to resolve: returning all
systems to operational status, ensuring data integrity, containing the impact of the incident,
collecting evidence, or avoiding public disclosure?
• Determine the nature of the incident in enough detail to understand how the security occurred and
what host-based and network-based remedies are required to address it.
• Determine if there are underlying or systemic causes for the incident that need to be addressed (lack
of standards, noncompliance with standards, and so on).
Resolution (Cont...)
• Restore any affected or compromised systems. You may need to rely on a prior version of
the data, server platform software, or application software as needed to ensure that the
system performs as you expect it to perform.
• Apply corrections required to address any host-based vulnerabilities. Note that all fixes
should be tested in a lab environment before being applied to production systems.
• Apply network-based countermeasures such as access control lists, firewalls, or IDS.
• Assign responsibility for correcting any systemic issues.
• Track progress on all corrections that are required, especially if they will take significant
time to complete.
• Validate that all remedial steps or countermeasures are effective. In other words, verify that
all the host-based, network-based, and systemic remedies have been applied correctly.
• Update your security policy and procedures as needed to improve your response process.
Conclusion

More Related Content

What's hot

6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
Sirius
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 

What's hot (20)

Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to InsightCyber Threat Intelligence | Information to Insight
Cyber Threat Intelligence | Information to Insight
 
Soc and siem and threat hunting
Soc and siem and threat huntingSoc and siem and threat hunting
Soc and siem and threat hunting
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 
SIEM and Threat Hunting
SIEM and Threat HuntingSIEM and Threat Hunting
SIEM and Threat Hunting
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Building the Security Operations and SIEM Use CAse
Building the Security Operations and SIEM Use CAseBuilding the Security Operations and SIEM Use CAse
Building the Security Operations and SIEM Use CAse
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 

Similar to Incident response

11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
abhichowdary16
 

Similar to Incident response (20)

What to do when get hacked or suffer a cyber breach
What to do when get hacked or suffer a cyber breachWhat to do when get hacked or suffer a cyber breach
What to do when get hacked or suffer a cyber breach
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
CNIT 50: 9. NSM Operations
CNIT 50: 9. NSM OperationsCNIT 50: 9. NSM Operations
CNIT 50: 9. NSM Operations
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
CISA_WK_4.pptx
CISA_WK_4.pptxCISA_WK_4.pptx
CISA_WK_4.pptx
 
CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)CNIT 121: 17 Remediation Introduction (Part 1)
CNIT 121: 17 Remediation Introduction (Part 1)
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
SLVA - Security monitoring and reporting itweb workshop
SLVA - Security monitoring and reporting   itweb workshopSLVA - Security monitoring and reporting   itweb workshop
SLVA - Security monitoring and reporting itweb workshop
 
My Keynote from BSidesTampa 2015 (video in description)
My Keynote from BSidesTampa 2015 (video in description)My Keynote from BSidesTampa 2015 (video in description)
My Keynote from BSidesTampa 2015 (video in description)
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptx
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
CNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management HandbookCNIT 121: 2 IR Management Handbook
CNIT 121: 2 IR Management Handbook
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Getting Started with Business Continuity
Getting Started with Business ContinuityGetting Started with Business Continuity
Getting Started with Business Continuity
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by steps
 
CyberOps.pptx
CyberOps.pptxCyberOps.pptx
CyberOps.pptx
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Incident response

  • 2. Introduction • EventVs Incident • Incident Response and Computer Forensics • Incident Response Framework • Incident Response Steps
  • 3. EventVS Incident • Event:An event is an observed change to the normal behaviour of a system, environment, process, workflow or person. Examples: routerACL's were updated, firewall policy was pushed. • Incident: An incident is a human-caused, malicious event that leads to (or may lead to) a significant disruption of business. Examples: attacker posts company credentials online, attacker steals customer credit card database. •Note: All incidents are events, but all events are not incidents.
  • 4. How Incident Response & Computer Forensics Fits
  • 6. Incident Response • Pre-incident preparation Take actions to prepare the organization and the CSIRT before an incident occurs. • Detection of incidents Identify a potential computer security incident. • Initial response Perform an initial investigation, recording the basic details surrounding the incident, assembling the incident response team, and notifying the individuals who need to know about the incident. • Formulate response strategy Based on the results of all the known facts, determine the best response and obtain management approval. Determine what civil, criminal, administrative, or other actions are appropriate to take, based on the conclusions drawn from the investigation.
  • 7. Incident Response (Cont...) • Investigate the incident Perform a thorough collection of data. Review the data collected to determine what happened, when it happened, who did it, and how it can be prevented in the future. • Reporting Accurately report information about the investigation in a manner useful to decision makers. • Resolution Employ security measures and procedural changes, record lessons learned, and develop long-term fixes for any problems identified.
  • 8. Pre-Incident Preparation • Preparation leads to successful incident response. During this phase, organization needs to prepare both the organization itself as a whole and the CSIRT members, prior to responding to a computer security incident. • Preparing the CSIRT The CSIRT is defined during the pre-incident preparation phase. Your organization will assemble a team of experts to handle any incidents that occur. Preparing the CSIRT includes considering at least the following: • The hardware needed to investigate computer security incidents • The software needed to investigate computer security incidents • The documentation (forms and reports) needed to investigate computer security incidents • The appropriate policies and operating procedures to implement your response strategies • The training your staff or employees require to perform incident response in a manner that promotes successful forensics, investigations, and remediation.
  • 9. Detection of Incidents • No matter how you detect an incident, it is paramount to record all of the known details. An initial response checklist to make sure you record the pertinent facts. The initial response checklist should account for many details, not all of which will be readily discernible immediately after an incident is detected. Record the known facts. Some of the critical details include the following: • Current time and date • Who/what reported the incident • Nature of the incident • When the incident occurred • Hardware/software involved • Points of contact for involved personnel
  • 11. Initial Response • One of the first steps of any investigation is to obtain enough information an appropriate response. • Assembling the CSIRT • Collecting network-based and other data • Determining the type of incident that has occurred • Assessing the impact of the incident. • Initial Response will not involve touching the affected system.
  • 12. Formulate a Response Strategy • Considering theTotality of Circumstances • How many resources are need to investigate an incident? • How critical are the affected systems? • How sensitive is the compromised or stolen information? • Who are the potential perpetrators? • What is the apparent skill of the attacker? • How much system and user downtime is involved? • What is the overall loss?
  • 13. Formulate a Response Strategy (Cont..) • Considering Appropriate Responses:
  • 14. Formulate a Response Strategy (Cont..) • Response Strategy option should be quantified with pros and cons related to the following: • Estimated loss • Network downtime and its operations. • User downtime and its impact to operations. • Whether or not your organization is legally compelled to take certain action. • Public disclosure of the incident and its impact to the organization's reputation/business. • Taking Action • Legal Action • Administrative Action
  • 15. Investigate the Incident • The investigation phase involves determining the who, what, when, where, how, and why surrounding an incident. • A computer security investigation can be divided into two phases: • Data Collection • Forensic Analysis
  • 16. Investigate the Incident - Phase Steps (Data Collection)
  • 17. Investigate the Incident - Phase Steps (Forensic Analysis)
  • 18. Reporting • Reports accurately describe the details of an incident, that are understandable to decision makers, that can withstand the barrage of legal scrutiny, and that are produced in a timely manner. • Some guidelines to ensure that the reporting phase does not become your CSIRT’s nemesis: • Document immediately All investigative steps and conclusions need to be documented as soon as possible. Writing something clearly and concisely at the moment you discover evidence saves time, promotes accuracy, and ensures that the details of the investigation can be communicated more clearly to others at any moment, which is critical if new personnel become involved or are assigned to lead the investigation. • Write concisely and clearly Enforce the “write it tight” philosphy. Documenting investigative steps requires discipline and organization. Write everything down in a fashion that is understandable to you and others. Discourage shorthand or shortcuts. Vague notations, incomplete scribbling, and other unclear documentation can lead to redundant efforts, forced translation of notes, confirmation of notes, and a failure to comprehend notes made by yourself or others. • Use a standard format Develop a format for your reports and stick to it. Create forms, outlines, and templates that organize the response process and foster the recording of all pertinent data.This makes report writing scalable, saves time, and promotes accuracy.
  • 19. Resolution • The goal of the resolution phase is to implement host-based, network-based, and procedural countermeasures to prevent an incident from causing further damage and to return your organization to a secure, healthy operational status. In other words, in this phase, you contain the problem, solve the problem, and take steps to prevent the problem from occurring again. • The following steps are often taken to resolve a computer security incident: • Identify organization’s top priorities. Which of the following is the most critical to resolve: returning all systems to operational status, ensuring data integrity, containing the impact of the incident, collecting evidence, or avoiding public disclosure? • Determine the nature of the incident in enough detail to understand how the security occurred and what host-based and network-based remedies are required to address it. • Determine if there are underlying or systemic causes for the incident that need to be addressed (lack of standards, noncompliance with standards, and so on).
  • 20. Resolution (Cont...) • Restore any affected or compromised systems. You may need to rely on a prior version of the data, server platform software, or application software as needed to ensure that the system performs as you expect it to perform. • Apply corrections required to address any host-based vulnerabilities. Note that all fixes should be tested in a lab environment before being applied to production systems. • Apply network-based countermeasures such as access control lists, firewalls, or IDS. • Assign responsibility for correcting any systemic issues. • Track progress on all corrections that are required, especially if they will take significant time to complete. • Validate that all remedial steps or countermeasures are effective. In other words, verify that all the host-based, network-based, and systemic remedies have been applied correctly. • Update your security policy and procedures as needed to improve your response process.