SlideShare a Scribd company logo
1 of 2
Download to read offline
Preparation Identification Containment
Objective: Establish contacts, define
procedures, and gather information to save
time during the incident handling.
Contacts
■■ Make sure to also have contact points in your
public relation team, human resources team
and legal department
■■ Have a centralized logging facility
■■ Be sure to have a global authorization and
clearance process. This process must
specially take care of the removal of privileges
on former jobs
■■ Provide strong authentication accordingly to
the risk of the business application
Objective: Detect the incident, determine its
scope, and involve the appropriate parties.
Insider abuses are hard to detect and there is no
100% success tips.
Technical identification
■■ Alerts from a SIEM or correlation tools
Malicious behaviour can have been detected with
the correlation of several abnormal events
■■ Alerts from an IDS/IPS detecting an
intrusion
In case the insider tried to hack the system, an
Intrusion Detection System (or Intrusion Prevention
System) can be able to trigger an alert.
Human identification
■■ Management:
The manager of the insider might be the first to
notice the suspected behaviour.
■■ Control, risk, compliance:
These teams have their own systems to detect
operational anomalies and they can also trigger
alerts if something abnormal is detected.
■■ Colleagues:
Insider’s colleagues are maybe the most valuable
notification channel because they know perfectly
the tasks, the process and the impacts on their
duty jobs. They can guess easily what is
happening.
■■ External parties:
External partners or structure can also have their
own detection capabilities. If operations have been
falsified internally, these external entities can bring
a real enlightenment.
11 22
Objective: Mitigate the attack’s effects on the
targeted environment.
Don’t do anything, without a written request
from the concerned CISO/person in charge.
Based on your legal team advisory, a written
permission from the concerned user might also
be handy.
■■ Involve people:
Different people should be informed about the
abuse so that they can help to assist on it. This
includes HR management, legal management, PR
management and business management of the
suspected insider.
■■ Meeting:
An HR manager should meet the suspected insider
to explain him/her what has been found and what
will happen. Support can be required from legal,
technical and management people.
■■ Privileges lowering:
If the suspected insider is allowed to stay at work
until the end of the investigation, provide him/her a
computer with minimum authorizations.
■■ Authorization freeze:
Suspend access and authorizations of the
suspected insider. This must include application
clearance. This can also include system account,
keys, building facility badge.
■■ Remote access:
Suspend remote access capabilities, i.e.:
smartphones, VPN accounts, tokens...
■■ Seizure:
Seize all the professional computing device of the
suspected insider.
33
Containment
Remediation
Recovery
Aftermath
Incident Response Methodology
IRM #12
Insider abuse
Deal with internal information disclosed intentionally
___________________________________________________
IRM Authors: CERT SG / David Bizeul
IRM version: 1.1
E-Mail: cert.sg@socgen.com
Web: https://cert.societegenerale.com
Twitter: @CertSG
Abstract
Incident handling steps
Case 1: abnormal activity
If nothing malicious or fraudulent is confirmed yet,
two investigations should start right now:
- forensics investigation on the computing
devices of the suspected insider.
- log investigation on different audit trails
components
Case 2: malicious / fraudulent activity
If malicious or fraudulent behaviour is already
confirmed, think about file a complaint against the
suspected insider.
In this case, do not take any further technical
actions. Provide the legal team or law enforcement
officer all requested evidences and be ready to
assist on demand.
If collateral damages can result from the abuse, be
sure to contain the incident impacts before making
it public. Be sure to inform authorities if required.
Objective: Take actions to remove the threat
and avoid future incidents.
The remediation part is pretty limited in case of an
insider abuse. Following actions can be considered
depending on the case:
■■ Take disciplinary action against the malicious
employee (or terminate the contract) and
remove all his/her credentials.
■■ Delete all fictitious or fraudulent operations
made by the insider
■■ Review all programs or scripts made by the
insider and remove all unnecessary codes
Objective: Restore the system to normal
operations.
If the incident has not been made public yet, be
sure to warn all the impacted stakeholders
(customers, concerned partners …) and required
authorities. This communication must be made by
top management in case of huge impacts.
Eventually warn your employees or some local
teams about the issue to raise awareness and
increase security rules.
When situation comes back to normal, eventually
remove the official communication.
Objective: Document the incident’s details,
discuss lessons learned, and adjust plans and
defences.
Report
An incident report should be written and made
available to all of the actors of the incident.
The following themes should be described:
■■ Initial detection
■■ Actions and timelines
■■ What went right
■■ What went wrong
■■ Incident impact
Capitalize
Some improvement might be especially valuable
considering insider abuse:
■■ Authorization process improvements
■■ Controls improvements in the organisation
■■ Awareness on fraud and malicious activity
This Incident Response Methodology is a cheat sheet dedicated
to handlers investigating on a precise security issue.
Who should use IRM sheets?
 Administrators
 Security Operation Center
 CISOs and deputies
 CERT (Computer Emergency Response Team)
Remember: If you face an incident, follow IRM, take notes
and do not panic. Contact your CERT immediately if
needed:
6 steps are defined to handle security Incidents
 Preparation: get ready to handle the incident
 Identification: detect the incident
 Containment: limit the impact of the incident
 Remediation: remove the threat
 Recovery: recover to a normal stage
 Aftermath: draw up and improve the process
IRM provides detailed information for each step.
This document is for public use
33
44
55
66

More Related Content

What's hot

L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)Jan Wong
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system securityJan Wong
 
Cs461 06.risk analysis (1)
Cs461 06.risk analysis (1)Cs461 06.risk analysis (1)
Cs461 06.risk analysis (1)neeraj.sihag
 
1. security management practices
1. security management practices1. security management practices
1. security management practices7wounders
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?ObserveIT
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeDavid Mai, MBA
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptxPiyush Jain
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Risk management of basel norms
Risk management of basel norms Risk management of basel norms
Risk management of basel norms SKMohamedKasim
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 

What's hot (14)

L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
 
Cs461 06.risk analysis (1)
Cs461 06.risk analysis (1)Cs461 06.risk analysis (1)
Cs461 06.risk analysis (1)
 
1. security management practices
1. security management practices1. security management practices
1. security management practices
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Understanding security operation.pptx
Understanding security operation.pptxUnderstanding security operation.pptx
Understanding security operation.pptx
 
Security Site Surveys and Risk Assessments
Security Site Surveys and Risk AssessmentsSecurity Site Surveys and Risk Assessments
Security Site Surveys and Risk Assessments
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Risk management of basel norms
Risk management of basel norms Risk management of basel norms
Risk management of basel norms
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
 

Viewers also liked

Network programming Using Python
Network programming Using PythonNetwork programming Using Python
Network programming Using PythonKarim Sonbol
 
JAGA CHEMISTRY REPAGE
JAGA CHEMISTRY REPAGEJAGA CHEMISTRY REPAGE
JAGA CHEMISTRY REPAGEjayanth m.c
 
Scse 1793 Differential Equation lecture 1
Scse 1793 Differential Equation lecture 1Scse 1793 Differential Equation lecture 1
Scse 1793 Differential Equation lecture 1Fairul Izwan Muzamuddin
 
Higher order ODE with applications
Higher order ODE with applicationsHigher order ODE with applications
Higher order ODE with applicationsPratik Gadhiya
 
DOMAIN NAME AND CYBER SQUATTING
DOMAIN NAME AND CYBER SQUATTINGDOMAIN NAME AND CYBER SQUATTING
DOMAIN NAME AND CYBER SQUATTINGAncy Varghese
 
Cando arturo escapou da casa 2
Cando arturo escapou da casa 2Cando arturo escapou da casa 2
Cando arturo escapou da casa 2A Solaina
 

Viewers also liked (8)

Islam Salah
Islam SalahIslam Salah
Islam Salah
 
Network programming Using Python
Network programming Using PythonNetwork programming Using Python
Network programming Using Python
 
JAGA CHEMISTRY REPAGE
JAGA CHEMISTRY REPAGEJAGA CHEMISTRY REPAGE
JAGA CHEMISTRY REPAGE
 
Scse 1793 Differential Equation lecture 1
Scse 1793 Differential Equation lecture 1Scse 1793 Differential Equation lecture 1
Scse 1793 Differential Equation lecture 1
 
Irm 13-phishing
Irm 13-phishingIrm 13-phishing
Irm 13-phishing
 
Higher order ODE with applications
Higher order ODE with applicationsHigher order ODE with applications
Higher order ODE with applications
 
DOMAIN NAME AND CYBER SQUATTING
DOMAIN NAME AND CYBER SQUATTINGDOMAIN NAME AND CYBER SQUATTING
DOMAIN NAME AND CYBER SQUATTING
 
Cando arturo escapou da casa 2
Cando arturo escapou da casa 2Cando arturo escapou da casa 2
Cando arturo escapou da casa 2
 

Similar to Preparation Identification Containment Insider Abuse

Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
Incident Mgmt Nov 08
Incident Mgmt Nov 08Incident Mgmt Nov 08
Incident Mgmt Nov 08empower
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guideJoAnna Cheshire
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemTheodore Le
 
Incident ResponseAs a security professional, you will.docx
 Incident ResponseAs a security professional, you will.docx Incident ResponseAs a security professional, you will.docx
Incident ResponseAs a security professional, you will.docxMARRY7
 
Cybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to knowCybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to knowCordium
 
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docxChapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docxchristinemaritza
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceSami Benafia
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...Accellis Technology Group
 
Practical Guide to Managing Incidents Using LLM's and NLP.pdf
Practical Guide to Managing Incidents Using LLM's and NLP.pdfPractical Guide to Managing Incidents Using LLM's and NLP.pdf
Practical Guide to Managing Incidents Using LLM's and NLP.pdfChris Galvan
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 

Similar to Preparation Identification Containment Insider Abuse (20)

Irm 8-blackmail
Irm 8-blackmailIrm 8-blackmail
Irm 8-blackmail
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Kenya AMC Presentation 2
Kenya AMC Presentation 2Kenya AMC Presentation 2
Kenya AMC Presentation 2
 
Incident Mgmt Nov 08
Incident Mgmt Nov 08Incident Mgmt Nov 08
Incident Mgmt Nov 08
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
IQ4 Final Presentation (1)
IQ4 Final Presentation  (1)IQ4 Final Presentation  (1)
IQ4 Final Presentation (1)
 
Course Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information SystemCourse Session Outline - Internal control in Information System
Course Session Outline - Internal control in Information System
 
Incident ResponseAs a security professional, you will.docx
 Incident ResponseAs a security professional, you will.docx Incident ResponseAs a security professional, you will.docx
Incident ResponseAs a security professional, you will.docx
 
Cybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to knowCybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to know
 
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docxChapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Accidents OSH
Accidents OSHAccidents OSH
Accidents OSH
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM compliance
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
 
Practical Guide to Managing Incidents Using LLM's and NLP.pdf
Practical Guide to Managing Incidents Using LLM's and NLP.pdfPractical Guide to Managing Incidents Using LLM's and NLP.pdf
Practical Guide to Managing Incidents Using LLM's and NLP.pdf
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
insider threat research
insider threat researchinsider threat research
insider threat research
 

More from Kasper de Waard

More from Kasper de Waard (10)

Cheatsheet: Netcat
Cheatsheet: NetcatCheatsheet: Netcat
Cheatsheet: Netcat
 
Cheatsheet: Metasploit
Cheatsheet: MetasploitCheatsheet: Metasploit
Cheatsheet: Metasploit
 
Cheatsheet: Hex file headers and regex
Cheatsheet: Hex file headers and regexCheatsheet: Hex file headers and regex
Cheatsheet: Hex file headers and regex
 
Cheatsheet: Google Search
Cheatsheet: Google SearchCheatsheet: Google Search
Cheatsheet: Google Search
 
Irm 15-trademark infringement
Irm 15-trademark infringementIrm 15-trademark infringement
Irm 15-trademark infringement
 
Irm 14-scam
Irm 14-scamIrm 14-scam
Irm 14-scam
 
Irm 10-social engineering
Irm 10-social engineeringIrm 10-social engineering
Irm 10-social engineering
 
Irm 6-website-defacement
Irm 6-website-defacementIrm 6-website-defacement
Irm 6-website-defacement
 
Irm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviourIrm 5-malicious networkbehaviour
Irm 5-malicious networkbehaviour
 
Irm 4-ddos
Irm 4-ddosIrm 4-ddos
Irm 4-ddos
 

Recently uploaded

Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 

Recently uploaded (20)

Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 

Preparation Identification Containment Insider Abuse

  • 1. Preparation Identification Containment Objective: Establish contacts, define procedures, and gather information to save time during the incident handling. Contacts ■■ Make sure to also have contact points in your public relation team, human resources team and legal department ■■ Have a centralized logging facility ■■ Be sure to have a global authorization and clearance process. This process must specially take care of the removal of privileges on former jobs ■■ Provide strong authentication accordingly to the risk of the business application Objective: Detect the incident, determine its scope, and involve the appropriate parties. Insider abuses are hard to detect and there is no 100% success tips. Technical identification ■■ Alerts from a SIEM or correlation tools Malicious behaviour can have been detected with the correlation of several abnormal events ■■ Alerts from an IDS/IPS detecting an intrusion In case the insider tried to hack the system, an Intrusion Detection System (or Intrusion Prevention System) can be able to trigger an alert. Human identification ■■ Management: The manager of the insider might be the first to notice the suspected behaviour. ■■ Control, risk, compliance: These teams have their own systems to detect operational anomalies and they can also trigger alerts if something abnormal is detected. ■■ Colleagues: Insider’s colleagues are maybe the most valuable notification channel because they know perfectly the tasks, the process and the impacts on their duty jobs. They can guess easily what is happening. ■■ External parties: External partners or structure can also have their own detection capabilities. If operations have been falsified internally, these external entities can bring a real enlightenment. 11 22 Objective: Mitigate the attack’s effects on the targeted environment. Don’t do anything, without a written request from the concerned CISO/person in charge. Based on your legal team advisory, a written permission from the concerned user might also be handy. ■■ Involve people: Different people should be informed about the abuse so that they can help to assist on it. This includes HR management, legal management, PR management and business management of the suspected insider. ■■ Meeting: An HR manager should meet the suspected insider to explain him/her what has been found and what will happen. Support can be required from legal, technical and management people. ■■ Privileges lowering: If the suspected insider is allowed to stay at work until the end of the investigation, provide him/her a computer with minimum authorizations. ■■ Authorization freeze: Suspend access and authorizations of the suspected insider. This must include application clearance. This can also include system account, keys, building facility badge. ■■ Remote access: Suspend remote access capabilities, i.e.: smartphones, VPN accounts, tokens... ■■ Seizure: Seize all the professional computing device of the suspected insider. 33
  • 2. Containment Remediation Recovery Aftermath Incident Response Methodology IRM #12 Insider abuse Deal with internal information disclosed intentionally ___________________________________________________ IRM Authors: CERT SG / David Bizeul IRM version: 1.1 E-Mail: cert.sg@socgen.com Web: https://cert.societegenerale.com Twitter: @CertSG Abstract Incident handling steps Case 1: abnormal activity If nothing malicious or fraudulent is confirmed yet, two investigations should start right now: - forensics investigation on the computing devices of the suspected insider. - log investigation on different audit trails components Case 2: malicious / fraudulent activity If malicious or fraudulent behaviour is already confirmed, think about file a complaint against the suspected insider. In this case, do not take any further technical actions. Provide the legal team or law enforcement officer all requested evidences and be ready to assist on demand. If collateral damages can result from the abuse, be sure to contain the incident impacts before making it public. Be sure to inform authorities if required. Objective: Take actions to remove the threat and avoid future incidents. The remediation part is pretty limited in case of an insider abuse. Following actions can be considered depending on the case: ■■ Take disciplinary action against the malicious employee (or terminate the contract) and remove all his/her credentials. ■■ Delete all fictitious or fraudulent operations made by the insider ■■ Review all programs or scripts made by the insider and remove all unnecessary codes Objective: Restore the system to normal operations. If the incident has not been made public yet, be sure to warn all the impacted stakeholders (customers, concerned partners …) and required authorities. This communication must be made by top management in case of huge impacts. Eventually warn your employees or some local teams about the issue to raise awareness and increase security rules. When situation comes back to normal, eventually remove the official communication. Objective: Document the incident’s details, discuss lessons learned, and adjust plans and defences. Report An incident report should be written and made available to all of the actors of the incident. The following themes should be described: ■■ Initial detection ■■ Actions and timelines ■■ What went right ■■ What went wrong ■■ Incident impact Capitalize Some improvement might be especially valuable considering insider abuse: ■■ Authorization process improvements ■■ Controls improvements in the organisation ■■ Awareness on fraud and malicious activity This Incident Response Methodology is a cheat sheet dedicated to handlers investigating on a precise security issue. Who should use IRM sheets?  Administrators  Security Operation Center  CISOs and deputies  CERT (Computer Emergency Response Team) Remember: If you face an incident, follow IRM, take notes and do not panic. Contact your CERT immediately if needed: 6 steps are defined to handle security Incidents  Preparation: get ready to handle the incident  Identification: detect the incident  Containment: limit the impact of the incident  Remediation: remove the threat  Recovery: recover to a normal stage  Aftermath: draw up and improve the process IRM provides detailed information for each step. This document is for public use 33 44 55 66