SlideShare a Scribd company logo
1 of 20
Download to read offline
July, 2021
Key Investigation Aspects
for Information Security
Creative Commons
The post-incident activity (a.k.a Post Mortem) is a crucial step in the incident lifecycle
process - it provides in-depth understanding from an OPSEC perspective, allowing a more
adequate and focused response plan, but despite its importance, it is often conducted improperly,
leading to loss of evidence integrity and inconclusive investigations.
So, what aspects should not be overlooked?
“Those who don't know history are doomed to repeat it.” ― Edmund Burke
Overview
Ok, you implemented the
required controls, your
team were ready. But the
evidences were not
admissible in court.
Understanding the problem
I. Lack of Controls
After an incident take
place, you regrettably
might discover that you
don’t have enough audit
trails to pursue an
investigation.
II. Lack of Preparation
Deal with tough decisions
in the heat of an
information security
incident might not only be
difficult but
counterproductive as well.
III. Lack of Preservation
After an incident take place, you regrettably might discover that you don’t have enough audit trails to pursue an investigation.
It is always important to consider:
● If you don’t detect, you can’t respond. Make sure the security architecture has enough layers, offering sensors and audit logs - if you use a solution
such as a SIEM, you can increase the correlation and alerting efficiency by configuring the data sources based on those layers. Keep an eye on
access and behaviour. Identify company’s “Crown Jewels” for better (risk based) results.
● Not only logs are necessary, but it should follow the proper standard. A logging standard procedure is the very first step in order to define what to
log, the required pattern and its retention period (i.e. timezone, auth data and etc). The criteria should follow infosec and regulatory features (i.e.
GDPR / LGPD). Make sure logs are stored properly, preventing tampering or unauthorized access (non repudiation principle).
● Over time, a control is just effective if you are able to measure (CE). While you can support governance using a variety of threat/risk modeling
frameworks (FAIR is one of them), you need to understand that the solution must be designed considering the “technology, process and people”
tripod. Rather than searching around for frameworks, first understand what problem you want to solve, your context and then check what the
industry can offer (i.e. COSO framework for enterprise internal controls, CIS for cyber defense guidelines and etc). We are fortunate to have a
lot of options up our sleeve, but focus on the problem, not the framework.
Understanding the problem
I. Lack of Controls
Deal with tough decisions in the heat of an information security incident might not only be difficult but counterproductive as
well. Some notes to keep in mind:
● The clock starts ticking. Time is key, so operational efficiency is mandatory. Make sure you have the incident playbooks/runbooks ready (and
tested - always aim to reduce the response time). Governance routines like a Business Continuity Plan / Disaster Recovery Plan is always a good
way to go on your security roadmap.
● Consider having a CSIRT and a CERT, nonetheless, you must educate the personnel on a wider security culture program and awareness
campaigns. They should understand and perceive, at least, basic infosec aspects; how to identify certain threats and how to report them.
● ITOps staff among other strategic business units must receive a resourceful training on how to deal with certain incidents, specifically, how to deal
with evidence (collect, maintain - we will see more on our next slide “Preservation”). These guidelines must be clear and remarkably available.
Understanding the problem
II. Lack of Preparation
Ok, you implemented the required controls, your team were ready. But the evidences were not admissible in court. What was
missing?
● Cybersecurity Forensics lesson #1: Preserve the evidence. Train the necessary personnel on how to collect evidence without data loss or risk of
tampering. Use chain of custody documentation and remember to keep it updated.
● Safeguard/Protect physical and logical evidence - e.g. a very common mistake is shutting down a compromised computer and losing useful volatile
data stored in RAM; there is less intrusive ways to gather evidence and this must be done professionally, with the use of forensic tools (i.e.
sleuthkit/Autopsy, FTK, Volatility, Encase, etc). For some documents, images and screenshots you might benefit using a notarial act as written
evidence. In addition, the evidence and investigation assets must be stored at a secure and restricted location.
● Create a timeline and document every step of the way. Date and Time, Locations, Assets (by unique ID), People involved. Also, make sure to keep
track of the important decisions that led your investigation. Always use probability in favor on your decision making - It is important so you can
rethink your steps or help people understand the rationale that was used.
Understanding the problem
III. Lack of Preservation
An investigation must be confidential - Always keep track to whom the information was
disclosed - If there is an NDA in place, if the people are aware of the sensitivity of the topic.
You must control the communication channels as this might affect the outcome of the
ongoing investigation.
This also applies for discussing about the investigation in public or using insecure devices to
access case information, which might lead to a security breach.
Keep in mind
What about some
theory
Forensic science attributes evidence
generation on the crime event the process
of
● Identification
● Classification (or individualization)
● Association
● Reconstruction
(K, Inman; N, Rudin)
You can follow these principles to structure
your investigation and your report.
What about some
theory
Cause of Action
Materiality
Admissibility
Relevance
Reliability
Evidence
Evidence information can be used for
reconstruction and causality
Know your case
Regarding the Incident
● Given an OPSEC standpoint, was this a targeted
incident? Was it isolated or a chain of events?
Discover the pattern and the objective.
● Use your Threat Intel team as a valuable resource
(if you don’t have any Threat Intel Platform, I can
recommend you check MISP project. It is an open
source TIP).
● Manage expectation. It is easy to lose track of the
purpose of the investigation. It might be time
consuming and might end inconclusive.
● Attention to the forensic/investigation report.
The information must be clear - remember, this
can be used as your testimonial and might be
presented as legal evidence.
Know your case
Ishikawa diagram (a.k.a fishbone) can
help you understand, document and
present, in a visual way, the causal
event chain that culminated in the
incident.
TECHNOLOGY
PEOPLE
ENVINRONMENT
PROCESS
Event 1.1
Event 1.2
Event 2.2
Event 2.1
Event 3.1
Event 4.1
Event 3.2
Event 4.2
Event 3.3
Event 4.3
3
1
2
4
You can have a more technical approach
using MITRE | ATT&CK framework,
depending on your objective and public.
It certainly would allow you to deep dive
and have a more robust and security
oriented perspective about the incident.
Privilege Escalation
Credential Access
Discovery
Collection
Resource Development
Persistence
Defense Evasion
Lateral Movement
Initial Access
Execution
Reconnaissance
C&C
Exfiltration
Impact
Know your case
Know your case
Regarding the Subject (criminal authorship)
● If the incident also check as a cybercrime activity, you can benefit by
using profiling techniques, such as motivation (financial, political,
emotional, personal, among others), language analysis (vices, typos)
and any other detail that might give you a hypothesis to work with
(pro-tip: Take a look at the “Hackers Profiling Project - HPP”, and if
you want to go even further on this road, check Ryan and Deci’s
taxonomy of human motivation).
● Know your enemy. Gather information might help you understand
the case, the subject motivations, possible connections and so on. You
can even use social engineering techniques to obtain them - carefully.
● With the collected information, you can create a “dictionary” - a list
with all the relevant terms and words that might help you
individualize the subject / search your environment for connections;
furtherly using the dictionary on your data devices (DLP, web
gateway, email gateway, file server and etc) - Once more, careful to
not let evidence or clues in cache or logs showing to unauthorized
people your query attempts/results.
Know your case
Regarding the Subject (criminal authorship)
● You can benefit by using OSINT framework, tools and
resources to enrich your data or find more relevant
information regarding the subject. Always be careful so
you don’t make noise and be discovered first - if the
subject can trace you back or discover that there is an
ongoing investigation, the tendency is that the subject
become more self-aware and might delete evidence / stop
acting.
Know your case
Taxonomy Motivations (Dittrich and Himma,
2005, as cited by Akhgar et al.,2015).
Know your case
Some tips for your report
● Include complete names (and, if possible, unique
IDs) of the people involved and their role on the
investigation
● Time and date and the used timezone
● Objectives or “tasking” - When, how and by whom
were you tasked. What is your goal by proceeding
in this investigation. You can also delimit your
scope here
● Hypothesis formulation - the evidences and
interviews will later bring assumptions/questions;
here is a tip: you can describe what was the effect
(incident) and possible motivations for the
materialization of that effect (not only what, but
how)
Know your case
Some tips for your report
● Timeline (graph) followed by the historic - which is
the list and description of actions taken (text)
● Results obtained (as clear as possible, usually
based on the incident reconstruction)
● Conclusion (usually match with the investigation
objective)
● List of attachments, followed by date of collection
and source (usually, I also register the MD5 hash
of the evidences listed here in order to attest its
integrity
Some tips for your report
● Don’t get lost - It’s important to be consistent in
your analysis and the report is a way to show it.
Know your case
Don’t lose track of
your objective
Use the objective
to explore your
hypothesis
Use the hypothesis
to define the
required actions,
creating your
historic
Document the
results of the
actions taken used
on the historic
Write the
conclusion based
on the results
While the level of detail of the investigation and report might vary accordingly to the
potential loss based on risk (financial, operational, strategical, reputational and so on), it is
important to emphasize that you should consider and invest your effort not just on this phase, but
considering the whole picture - in this case, the incident lifecycle.
More importantly, the infosec role is not only conducting the analysis and delivering the
forensic report, but leading the required initiatives for risk remediation, constantly working on a
better security posture towards the organization.
The most important part begin with the report.
Conclusion
Thanks
Rodrigo Sozza
Infosec | Cybersecurity | Forensics

More Related Content

What's hot

Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017FRSecure
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Claus Cramon Houmann
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesRoger Johnston
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1FRSecure
 
Cyber incident response or how to avoid long hours of testimony
Cyber incident response or how to avoid long hours of testimony Cyber incident response or how to avoid long hours of testimony
Cyber incident response or how to avoid long hours of testimony David Sweigert
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramResilient Systems
 

What's hot (6)

Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 3 – FRSecure CISSP Mentor Program 2017
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the Vulnerabilities
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
 
Cyber incident response or how to avoid long hours of testimony
Cyber incident response or how to avoid long hours of testimony Cyber incident response or how to avoid long hours of testimony
Cyber incident response or how to avoid long hours of testimony
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response Program
 

Similar to Key Aspects for Effective Digital Forensics Investigations

Brian HughesTheimportanceof evidencecollectionan.docx
Brian HughesTheimportanceof evidencecollectionan.docxBrian HughesTheimportanceof evidencecollectionan.docx
Brian HughesTheimportanceof evidencecollectionan.docxjasoninnes20
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.pptabhichowdary16
 
Five Mistakes of Incident Response
Five Mistakes of Incident ResponseFive Mistakes of Incident Response
Five Mistakes of Incident ResponseAnton Chuvakin
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdffeetshoemart
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirementsgurneyhal
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case StudyAngilina Jones
 
Measuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsMeasuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsCSCJournals
 
Workplace Investigation Guide
Workplace Investigation GuideWorkplace Investigation Guide
Workplace Investigation Guide@HR2CEO
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDr Raghu Khimani
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and proceduresStevenSegaert
 
Digital Forensics & Incident Response Fundamentals.pdf
Digital Forensics & Incident Response Fundamentals.pdfDigital Forensics & Incident Response Fundamentals.pdf
Digital Forensics & Incident Response Fundamentals.pdfChristopher Doman
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdfSurendhar57
 
News letter June 11
News letter June 11News letter June 11
News letter June 11captsbtyagi
 
Toward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisToward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisSherif Zahran
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection ProgramsMichael Annis
 

Similar to Key Aspects for Effective Digital Forensics Investigations (20)

Brian HughesTheimportanceof evidencecollectionan.docx
Brian HughesTheimportanceof evidencecollectionan.docxBrian HughesTheimportanceof evidencecollectionan.docx
Brian HughesTheimportanceof evidencecollectionan.docx
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
 
Five Mistakes of Incident Response
Five Mistakes of Incident ResponseFive Mistakes of Incident Response
Five Mistakes of Incident Response
 
Computer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdfComputer Forensics MethodologiesList them and explain each one.P.pdf
Computer Forensics MethodologiesList them and explain each one.P.pdf
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
Daniel_CISSP_Dom7__1_.pdf
Daniel_CISSP_Dom7__1_.pdfDaniel_CISSP_Dom7__1_.pdf
Daniel_CISSP_Dom7__1_.pdf
 
Target Data Security Breach Case Study
Target Data Security Breach Case StudyTarget Data Security Breach Case Study
Target Data Security Breach Case Study
 
Measuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate MetricsMeasuring Information Security: Understanding And Selecting Appropriate Metrics
Measuring Information Security: Understanding And Selecting Appropriate Metrics
 
Workplace Investigation Guide
Workplace Investigation GuideWorkplace Investigation Guide
Workplace Investigation Guide
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
Implementation of security standards and procedures
Implementation of security standards and proceduresImplementation of security standards and procedures
Implementation of security standards and procedures
 
Digital Forensics & Incident Response Fundamentals.pdf
Digital Forensics & Incident Response Fundamentals.pdfDigital Forensics & Incident Response Fundamentals.pdf
Digital Forensics & Incident Response Fundamentals.pdf
 
PACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic ConceptsPACE-IT: Basic Forensic Concepts
PACE-IT: Basic Forensic Concepts
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
 
Toward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisToward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive Analysis
 
A Case For Information Protection Programs
A Case For Information Protection ProgramsA Case For Information Protection Programs
A Case For Information Protection Programs
 

Recently uploaded

Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSAishani27
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxolyaivanovalion
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Ukraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICSUkraine War presentation: KNOW THE BASICS
Ukraine War presentation: KNOW THE BASICS
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Ravak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptxRavak dropshipping via API with DroFx.pptx
Ravak dropshipping via API with DroFx.pptx
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Key Aspects for Effective Digital Forensics Investigations

  • 1. July, 2021 Key Investigation Aspects for Information Security Creative Commons
  • 2. The post-incident activity (a.k.a Post Mortem) is a crucial step in the incident lifecycle process - it provides in-depth understanding from an OPSEC perspective, allowing a more adequate and focused response plan, but despite its importance, it is often conducted improperly, leading to loss of evidence integrity and inconclusive investigations. So, what aspects should not be overlooked? “Those who don't know history are doomed to repeat it.” ― Edmund Burke Overview
  • 3. Ok, you implemented the required controls, your team were ready. But the evidences were not admissible in court. Understanding the problem I. Lack of Controls After an incident take place, you regrettably might discover that you don’t have enough audit trails to pursue an investigation. II. Lack of Preparation Deal with tough decisions in the heat of an information security incident might not only be difficult but counterproductive as well. III. Lack of Preservation
  • 4. After an incident take place, you regrettably might discover that you don’t have enough audit trails to pursue an investigation. It is always important to consider: ● If you don’t detect, you can’t respond. Make sure the security architecture has enough layers, offering sensors and audit logs - if you use a solution such as a SIEM, you can increase the correlation and alerting efficiency by configuring the data sources based on those layers. Keep an eye on access and behaviour. Identify company’s “Crown Jewels” for better (risk based) results. ● Not only logs are necessary, but it should follow the proper standard. A logging standard procedure is the very first step in order to define what to log, the required pattern and its retention period (i.e. timezone, auth data and etc). The criteria should follow infosec and regulatory features (i.e. GDPR / LGPD). Make sure logs are stored properly, preventing tampering or unauthorized access (non repudiation principle). ● Over time, a control is just effective if you are able to measure (CE). While you can support governance using a variety of threat/risk modeling frameworks (FAIR is one of them), you need to understand that the solution must be designed considering the “technology, process and people” tripod. Rather than searching around for frameworks, first understand what problem you want to solve, your context and then check what the industry can offer (i.e. COSO framework for enterprise internal controls, CIS for cyber defense guidelines and etc). We are fortunate to have a lot of options up our sleeve, but focus on the problem, not the framework. Understanding the problem I. Lack of Controls
  • 5. Deal with tough decisions in the heat of an information security incident might not only be difficult but counterproductive as well. Some notes to keep in mind: ● The clock starts ticking. Time is key, so operational efficiency is mandatory. Make sure you have the incident playbooks/runbooks ready (and tested - always aim to reduce the response time). Governance routines like a Business Continuity Plan / Disaster Recovery Plan is always a good way to go on your security roadmap. ● Consider having a CSIRT and a CERT, nonetheless, you must educate the personnel on a wider security culture program and awareness campaigns. They should understand and perceive, at least, basic infosec aspects; how to identify certain threats and how to report them. ● ITOps staff among other strategic business units must receive a resourceful training on how to deal with certain incidents, specifically, how to deal with evidence (collect, maintain - we will see more on our next slide “Preservation”). These guidelines must be clear and remarkably available. Understanding the problem II. Lack of Preparation
  • 6. Ok, you implemented the required controls, your team were ready. But the evidences were not admissible in court. What was missing? ● Cybersecurity Forensics lesson #1: Preserve the evidence. Train the necessary personnel on how to collect evidence without data loss or risk of tampering. Use chain of custody documentation and remember to keep it updated. ● Safeguard/Protect physical and logical evidence - e.g. a very common mistake is shutting down a compromised computer and losing useful volatile data stored in RAM; there is less intrusive ways to gather evidence and this must be done professionally, with the use of forensic tools (i.e. sleuthkit/Autopsy, FTK, Volatility, Encase, etc). For some documents, images and screenshots you might benefit using a notarial act as written evidence. In addition, the evidence and investigation assets must be stored at a secure and restricted location. ● Create a timeline and document every step of the way. Date and Time, Locations, Assets (by unique ID), People involved. Also, make sure to keep track of the important decisions that led your investigation. Always use probability in favor on your decision making - It is important so you can rethink your steps or help people understand the rationale that was used. Understanding the problem III. Lack of Preservation
  • 7. An investigation must be confidential - Always keep track to whom the information was disclosed - If there is an NDA in place, if the people are aware of the sensitivity of the topic. You must control the communication channels as this might affect the outcome of the ongoing investigation. This also applies for discussing about the investigation in public or using insecure devices to access case information, which might lead to a security breach. Keep in mind
  • 8. What about some theory Forensic science attributes evidence generation on the crime event the process of ● Identification ● Classification (or individualization) ● Association ● Reconstruction (K, Inman; N, Rudin) You can follow these principles to structure your investigation and your report.
  • 9. What about some theory Cause of Action Materiality Admissibility Relevance Reliability Evidence Evidence information can be used for reconstruction and causality
  • 10. Know your case Regarding the Incident ● Given an OPSEC standpoint, was this a targeted incident? Was it isolated or a chain of events? Discover the pattern and the objective. ● Use your Threat Intel team as a valuable resource (if you don’t have any Threat Intel Platform, I can recommend you check MISP project. It is an open source TIP). ● Manage expectation. It is easy to lose track of the purpose of the investigation. It might be time consuming and might end inconclusive. ● Attention to the forensic/investigation report. The information must be clear - remember, this can be used as your testimonial and might be presented as legal evidence.
  • 11. Know your case Ishikawa diagram (a.k.a fishbone) can help you understand, document and present, in a visual way, the causal event chain that culminated in the incident. TECHNOLOGY PEOPLE ENVINRONMENT PROCESS Event 1.1 Event 1.2 Event 2.2 Event 2.1 Event 3.1 Event 4.1 Event 3.2 Event 4.2 Event 3.3 Event 4.3 3 1 2 4
  • 12. You can have a more technical approach using MITRE | ATT&CK framework, depending on your objective and public. It certainly would allow you to deep dive and have a more robust and security oriented perspective about the incident. Privilege Escalation Credential Access Discovery Collection Resource Development Persistence Defense Evasion Lateral Movement Initial Access Execution Reconnaissance C&C Exfiltration Impact Know your case
  • 13. Know your case Regarding the Subject (criminal authorship) ● If the incident also check as a cybercrime activity, you can benefit by using profiling techniques, such as motivation (financial, political, emotional, personal, among others), language analysis (vices, typos) and any other detail that might give you a hypothesis to work with (pro-tip: Take a look at the “Hackers Profiling Project - HPP”, and if you want to go even further on this road, check Ryan and Deci’s taxonomy of human motivation). ● Know your enemy. Gather information might help you understand the case, the subject motivations, possible connections and so on. You can even use social engineering techniques to obtain them - carefully. ● With the collected information, you can create a “dictionary” - a list with all the relevant terms and words that might help you individualize the subject / search your environment for connections; furtherly using the dictionary on your data devices (DLP, web gateway, email gateway, file server and etc) - Once more, careful to not let evidence or clues in cache or logs showing to unauthorized people your query attempts/results.
  • 14. Know your case Regarding the Subject (criminal authorship) ● You can benefit by using OSINT framework, tools and resources to enrich your data or find more relevant information regarding the subject. Always be careful so you don’t make noise and be discovered first - if the subject can trace you back or discover that there is an ongoing investigation, the tendency is that the subject become more self-aware and might delete evidence / stop acting.
  • 15. Know your case Taxonomy Motivations (Dittrich and Himma, 2005, as cited by Akhgar et al.,2015).
  • 16. Know your case Some tips for your report ● Include complete names (and, if possible, unique IDs) of the people involved and their role on the investigation ● Time and date and the used timezone ● Objectives or “tasking” - When, how and by whom were you tasked. What is your goal by proceeding in this investigation. You can also delimit your scope here ● Hypothesis formulation - the evidences and interviews will later bring assumptions/questions; here is a tip: you can describe what was the effect (incident) and possible motivations for the materialization of that effect (not only what, but how)
  • 17. Know your case Some tips for your report ● Timeline (graph) followed by the historic - which is the list and description of actions taken (text) ● Results obtained (as clear as possible, usually based on the incident reconstruction) ● Conclusion (usually match with the investigation objective) ● List of attachments, followed by date of collection and source (usually, I also register the MD5 hash of the evidences listed here in order to attest its integrity
  • 18. Some tips for your report ● Don’t get lost - It’s important to be consistent in your analysis and the report is a way to show it. Know your case Don’t lose track of your objective Use the objective to explore your hypothesis Use the hypothesis to define the required actions, creating your historic Document the results of the actions taken used on the historic Write the conclusion based on the results
  • 19. While the level of detail of the investigation and report might vary accordingly to the potential loss based on risk (financial, operational, strategical, reputational and so on), it is important to emphasize that you should consider and invest your effort not just on this phase, but considering the whole picture - in this case, the incident lifecycle. More importantly, the infosec role is not only conducting the analysis and delivering the forensic report, but leading the required initiatives for risk remediation, constantly working on a better security posture towards the organization. The most important part begin with the report. Conclusion
  • 20. Thanks Rodrigo Sozza Infosec | Cybersecurity | Forensics