SlideShare a Scribd company logo
1 of 5
Download to read offline
Managing the CSIRT Infrastructure Components
Table of Contents
Notices ............................................................................................................................................ 2
Managing the CSIRT Infrastructure................................................................................................. 2
Purpose ........................................................................................................................................... 3
Infrastructure Components ............................................................................................................ 4
Outline ............................................................................................................................................ 5
Page 1 of 5
Notices
41
Managing CSIRTs
© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
Managing the CSIRT Infrastructure
1
Managing CSIRTs
© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213
[DISTRIBUTION STATEMENT A] Approved for public release
and unlimited distribution.
Managing the CSIRT
Infrastructure
Managing Computer Security
Incident Response Teams
(CSIRTs)
**001 Hello, This module is Managing
the CSIRT Infrastructure.
Page 2 of 5
Purpose
2
Managing CSIRTs
© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
Purpose
To provide an overview of the components of a CSIRT infrastructure
To discuss various issues in managing this infrastructure
To outline how and why to protect CSIRT data and information
**002 The purpose of this module is
to provide an overview of the
components that make up the CSIRT
infrastructure, not only computer
security but laboratory space, office
space, what have you, to discuss the
various issues related to managing
this infrastructure and to outline how
and why to protect the CSIRT data
and information that you have within
your organization.
Page 3 of 5
Infrastructure Components
3
Managing CSIRTs
© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
Infrastructure Components
The CSIRT infrastructure includes
• physical location and security of CSIRT staff and data
• staff office and home equipment
• CSIRT networks, systems, and internal/external defenses such as routers, firewalls,
and IDS
• CSIRT tools and applications to support incident handling and other provided services
- databases, data repositories, and data analysis tools for storing CSIRT and incident
information
- mechanisms or applications for secure email and voice communications
- test labs or test environments for analyzing malicious code and vulnerabilities
• organizational data classification schemas
**003 So the infrastructure consists
of all of these things: the physical
location and security of the staff and
the data; this includes office staff and
especially these days home
equipment, where people work
remotely not only from home but
they may relocate temporarily for
other reasons; you need to take into
account all of those places. The
CSIRT network; systems; internal
and external defenses, meaning
routers, firewalls, intrusion detection
systems, intrusion prevention
systems; and then also all of the
tools and applications and the
databases that those tools are used
to create. Whatever data
repositories, data analysis tools,
incident information; the mechanisms
for secure email like PGP keys, voice
communications, secure voice, secure
fax, what have you; and then also
test labs where you may have
Page 4 of 5
malicious code or you're exploring
vulnerabilities. All of these need to
be secured, taking into account your
data classification schemes.
Outline
4
Managing CSIRTs
© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
Outline
Data security
Physical security
Equipment
Networks and systems
CSIRT tools
**004 When we talk about securing
the infrastructure for a CSIRT, we're
really talking about these five things.
We're talking about securing data
that the CSIRT gets its hands on,
physical security of office space,
etcetera, the equipment, networks
and systems, and finally CSIRT tools.
Now, as has been said before, data
security is particularly important
because CSIRTs get intellectual
property from their constituency and
log files which can contain credentials
as well as other sensitive information.
So this makes a CSIRT a target for
intruders to gain access to information
of their constituencies that can then be
used to attack those constituencies.
Page 5 of 5

More Related Content

Similar to Managing the CSIRT Infrastructure Components

REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxdanas19
 
Guide to intrusion detection
Guide to intrusion detectionGuide to intrusion detection
Guide to intrusion detectionMarc Manthey
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)MHumaamAl
 
RP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfRP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfwardell henley
 
Security and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperSecurity and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperDavid J Rosenthal
 
xddsfinalGFGSFDGFDGSDFFGFGFGFGFGFGFGFGFGFGFGFG
xddsfinalGFGSFDGFDGSDFFGFGFGFGFGFGFGFGFGFGFGFGxddsfinalGFGSFDGFDGSDFFGFGFGFGFGFGFGFGFGFGFGFG
xddsfinalGFGSFDGFDGSDFFGFGFGFGFGFGFGFGFGFGFGFGchen sheffer
 
White Paper: Indoor Positioning in Industry & Logistics
White Paper: Indoor Positioning in Industry & LogisticsWhite Paper: Indoor Positioning in Industry & Logistics
White Paper: Indoor Positioning in Industry & Logisticsinfsoft GmbH
 
A New Approach to Healthcare Security
A New Approach to Healthcare SecurityA New Approach to Healthcare Security
A New Approach to Healthcare SecurityAngel Villar Garea
 
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of EnergySteps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of EnergyMuhammad FAHAD
 
Dr Dev Kambhampati | DOE- Steps to Improve Cybersecurity of SCADA Networks
Dr Dev Kambhampati | DOE- Steps to Improve Cybersecurity of SCADA NetworksDr Dev Kambhampati | DOE- Steps to Improve Cybersecurity of SCADA Networks
Dr Dev Kambhampati | DOE- Steps to Improve Cybersecurity of SCADA NetworksDr Dev Kambhampati
 
Azstec cyber-security-workbook
Azstec cyber-security-workbookAzstec cyber-security-workbook
Azstec cyber-security-workbookYulia Dianova
 
vmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepapervmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepaperTony Amaddio
 
NIST 800-125 a DRAFT (HyperVisor Security)
NIST 800-125 a DRAFT   (HyperVisor Security)NIST 800-125 a DRAFT   (HyperVisor Security)
NIST 800-125 a DRAFT (HyperVisor Security)David Sweigert
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysisCARMEN ALCIVAR
 
Solution managment and monitoring services.docx
Solution managment and monitoring services.docxSolution managment and monitoring services.docx
Solution managment and monitoring services.docxsaadatali65
 
HCLT Whitepaper : ITSM Approach for Clouds
HCLT Whitepaper : ITSM Approach for CloudsHCLT Whitepaper : ITSM Approach for Clouds
HCLT Whitepaper : ITSM Approach for CloudsHCL Technologies
 
SIP FINAL REPORT
SIP FINAL REPORTSIP FINAL REPORT
SIP FINAL REPORTRini Mahade
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 

Similar to Managing the CSIRT Infrastructure Components (20)

REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docxREAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
REAL-TIME INTEGRATION SYSTEMS Computer Systems Security .docx
 
Guide to intrusion detection
Guide to intrusion detectionGuide to intrusion detection
Guide to intrusion detection
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
 
RP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfRP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdf
 
Security and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 WhitepaperSecurity and Compliance In Microsoft Office 365 Whitepaper
Security and Compliance In Microsoft Office 365 Whitepaper
 
xddsfinalGFGSFDGFDGSDFFGFGFGFGFGFGFGFGFGFGFGFG
xddsfinalGFGSFDGFDGSDFFGFGFGFGFGFGFGFGFGFGFGFGxddsfinalGFGSFDGFDGSDFFGFGFGFGFGFGFGFGFGFGFGFG
xddsfinalGFGSFDGFDGSDFFGFGFGFGFGFGFGFGFGFGFGFG
 
White Paper: Indoor Positioning in Industry & Logistics
White Paper: Indoor Positioning in Industry & LogisticsWhite Paper: Indoor Positioning in Industry & Logistics
White Paper: Indoor Positioning in Industry & Logistics
 
A New Approach to Healthcare Security
A New Approach to Healthcare SecurityA New Approach to Healthcare Security
A New Approach to Healthcare Security
 
S4x20 Forescout Presentation
S4x20 Forescout Presentation S4x20 Forescout Presentation
S4x20 Forescout Presentation
 
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of EnergySteps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
 
Dr Dev Kambhampati | DOE- Steps to Improve Cybersecurity of SCADA Networks
Dr Dev Kambhampati | DOE- Steps to Improve Cybersecurity of SCADA NetworksDr Dev Kambhampati | DOE- Steps to Improve Cybersecurity of SCADA Networks
Dr Dev Kambhampati | DOE- Steps to Improve Cybersecurity of SCADA Networks
 
Azstec cyber-security-workbook
Azstec cyber-security-workbookAzstec cyber-security-workbook
Azstec cyber-security-workbook
 
vmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepapervmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepaper
 
NIST 800-125 a DRAFT (HyperVisor Security)
NIST 800-125 a DRAFT   (HyperVisor Security)NIST 800-125 a DRAFT   (HyperVisor Security)
NIST 800-125 a DRAFT (HyperVisor Security)
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysis
 
Solution managment and monitoring services.docx
Solution managment and monitoring services.docxSolution managment and monitoring services.docx
Solution managment and monitoring services.docx
 
HCLT Whitepaper : ITSM Approach for Clouds
HCLT Whitepaper : ITSM Approach for CloudsHCLT Whitepaper : ITSM Approach for Clouds
HCLT Whitepaper : ITSM Approach for Clouds
 
SIP FINAL REPORT
SIP FINAL REPORTSIP FINAL REPORT
SIP FINAL REPORT
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 

More from VICTOR MAESTRE RAMIREZ

Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
Intermediate Deep Learning with PyTorch - DataCamp
Intermediate Deep Learning with PyTorch - DataCampIntermediate Deep Learning with PyTorch - DataCamp
Intermediate Deep Learning with PyTorch - DataCampVICTOR MAESTRE RAMIREZ
 
Gestión de Incidentes de Cibersegurdad - Centro Criptológico Nacional
Gestión de Incidentes de Cibersegurdad - Centro Criptológico NacionalGestión de Incidentes de Cibersegurdad - Centro Criptológico Nacional
Gestión de Incidentes de Cibersegurdad - Centro Criptológico NacionalVICTOR MAESTRE RAMIREZ
 
Modernes Leistungsmanagement - Management
Modernes Leistungsmanagement - ManagementModernes Leistungsmanagement - Management
Modernes Leistungsmanagement - ManagementVICTOR MAESTRE RAMIREZ
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilVICTOR MAESTRE RAMIREZ
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampVICTOR MAESTRE RAMIREZ
 
Werteorientiertes Management - Management
Werteorientiertes Management - ManagementWerteorientiertes Management - Management
Werteorientiertes Management - ManagementVICTOR MAESTRE RAMIREZ
 
Artificial Intelligence for Business Leaders
Artificial Intelligence for Business LeadersArtificial Intelligence for Business Leaders
Artificial Intelligence for Business LeadersVICTOR MAESTRE RAMIREZ
 
Hands-on SQL for Data Science - EC-Council
Hands-on SQL for Data Science - EC-CouncilHands-on SQL for Data Science - EC-Council
Hands-on SQL for Data Science - EC-CouncilVICTOR MAESTRE RAMIREZ
 
Becoming a Network Security Engineer - EC-Council
Becoming a Network Security Engineer - EC-CouncilBecoming a Network Security Engineer - EC-Council
Becoming a Network Security Engineer - EC-CouncilVICTOR MAESTRE RAMIREZ
 
Implementing Docker Containers with Windows Server 2019
Implementing Docker Containers with Windows Server 2019Implementing Docker Containers with Windows Server 2019
Implementing Docker Containers with Windows Server 2019VICTOR MAESTRE RAMIREZ
 
Unit Testing for Data Science in Python - DataCamp
Unit Testing for Data Science in Python - DataCampUnit Testing for Data Science in Python - DataCamp
Unit Testing for Data Science in Python - DataCampVICTOR MAESTRE RAMIREZ
 
Project Management Foundations: Risk Management
Project Management Foundations: Risk ManagementProject Management Foundations: Risk Management
Project Management Foundations: Risk ManagementVICTOR MAESTRE RAMIREZ
 
Project Management Foundations: Communication
Project Management Foundations: CommunicationProject Management Foundations: Communication
Project Management Foundations: CommunicationVICTOR MAESTRE RAMIREZ
 
Project Management Foundations: Budgets
Project Management Foundations: BudgetsProject Management Foundations: Budgets
Project Management Foundations: BudgetsVICTOR MAESTRE RAMIREZ
 

More from VICTOR MAESTRE RAMIREZ (20)

Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
Intermediate Deep Learning with PyTorch - DataCamp
Intermediate Deep Learning with PyTorch - DataCampIntermediate Deep Learning with PyTorch - DataCamp
Intermediate Deep Learning with PyTorch - DataCamp
 
Gestión de Incidentes de Cibersegurdad - Centro Criptológico Nacional
Gestión de Incidentes de Cibersegurdad - Centro Criptológico NacionalGestión de Incidentes de Cibersegurdad - Centro Criptológico Nacional
Gestión de Incidentes de Cibersegurdad - Centro Criptológico Nacional
 
Modernes Leistungsmanagement - Management
Modernes Leistungsmanagement - ManagementModernes Leistungsmanagement - Management
Modernes Leistungsmanagement - Management
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-Council
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - Datacamp
 
Werteorientiertes Management - Management
Werteorientiertes Management - ManagementWerteorientiertes Management - Management
Werteorientiertes Management - Management
 
Artificial Intelligence for Business Leaders
Artificial Intelligence for Business LeadersArtificial Intelligence for Business Leaders
Artificial Intelligence for Business Leaders
 
Hands-on SQL for Data Science - EC-Council
Hands-on SQL for Data Science - EC-CouncilHands-on SQL for Data Science - EC-Council
Hands-on SQL for Data Science - EC-Council
 
Becoming a Network Security Engineer - EC-Council
Becoming a Network Security Engineer - EC-CouncilBecoming a Network Security Engineer - EC-Council
Becoming a Network Security Engineer - EC-Council
 
Implementing Docker Containers with Windows Server 2019
Implementing Docker Containers with Windows Server 2019Implementing Docker Containers with Windows Server 2019
Implementing Docker Containers with Windows Server 2019
 
Unit Testing for Data Science in Python - DataCamp
Unit Testing for Data Science in Python - DataCampUnit Testing for Data Science in Python - DataCamp
Unit Testing for Data Science in Python - DataCamp
 
Project Management Foundations: Risk Management
Project Management Foundations: Risk ManagementProject Management Foundations: Risk Management
Project Management Foundations: Risk Management
 
Project Management Foundations: Communication
Project Management Foundations: CommunicationProject Management Foundations: Communication
Project Management Foundations: Communication
 
Project Management Foundations: Teams
Project Management Foundations: TeamsProject Management Foundations: Teams
Project Management Foundations: Teams
 
Project Management Foundations: Budgets
Project Management Foundations: BudgetsProject Management Foundations: Budgets
Project Management Foundations: Budgets
 

Recently uploaded

Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...shivangimorya083
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja Nehwal
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证obuhobo
 
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...amitlee9823
 
VIP Call Girls Service Film Nagar Hyderabad Call +91-8250192130
VIP Call Girls Service Film Nagar Hyderabad Call +91-8250192130VIP Call Girls Service Film Nagar Hyderabad Call +91-8250192130
VIP Call Girls Service Film Nagar Hyderabad Call +91-8250192130Suhani Kapoor
 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfKen Fuller
 
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Madekojalkojal131
 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectPriyanshuRawat56
 
Top Rated Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士obuhobo
 
Internship Report].pdf iiwmoosmsosmshkssmk
Internship Report].pdf iiwmoosmsosmshkssmkInternship Report].pdf iiwmoosmsosmshkssmk
Internship Report].pdf iiwmoosmsosmshkssmkSujalTamhane
 
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call GirlsDelhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girlsshivangimorya083
 
Motilal Oswal Gift City Fund PPT - Apr 2024.pptx
Motilal Oswal Gift City Fund PPT - Apr 2024.pptxMotilal Oswal Gift City Fund PPT - Apr 2024.pptx
Motilal Oswal Gift City Fund PPT - Apr 2024.pptxMaulikVasani1
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubaikojalkojal131
 
Résumé (2 pager - 12 ft standard syntax)
Résumé (2 pager -  12 ft standard syntax)Résumé (2 pager -  12 ft standard syntax)
Résumé (2 pager - 12 ft standard syntax)Soham Mondal
 
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceanilsa9823
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳anilsa9823
 

Recently uploaded (20)

VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
Delhi Call Girls Preet Vihar 9711199171 ☎✔👌✔ Whatsapp Body to body massage wi...
 
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
Pooja 9892124323, Call girls Services and Mumbai Escort Service Near Hotel Sa...
 
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
女王大学硕士毕业证成绩单(加急办理)认证海外毕业证
 
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Patparganj 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
 
VIP Call Girls Service Film Nagar Hyderabad Call +91-8250192130
VIP Call Girls Service Film Nagar Hyderabad Call +91-8250192130VIP Call Girls Service Film Nagar Hyderabad Call +91-8250192130
VIP Call Girls Service Film Nagar Hyderabad Call +91-8250192130
 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
 
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls South Delhi 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effect
 
Top Rated Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Deccan ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
内布拉斯加大学林肯分校毕业证录取书( 退学 )学位证书硕士
 
Internship Report].pdf iiwmoosmsosmshkssmk
Internship Report].pdf iiwmoosmsosmshkssmkInternship Report].pdf iiwmoosmsosmshkssmk
Internship Report].pdf iiwmoosmsosmshkssmk
 
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call GirlsDelhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
 
Motilal Oswal Gift City Fund PPT - Apr 2024.pptx
Motilal Oswal Gift City Fund PPT - Apr 2024.pptxMotilal Oswal Gift City Fund PPT - Apr 2024.pptx
Motilal Oswal Gift City Fund PPT - Apr 2024.pptx
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
 
Résumé (2 pager - 12 ft standard syntax)
Résumé (2 pager -  12 ft standard syntax)Résumé (2 pager -  12 ft standard syntax)
Résumé (2 pager - 12 ft standard syntax)
 
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gosainganj Lucknow best sexual service
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
 

Managing the CSIRT Infrastructure Components

  • 1. Managing the CSIRT Infrastructure Components Table of Contents Notices ............................................................................................................................................ 2 Managing the CSIRT Infrastructure................................................................................................. 2 Purpose ........................................................................................................................................... 3 Infrastructure Components ............................................................................................................ 4 Outline ............................................................................................................................................ 5 Page 1 of 5
  • 2. Notices 41 Managing CSIRTs © 2020 Carnegie Mellon University [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. Managing the CSIRT Infrastructure 1 Managing CSIRTs © 2020 Carnegie Mellon University [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. Managing the CSIRT Infrastructure Managing Computer Security Incident Response Teams (CSIRTs) **001 Hello, This module is Managing the CSIRT Infrastructure. Page 2 of 5
  • 3. Purpose 2 Managing CSIRTs © 2020 Carnegie Mellon University [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. Purpose To provide an overview of the components of a CSIRT infrastructure To discuss various issues in managing this infrastructure To outline how and why to protect CSIRT data and information **002 The purpose of this module is to provide an overview of the components that make up the CSIRT infrastructure, not only computer security but laboratory space, office space, what have you, to discuss the various issues related to managing this infrastructure and to outline how and why to protect the CSIRT data and information that you have within your organization. Page 3 of 5
  • 4. Infrastructure Components 3 Managing CSIRTs © 2020 Carnegie Mellon University [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. Infrastructure Components The CSIRT infrastructure includes • physical location and security of CSIRT staff and data • staff office and home equipment • CSIRT networks, systems, and internal/external defenses such as routers, firewalls, and IDS • CSIRT tools and applications to support incident handling and other provided services - databases, data repositories, and data analysis tools for storing CSIRT and incident information - mechanisms or applications for secure email and voice communications - test labs or test environments for analyzing malicious code and vulnerabilities • organizational data classification schemas **003 So the infrastructure consists of all of these things: the physical location and security of the staff and the data; this includes office staff and especially these days home equipment, where people work remotely not only from home but they may relocate temporarily for other reasons; you need to take into account all of those places. The CSIRT network; systems; internal and external defenses, meaning routers, firewalls, intrusion detection systems, intrusion prevention systems; and then also all of the tools and applications and the databases that those tools are used to create. Whatever data repositories, data analysis tools, incident information; the mechanisms for secure email like PGP keys, voice communications, secure voice, secure fax, what have you; and then also test labs where you may have Page 4 of 5
  • 5. malicious code or you're exploring vulnerabilities. All of these need to be secured, taking into account your data classification schemes. Outline 4 Managing CSIRTs © 2020 Carnegie Mellon University [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. Outline Data security Physical security Equipment Networks and systems CSIRT tools **004 When we talk about securing the infrastructure for a CSIRT, we're really talking about these five things. We're talking about securing data that the CSIRT gets its hands on, physical security of office space, etcetera, the equipment, networks and systems, and finally CSIRT tools. Now, as has been said before, data security is particularly important because CSIRTs get intellectual property from their constituency and log files which can contain credentials as well as other sensitive information. So this makes a CSIRT a target for intruders to gain access to information of their constituencies that can then be used to attack those constituencies. Page 5 of 5