SlideShare a Scribd company logo
1 of 19
[Type here] [Type here] [Type here]
Cyber Incident Response
Denial of Service Playbook v2.3
[Type here] [Type here] [Type here]
Document Control
Title Denial of Service Playbook
Version 2.3
Date Issued 20/01/2020
Status Draft
Document owner Scottish Government
Creator name
Creator organisation name NCC Group
Subject category Cyber Incident Response Management
Access constraints
Document Revision History
Version Date Author Summary of changes
2.3 22/01/2020 SG CRU Generic Version Created from Public Sector Playbook
[Type here] [Type here] [Type here]
Contents
1. Introduction................................................................................................................................................................................................... 4
1.1. Overview................................................................................................................................................................................................ 4
1.2. Purpose ................................................................................................................................................................................................. 4
1.3. Denial of Service Definition.................................................................................................................................................................... 4
1.4. Scope .................................................................................................................................................................................................... 5
1.5. Review Cycle......................................................................................................................................................................................... 5
2. Preparation Phase ........................................................................................................................................................................................ 6
3. Detect ........................................................................................................................................................................................................... 8
4. Remediation – Contain, Eradicate and Recover.......................................................................................................................................... 13
5. Post Incident............................................................................................................................................................................................... 15
6. Appendix A: DoS Attack Types ................................................................................................................................................................... 17
7. Appendix B: Flow Diagram.......................................................................................................................................................................... 20
[Type here] [Type here] [Type here]
1. Introduction
1.1. Overview
In the event of a cyber incident, it is important that the organisation is able to respond, mobilise and execute an appropriate level of response to
limit the impact on the brand, value, service delivery and the public, client and customer confidence. Although all cyber incidents are different in
their nature and technologies used, it is possible to group common cyber incident types and methodologies together. This is in order to provide
an appropriate and timely response depending on the cyber incident type. Incident specific playbooks provide incident managers and stakeholders
with a consistent approach to follow when remediating a cyber incident.
References are made to both a Core IT CIRT and a CIRT within this document. This is in recognition the playbook will be used by organisations
of different sizes. Some may initially manage an incident with a small response team within IT services but where there is a confirmed compromise,
this may be escalated to an extended level CIRT comprised of members of the organisation outside IT services who will deal with agreed
categories of compromise. The Playbook as with the Cyber Incident Response Plan (CIRP) will require to be adjusted to reflect the organisational
make up.
Playbooks describe the activities of those directly involved in managing specific cyber incidents. However, it is important to acknowledge the
speed at which cyber incidents can escalate and become a significant business disruptor requiring both business continuity and consequence
management considerations. Early consideration should be given to engaging Business Continuity, Resilience and Policy Area Leads in order
that the wider issues can be effectively managed. Business Continuity and Resilience leads within the organisation must therefore be familiar
with the Cyber Incident Response Plan (CIRP) and Playbooks and how they link to wider incident response arrangements.
1.2. Purpose
The purpose of the Cyber incident Response: Denial of Service (DoS) Playbook is to define activities that should be considered when detecting,
analysing and remediating a DoS attack. The playbook also identifies the key stakeholders that may be required to undertake these specific
activities.
1.3. Denial of Service Definition
A denial-of-service (DoS) attack is the intentional paralysing of a computer network by flooding it with data to make a machine or network resource
unavailable to its intended users by temporarily or indefinitely disrupting services.
See Appendix A.
[Type here] [Type here] [Type here]
1.4. Scope
This document has been designed for the sole use of the first responders such as the Service Desk team when responding to a cyber incident.
It is not standalone and must be used alongside your Cyber Incident Response Plan (CIRP).
1.5. Review Cycle
This document is to be reviewed for continued relevancy by the Cyber Incident Response Team (CIRT) lead at least once every 12 months;
following any major cyber incidents, a change of vendor, or the acquisition of new security services.
[Type here] [Type here] [Type here]
2. Preparation Phase
Preparation Phase
Phase
objectives
The preparation phase has the following objectives:
ī‚ˇ Prepare to respond to cyber incident in a timely and effective manner;
ī‚ˇ Inform employees of their role in remediating a DoS incident including reporting mechanisms.
Activity Description Stakeholders
Prepare to
respond
Activities may include, but are not limited to:
Review and rehearse cyber incident response procedures including technical and business
roles and responsibilities, escalation to major incident management where necessary.
ī‚ˇ Head of Information
Governance
ī‚ˇ CISO
ī‚ˇ Head of IT
ī‚ˇ Information Security
Manager / ISO
ī‚ˇ Team Leader
ī‚ˇ Service Delivery Manager
ī‚ˇ Service Desk
Analysts/Technicians
ī‚ˇ Legal Team
ī‚ˇ Communications Team
ī‚ˇ Police Area Lead
ī‚ˇ Resilience Lead
Business Continuity Lead
Review recent cyber incidents and the outputs.
ī‚ˇ Information Security
Manager
[Type here] [Type here] [Type here]
Review threat intelligence for threats to the organisation, brands and the sector, as well as
common patterns and newly developing risks and vulnerabilities.
ī‚ˇ Information Security
Manager
Ensure appropriate access to any necessary documentation and information, including out-
of-hours access, for the following:
ī‚ˇ CIRP;
ī‚ˇ <<Network Architecture Diagrams>>; ( insert Links)
ī‚ˇ <<Data Flow Diagrams>>.( insert Links)
ī‚ˇ Information Security
Manager
Identify and obtain the services of a 3rd
party Cyber Forensic provider.
ī‚ˇ Information Security
Manager
Define Threat and Risk Indicators and Alerting pattern within the organisation’s security
information and event management (SIEM) solution.
ī‚ˇ Information Security
Manager
Activity Description Stakeholders
Inform
employees
Activities may include, but are not limited to:
Conduct regular awareness campaigns to highlight cyber security risks faced by employees,
including:
ī‚ˇ Phishing attacks and malicious emails;
ī‚ˇ Ransomware;
ī‚ˇ DoS attacks;
ī‚ˇ Reporting a suspected cyber incident.
ī‚ˇ Head of IT
ī‚ˇ Information Security
Manager
ī‚ˇ Resilience Lead
ī‚ˇ Business Continuity Lead
Ensure regular security training is mandated for those employees managing personal,
confidential or high risk data and systems.
ī‚ˇ Head of IT
ī‚ˇ Information Security
Manager
ī‚ˇ HR
ī‚ˇ L&D Department
[Type here] [Type here] [Type here]
ī‚ˇ Resilience Lead
ī‚ˇ Business Continuity Lead
3. Detect
Detection Phase
Phase objectives
The detection phase has the following objectives:
ī‚ˇ Detect and report a DoS attack;
ī‚ˇ Complete initial investigation of the attack;
ī‚ˇ Report the incident to the correct team as a cyber incident.
Activity Description Stakeholders
Detect and report
the incident
Activities may include, but are not limited to:
Confirm system is under attack:
ī‚ˇ Confirming a system is under attack rather than heavy load is often only
possible if the system has previously been baselined to establish normal
operational loads. This must account for changes in load over time as some
systems will only be used at financial day/month/year end.
ī‚ˇ Consult with the Product Manager to establish whether the current condition
is within acceptable parameters to be considered in service.
ī‚ˇ Information Security Manager
ī‚ˇ Product Manager
ī‚ˇ Core IT CIRT
[Type here] [Type here] [Type here]
If a normal system load exists then it can be compared against the current traffic
seen. The review should identify if there are any common traffic patterns, and will
need the input from network specialists. DoS attack packets often have a common
element, it may help to familiarise yourself with the current most prevalent
examples in Appendix A: DoS Attack Types. It will be necessary to work with
network engineers who have diagnostic tools/facilities (such as Netflow) to capture
and analyse incoming packets to the affected system(s) to identify:
ī‚ˇ Common sending IP address;
ī‚ˇ Common port;
ī‚ˇ Common protocol;
ī‚ˇ Common user agent;
ī‚ˇ Common payload; and
ī‚ˇ Common packet flags.
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
Report the cyber incident via the Service Desk. If a ticket does not exist already,
raise a ticket containing minimum information.
To report an incident, follow the process defined in the CIRP (insert link to CIRP).
ī‚ˇ Information Security Manage
ī‚ˇ Core IT CIRT
Assign Classification to the cyber incident, based upon available information
related to the DoS attack and the incident types (see CIRP).
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
Report the Cyber Incident in accordance with the organisation’s CIRP.
Consider the Intelligence value to other organisations and share on the CiSP
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
Where appropriate consider reporting requirements to Information Commissioner’s
Office (ICO), relevant regulator and or Competent Authority (NISD), National Cyber
Security Centre (NCSC), and / or Police Scotland
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
[Type here] [Type here] [Type here]
Activity Description Stakeholders
Initial
investigation of
the incident
Activities may include, but are not limited to:
Mobilise the Core IT CIRT to begin initial investigation of the cyber incident (see
CIRP for staff contact details for further information).
ī‚ˇ Information Security Manager
ī‚ˇ Ciore IT CIRT
ī‚ˇ CIRT
The following may also be
included in the CIRT where
appropriate for the incident:
ī‚ˇ Service Desk Analysts
ī‚ˇ Server Desk Technicians
ī‚ˇ Server Team
ī‚ˇ Mobile Device Team
Collate initial incident data including as a minimum for the following;
ī‚ˇ What systems and/or applications are being targeted?
ī‚ˇ What impact is it having on them and, since you have identified the attack, is
it getting worse, and is there a pattern to the attack?
ī‚ˇ Is the attack spreading or is it still confined to the same systems/applications?
ī‚ˇ What impact is this having on the company’s bandwidth?
ī‚ˇ Has the attack spread to any shared components, or from what has been
seen so far, could it extend to any shared components? (e.g. infrastructure
components, directory services etc.)
ī‚ˇ Is the attack affecting internal corporate systems and/or has the attack
spread into the corporate network?
ī‚ˇ Have any support calls been received from any customers?
ī‚ˇ Does it appear to distract from a more targeted exploit that could result in a
breach of data from other company systems or the company systems
targeted by the DoS?
ī‚ˇ Has any communication been received from a purported attacker? (via social
media, email, phone call etc.)
ī‚ˇ Head of IT
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
[Type here] [Type here] [Type here]
ī‚ˇ A timeline of when the attack was first detected
ī‚ˇ A list of the services that are known to be affected
ī‚ˇ Confirm whether systems are accessible internally and externally
ī‚ˇ Ensure you are clear whether systems are offline or operating with reduced
performance
ī‚ˇ Details of the type attack (if known at this stage)
Research Threat Intelligence sources and consider Cyber Security Information
Sharing Partnership (CiSP) submission to gain further intelligence and support
mitigation by others.
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
Review cyber incident categorisation to validate the cyber incident type as a DoS
attack and assess the incident priority, based upon the initial investigation. (See
CIRP for Incident Severity Matrix)
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
ī‚ˇ Resilience Lead
ī‚ˇ Business Continuity Lead
Activity Description Stakeholders
Incident reporting
Activities may include, but are not limited to:
Report the cyber incident in accordance with the organisation’s CIRP.
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
Report the Cyber Incident in accordance with the organisation’s CIRP.
Consider the Intelligence value to other organisations and share on the CiSP
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
[Type here] [Type here] [Type here]
Where appropriate consider reporting requirements to Information Commissioner’s
Office (ICO), relevant Regulator and or Competent Authority (NISD), National
Cyber Security Centre (NCSC) and / or Police Scotland
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
Escalate using the appropriate steps in the CIRP.
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
ī‚ˇ Resilience Lead
ī‚ˇ Business Continuity Lead
ī‚ˇ Policy Lead
Activity Description Stakeholders
Establish the
requirement for a
full forensic
investigation
Activities may include, but are not limited to:
Consider conducting a full forensic investigation, on the advice of legal counsel.
All evidence handling should be done in line with the Association of Chief Police
Officers (ACPO) Good Practice Guide for Digital Evidence.
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
[Type here] [Type here] [Type here]
4. Remediation – Contain, Eradicate and Recover
Remediation Phase
Phase objectives
The remediation phase has the following objectives:
ī‚ˇ Contain the effects of the DoS attack on the targeted systems;
ī‚ˇ Recover affected systems and services back to a Business As Usual (BAU) state.
Activity Description Stakeholders
Containment
Initial containment considerations include:
If the attack is disabling services, are there any immediate steps that could be taken
to regain some level of service – e.g. requesting the Internet Service Provider (ISP)
to drop all traffic targeting the affected service/application. In an absolute extreme
case, if it is imperative to maintain internal services, then all traffic from the ISP
could be blocked (Note, this will have implications including: potentially loss of
email, Internet access, customer access).
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
Consideration should be given to whether the Business Continuity Plan should be
enacted. If a decision is made to use a different data centre, it should also be borne
in mind that the attack may follow to the new location.
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
ī‚ˇ Business Continuity Lead
Once an analysis of the traffic has been completed, the company may be able to
filter traffic at the border. If the attack is focussed on maximising computer resource
usage of the target (such as a Slowloris attack) then this may be effective.
However, if, the attacker is looking to simply overwhelm the internet connection
with excessive network packets this may not offer a viable defence.
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
[Type here] [Type here] [Type here]
Placing IP restrictions on sensitive services is an effective method to reduce the
impact of traffic.
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
Segregation of internet services; separate internal email and web traffic from
product services to reduce the impact.
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
The network team should contact the ISP and discuss what filtering they can
provide. The contractual relationship with the ISP should identify any actions they
are obliged to take. As a DoS attack tends to impact everyone using the same
equipment, the ISP may include contractual options to cut the company
connections in order to protect other customers from the attack. This would then
impact all of the company’s services using that network link.
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
Inform stakeholders of the progress of containment activities in accordance with
the CIRP.
ī‚ˇ Information Security Manager
ī‚ˇ CIRT
ī‚ˇ Resilience Lead
ī‚ˇ Business Continuity Lead
ī‚ˇ Policy Areas Lead
ī‚ˇ Corporate Comms
Activity Description Stakeholders
Eradication
Activities may include, but are not limited to:
ī‚ˇ Systems patched to protect against vulnerabilities exploited in the attack.
ī‚ˇ Network segmentation implemented.
ī‚ˇ Removal of vulnerable systems/services.
ī‚ˇ Blacklist attack source IPs.
ī‚ˇ Whitelist of source IPs and services allowed into the network.
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
[Type here] [Type here] [Type here]
5. Post Incident
Post-Incident Activities Phase
Phase objectives
The post-incident activities phase has the following objectives:
ī‚ˇ Complete an incident report including all incident details and activities;
ī‚ˇ Complete the lessons identified and problem management process;
ī‚ˇ Publish appropriate internal and external communications.
Activity Description Stakeholders
Incident reporting
Draft a post-incident report that includes the following details as a minimum:
ī‚ˇ Details of the cyber incident identified and remediated across the network to
include timings, type and location of incident as well as the effect on users;
ī‚ˇ Activities that were undertaken by relevant resolver groups, service providers
and business stakeholders that enabled normal business operations to be
resumed;
ī‚ˇ Recommendations where any aspects of people, process or technology could
be improved across the organisation to help prevent a similar cyber incident
from reoccurring, as part of a formalised lessons identified process.
ī‚ˇ Senior Stakeholders
ī‚ˇ Head of Information
Governance
ī‚ˇ Head of IT
ī‚ˇ Audit Committee
ī‚ˇ Information Security Manager
ī‚ˇ Resilience Lead
ī‚ˇ Business Continuity Lead
ī‚ˇ Policy Area Lead
Lessons
Identified &
Problem
Management
Complete the formal lessons identified process to feedback into future preparation
activities.
ī‚ˇ Information Security Manager
ī‚ˇ CIRT
[Type here] [Type here] [Type here]
Consider sharing lessons identified with appropriate external stakeholders
ī‚ˇ Information Security Manager
ī‚ˇ CIRT
ī‚ˇ Resilience Lead
ī‚ˇ Business Continuity Lead
ī‚ˇ Police Area Lead
Conduct root cause analysis to identify and remediate underlying vulnerabilities.
ī‚ˇ Information Security Manager
ī‚ˇ Core IT CIRT
ī‚ˇ CIRT
Human
Resources
Review staff welfare; working hours, overtime, time off in lieu (TOIL) and expenses.
ī‚ˇ Information Security Manager
ī‚ˇ HR
Communications
Activities may include, but are not limited to:
Publish internal communications in line with the communications strategy to inform
and educate employees on DoS attacks and security awareness.
ī‚ˇ Information Security Manager
ī‚ˇ CIRT
ī‚ˇ Communications
Published external communications, if appropriate, in line with the communications
strategy to provide advice to customers, engage with the market, and inform press
of the cyber incident.
These communications should provide key information of the cyber incident without
leaving the organisation vulnerable or inciting further DoS attacks.
ī‚ˇ Head of IT
ī‚ˇ Information Security Manager
ī‚ˇ Communications Team
ī‚ˇ Resilience Lead
ī‚ˇ Business Continuity Lead
ī‚ˇ Policy Area Lead
[Type here] [Type here] [Type here]
6. Appendix A: DoS Attack Types
Name Description
HTTP Flood
A type of resource exhaustion attack. The attacker sends a large volume of apparently legitimate requests
for a web page. The server is simply unable to respond to the number of requests. This type of attack is
very common as it requires very little knowledge to invoke.
ICMP (Ping) Flood
A type of volumetric attack, and sub-type of UDP flood. The attacker sends a large amount of ICMP Ping
packets (typically used to confirm networks are operating correctly) with the intent of using up the target’s
bandwidth.
Network Time Protocol (NTP)
Amplification
A type of volumetric attack. An attacker manipulates a third party NTP service that has been left exposed
on the internet, pretending to make requests from the target. The NTP server responds to the requests
with its normal packets. What makes this attack work is that the attacker sends 1 maliciously crafted packet
to the NTP server and by design the NTP server responds by sending 200 packets to the target, believing
that it had asked for them.
Ping of Death ‘POD’
A type of volumetric attack. Similar to the ICMP flood above, but this time the packet sent is deliberately
crafted to be larger than the system was designed to cope with. Older systems such as the original version
of Windows 98 would immediately crash when they received the packet. Modern systems were thought to
discard this attack vector automatically, but had only introduced controls for the older IPv4. With IPv6 it has
returned with unpatched Microsoft Windows 2012 confirmed as vulnerable to PODv6.
Slowloris
A type of resource exhaustion attack. This is unusual in DoS in that it is targeted and can overwhelm a
single machine without affecting others. It can be used as a distraction whilst an attacker’s true activity
carries on unnoticed by the IT team busy trying to fix a rebooting web server.
The attack sends packets that open a large number of requests with the server, but once the server starts
responding the system asks the server to slow down transmission, stalling the connection and preventing
the server from closing the connections. Whilst it is slowing down the existing connections, the attack
typically sends additional requests to open yet more connections until the server has run out of memory. If
[Type here] [Type here] [Type here]
a legitimate client is able to get a response from the server it may report HTTP error 503: The service is
unavailable.
SNMP Flood
A type of volumetric attack. Similar to the NTP flood. This attack has a lower rate of packets returned so is
less effective, and consequently less common but is expected to be seen more as fewer NTP servers are
left open to the internet.
SYN Flood
A type of resource exhaustion attack. This leverages weaknesses in TCP, one of the underlying protocols
on the internet to use up all resources in the operating system of the target. These resources are often
strictly limited by the hardware available and, as the attack is against the operating system, the attacker
can easily identify what is the most effective method by performing test runs themselves against their own
systems.
UDP Flood
A type of volumetric attack. The attacker sends a large amount of session-less packets to the target IP
addresses with the intent of using up the target’s bandwidth. These may be directed to a single port or
multiple ports. Typically results in the clients receiving an ICMP Destination Unreachable response when
they try to access the service.
Zero Day Attacks These attacks are characterised by their lack of characterisation. They are brand new and may target
previously believed secure systems.
[Type here] [Type here] [Type here]
Denial of Service Playbook
Detect
Prepare
Analyse
Remediation
Post
Incident
Prepare
Review and
rehearse CIRP
Review recent cyber
incidents and
outputs
Review threat
intelligence feeds,
latest vulnerabilities
and risks
Ensure access to CIRP,
Data Flow Diagrams
and appropriate
documentation
Maintain awareness
with employees
through security
awareness training
DoS Attack
Typical DoS symptoms:
ī‚ˇ Slow access to files
ī‚ˇ A long-term inability to access a
particular website
ī‚ˇ Internet disconnection
ī‚ˇ Problems accessing all websites
ī‚ˇ Excessive amount of spam emails
Mobilise the CIRT
and verify it is a DoS
attack
Collate initial
incident data and
classify cyber
incident
Escalate in
accordance with the
CIRP
Consider mobilising
forensic readiness
capability
Engage technical
staff
Confirm systems
and/or applications
being targeted
Scope the attack:
ī‚ˇ Is the attack spreading?
ī‚ˇ What impact is it having on the
organisation?
ī‚ˇ Does it appear to be a distraction
attempt for a more targeted attack
on personal data?
Collate a timeline of
events from when
the attack was first
detected
Collate details on
the type of DoS
attack if known at
this stage
If personal data is at
risk consider
engaging the DPO
and reporting to the
ICO
Implement immediate
steps to mitigate e.g.
request ISP to drop all
traffic targeting
affected systems/
applications
Consider whether
the Business
Continuity Plan
should be enacted
Consider filtering
traffic at the border
(engage ISP)
Consider placing IP
restrictions on sensitive/
critical systems/
applications
Patch systems/
applications to
protect against
vulnerabilities
Restore serviced to
BAU
Draft post-incident
report
Complete formal
lessons learnt
process defined in
CIRP
Publish internal
communications to
educate employees on
DoS attacks
Updates to cyber
incident
documentation
where required
End
7. Appendix B: Flow Diagram

More Related Content

Similar to Cyber+Incident+Response+-+Generic+Denial+of+Service+Playbook+v2.3.docx

Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docxRunning Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
susanschei
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
Iaetsd Iaetsd
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Alireza Ghahrood
 
Cybersecurity and Policy Kafayat Omotayo WRTG 112
Cybersecurity and Policy Kafayat Omotayo WRTG 112 Cybersecurity and Policy Kafayat Omotayo WRTG 112
Cybersecurity and Policy Kafayat Omotayo WRTG 112
OllieShoresna
 
Network Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recNetwork Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster rec
rosu555
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docxDisaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
duketjoy27252
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 

Similar to Cyber+Incident+Response+-+Generic+Denial+of+Service+Playbook+v2.3.docx (20)

What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
 
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docxRunning Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
Running Head CYBER SECURITY IMPROVEMENT AREASCYBER SECURITY.docx
 
Comparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment ToolsComparative study of Cyber Security Assessment Tools
Comparative study of Cyber Security Assessment Tools
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdf
 
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTSMANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
 
Iaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems usingIaetsd design and implementation of secure cloud systems using
Iaetsd design and implementation of secure cloud systems using
 
Availability and Business Resiliency Strategies
Availability and Business Resiliency StrategiesAvailability and Business Resiliency Strategies
Availability and Business Resiliency Strategies
 
Tft2 Task3 Essay
Tft2 Task3 EssayTft2 Task3 Essay
Tft2 Task3 Essay
 
Cyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK GovernmentCyber Essentials Requirements for UK Government
Cyber Essentials Requirements for UK Government
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
 
Cybersecurity and Policy Kafayat Omotayo WRTG 112
Cybersecurity and Policy Kafayat Omotayo WRTG 112 Cybersecurity and Policy Kafayat Omotayo WRTG 112
Cybersecurity and Policy Kafayat Omotayo WRTG 112
 
Network Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recNetwork Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster rec
 
Cyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineCyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated Discipline
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docxDisaster and RecoveryBusiness Impact AnalysisSystem .docx
Disaster and RecoveryBusiness Impact AnalysisSystem .docx
 
A Model Supporting Business Continuity Auditing And Planning In Information S...
A Model Supporting Business Continuity Auditing And Planning In Information S...A Model Supporting Business Continuity Auditing And Planning In Information S...
A Model Supporting Business Continuity Auditing And Planning In Information S...
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
World-Class Incident Response Management
World-Class Incident Response ManagementWorld-Class Incident Response Management
World-Class Incident Response Management
 
111.pptx
111.pptx111.pptx
111.pptx
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 

Cyber+Incident+Response+-+Generic+Denial+of+Service+Playbook+v2.3.docx

  • 1. [Type here] [Type here] [Type here] Cyber Incident Response Denial of Service Playbook v2.3
  • 2. [Type here] [Type here] [Type here] Document Control Title Denial of Service Playbook Version 2.3 Date Issued 20/01/2020 Status Draft Document owner Scottish Government Creator name Creator organisation name NCC Group Subject category Cyber Incident Response Management Access constraints Document Revision History Version Date Author Summary of changes 2.3 22/01/2020 SG CRU Generic Version Created from Public Sector Playbook
  • 3. [Type here] [Type here] [Type here] Contents 1. Introduction................................................................................................................................................................................................... 4 1.1. Overview................................................................................................................................................................................................ 4 1.2. Purpose ................................................................................................................................................................................................. 4 1.3. Denial of Service Definition.................................................................................................................................................................... 4 1.4. Scope .................................................................................................................................................................................................... 5 1.5. Review Cycle......................................................................................................................................................................................... 5 2. Preparation Phase ........................................................................................................................................................................................ 6 3. Detect ........................................................................................................................................................................................................... 8 4. Remediation – Contain, Eradicate and Recover.......................................................................................................................................... 13 5. Post Incident............................................................................................................................................................................................... 15 6. Appendix A: DoS Attack Types ................................................................................................................................................................... 17 7. Appendix B: Flow Diagram.......................................................................................................................................................................... 20
  • 4. [Type here] [Type here] [Type here] 1. Introduction 1.1. Overview In the event of a cyber incident, it is important that the organisation is able to respond, mobilise and execute an appropriate level of response to limit the impact on the brand, value, service delivery and the public, client and customer confidence. Although all cyber incidents are different in their nature and technologies used, it is possible to group common cyber incident types and methodologies together. This is in order to provide an appropriate and timely response depending on the cyber incident type. Incident specific playbooks provide incident managers and stakeholders with a consistent approach to follow when remediating a cyber incident. References are made to both a Core IT CIRT and a CIRT within this document. This is in recognition the playbook will be used by organisations of different sizes. Some may initially manage an incident with a small response team within IT services but where there is a confirmed compromise, this may be escalated to an extended level CIRT comprised of members of the organisation outside IT services who will deal with agreed categories of compromise. The Playbook as with the Cyber Incident Response Plan (CIRP) will require to be adjusted to reflect the organisational make up. Playbooks describe the activities of those directly involved in managing specific cyber incidents. However, it is important to acknowledge the speed at which cyber incidents can escalate and become a significant business disruptor requiring both business continuity and consequence management considerations. Early consideration should be given to engaging Business Continuity, Resilience and Policy Area Leads in order that the wider issues can be effectively managed. Business Continuity and Resilience leads within the organisation must therefore be familiar with the Cyber Incident Response Plan (CIRP) and Playbooks and how they link to wider incident response arrangements. 1.2. Purpose The purpose of the Cyber incident Response: Denial of Service (DoS) Playbook is to define activities that should be considered when detecting, analysing and remediating a DoS attack. The playbook also identifies the key stakeholders that may be required to undertake these specific activities. 1.3. Denial of Service Definition A denial-of-service (DoS) attack is the intentional paralysing of a computer network by flooding it with data to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services. See Appendix A.
  • 5. [Type here] [Type here] [Type here] 1.4. Scope This document has been designed for the sole use of the first responders such as the Service Desk team when responding to a cyber incident. It is not standalone and must be used alongside your Cyber Incident Response Plan (CIRP). 1.5. Review Cycle This document is to be reviewed for continued relevancy by the Cyber Incident Response Team (CIRT) lead at least once every 12 months; following any major cyber incidents, a change of vendor, or the acquisition of new security services.
  • 6. [Type here] [Type here] [Type here] 2. Preparation Phase Preparation Phase Phase objectives The preparation phase has the following objectives: ī‚ˇ Prepare to respond to cyber incident in a timely and effective manner; ī‚ˇ Inform employees of their role in remediating a DoS incident including reporting mechanisms. Activity Description Stakeholders Prepare to respond Activities may include, but are not limited to: Review and rehearse cyber incident response procedures including technical and business roles and responsibilities, escalation to major incident management where necessary. ī‚ˇ Head of Information Governance ī‚ˇ CISO ī‚ˇ Head of IT ī‚ˇ Information Security Manager / ISO ī‚ˇ Team Leader ī‚ˇ Service Delivery Manager ī‚ˇ Service Desk Analysts/Technicians ī‚ˇ Legal Team ī‚ˇ Communications Team ī‚ˇ Police Area Lead ī‚ˇ Resilience Lead Business Continuity Lead Review recent cyber incidents and the outputs. ī‚ˇ Information Security Manager
  • 7. [Type here] [Type here] [Type here] Review threat intelligence for threats to the organisation, brands and the sector, as well as common patterns and newly developing risks and vulnerabilities. ī‚ˇ Information Security Manager Ensure appropriate access to any necessary documentation and information, including out- of-hours access, for the following: ī‚ˇ CIRP; ī‚ˇ <<Network Architecture Diagrams>>; ( insert Links) ī‚ˇ <<Data Flow Diagrams>>.( insert Links) ī‚ˇ Information Security Manager Identify and obtain the services of a 3rd party Cyber Forensic provider. ī‚ˇ Information Security Manager Define Threat and Risk Indicators and Alerting pattern within the organisation’s security information and event management (SIEM) solution. ī‚ˇ Information Security Manager Activity Description Stakeholders Inform employees Activities may include, but are not limited to: Conduct regular awareness campaigns to highlight cyber security risks faced by employees, including: ī‚ˇ Phishing attacks and malicious emails; ī‚ˇ Ransomware; ī‚ˇ DoS attacks; ī‚ˇ Reporting a suspected cyber incident. ī‚ˇ Head of IT ī‚ˇ Information Security Manager ī‚ˇ Resilience Lead ī‚ˇ Business Continuity Lead Ensure regular security training is mandated for those employees managing personal, confidential or high risk data and systems. ī‚ˇ Head of IT ī‚ˇ Information Security Manager ī‚ˇ HR ī‚ˇ L&D Department
  • 8. [Type here] [Type here] [Type here] ī‚ˇ Resilience Lead ī‚ˇ Business Continuity Lead 3. Detect Detection Phase Phase objectives The detection phase has the following objectives: ī‚ˇ Detect and report a DoS attack; ī‚ˇ Complete initial investigation of the attack; ī‚ˇ Report the incident to the correct team as a cyber incident. Activity Description Stakeholders Detect and report the incident Activities may include, but are not limited to: Confirm system is under attack: ī‚ˇ Confirming a system is under attack rather than heavy load is often only possible if the system has previously been baselined to establish normal operational loads. This must account for changes in load over time as some systems will only be used at financial day/month/year end. ī‚ˇ Consult with the Product Manager to establish whether the current condition is within acceptable parameters to be considered in service. ī‚ˇ Information Security Manager ī‚ˇ Product Manager ī‚ˇ Core IT CIRT
  • 9. [Type here] [Type here] [Type here] If a normal system load exists then it can be compared against the current traffic seen. The review should identify if there are any common traffic patterns, and will need the input from network specialists. DoS attack packets often have a common element, it may help to familiarise yourself with the current most prevalent examples in Appendix A: DoS Attack Types. It will be necessary to work with network engineers who have diagnostic tools/facilities (such as Netflow) to capture and analyse incoming packets to the affected system(s) to identify: ī‚ˇ Common sending IP address; ī‚ˇ Common port; ī‚ˇ Common protocol; ī‚ˇ Common user agent; ī‚ˇ Common payload; and ī‚ˇ Common packet flags. ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT Report the cyber incident via the Service Desk. If a ticket does not exist already, raise a ticket containing minimum information. To report an incident, follow the process defined in the CIRP (insert link to CIRP). ī‚ˇ Information Security Manage ī‚ˇ Core IT CIRT Assign Classification to the cyber incident, based upon available information related to the DoS attack and the incident types (see CIRP). ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT Report the Cyber Incident in accordance with the organisation’s CIRP. Consider the Intelligence value to other organisations and share on the CiSP ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT Where appropriate consider reporting requirements to Information Commissioner’s Office (ICO), relevant regulator and or Competent Authority (NISD), National Cyber Security Centre (NCSC), and / or Police Scotland ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT
  • 10. [Type here] [Type here] [Type here] Activity Description Stakeholders Initial investigation of the incident Activities may include, but are not limited to: Mobilise the Core IT CIRT to begin initial investigation of the cyber incident (see CIRP for staff contact details for further information). ī‚ˇ Information Security Manager ī‚ˇ Ciore IT CIRT ī‚ˇ CIRT The following may also be included in the CIRT where appropriate for the incident: ī‚ˇ Service Desk Analysts ī‚ˇ Server Desk Technicians ī‚ˇ Server Team ī‚ˇ Mobile Device Team Collate initial incident data including as a minimum for the following; ī‚ˇ What systems and/or applications are being targeted? ī‚ˇ What impact is it having on them and, since you have identified the attack, is it getting worse, and is there a pattern to the attack? ī‚ˇ Is the attack spreading or is it still confined to the same systems/applications? ī‚ˇ What impact is this having on the company’s bandwidth? ī‚ˇ Has the attack spread to any shared components, or from what has been seen so far, could it extend to any shared components? (e.g. infrastructure components, directory services etc.) ī‚ˇ Is the attack affecting internal corporate systems and/or has the attack spread into the corporate network? ī‚ˇ Have any support calls been received from any customers? ī‚ˇ Does it appear to distract from a more targeted exploit that could result in a breach of data from other company systems or the company systems targeted by the DoS? ī‚ˇ Has any communication been received from a purported attacker? (via social media, email, phone call etc.) ī‚ˇ Head of IT ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT
  • 11. [Type here] [Type here] [Type here] ī‚ˇ A timeline of when the attack was first detected ī‚ˇ A list of the services that are known to be affected ī‚ˇ Confirm whether systems are accessible internally and externally ī‚ˇ Ensure you are clear whether systems are offline or operating with reduced performance ī‚ˇ Details of the type attack (if known at this stage) Research Threat Intelligence sources and consider Cyber Security Information Sharing Partnership (CiSP) submission to gain further intelligence and support mitigation by others. ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT Review cyber incident categorisation to validate the cyber incident type as a DoS attack and assess the incident priority, based upon the initial investigation. (See CIRP for Incident Severity Matrix) ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT ī‚ˇ Resilience Lead ī‚ˇ Business Continuity Lead Activity Description Stakeholders Incident reporting Activities may include, but are not limited to: Report the cyber incident in accordance with the organisation’s CIRP. ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT Report the Cyber Incident in accordance with the organisation’s CIRP. Consider the Intelligence value to other organisations and share on the CiSP ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT
  • 12. [Type here] [Type here] [Type here] Where appropriate consider reporting requirements to Information Commissioner’s Office (ICO), relevant Regulator and or Competent Authority (NISD), National Cyber Security Centre (NCSC) and / or Police Scotland ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT Escalate using the appropriate steps in the CIRP. ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT ī‚ˇ Resilience Lead ī‚ˇ Business Continuity Lead ī‚ˇ Policy Lead Activity Description Stakeholders Establish the requirement for a full forensic investigation Activities may include, but are not limited to: Consider conducting a full forensic investigation, on the advice of legal counsel. All evidence handling should be done in line with the Association of Chief Police Officers (ACPO) Good Practice Guide for Digital Evidence. ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT
  • 13. [Type here] [Type here] [Type here] 4. Remediation – Contain, Eradicate and Recover Remediation Phase Phase objectives The remediation phase has the following objectives: ī‚ˇ Contain the effects of the DoS attack on the targeted systems; ī‚ˇ Recover affected systems and services back to a Business As Usual (BAU) state. Activity Description Stakeholders Containment Initial containment considerations include: If the attack is disabling services, are there any immediate steps that could be taken to regain some level of service – e.g. requesting the Internet Service Provider (ISP) to drop all traffic targeting the affected service/application. In an absolute extreme case, if it is imperative to maintain internal services, then all traffic from the ISP could be blocked (Note, this will have implications including: potentially loss of email, Internet access, customer access). ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT Consideration should be given to whether the Business Continuity Plan should be enacted. If a decision is made to use a different data centre, it should also be borne in mind that the attack may follow to the new location. ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT ī‚ˇ Business Continuity Lead Once an analysis of the traffic has been completed, the company may be able to filter traffic at the border. If the attack is focussed on maximising computer resource usage of the target (such as a Slowloris attack) then this may be effective. However, if, the attacker is looking to simply overwhelm the internet connection with excessive network packets this may not offer a viable defence. ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT
  • 14. [Type here] [Type here] [Type here] Placing IP restrictions on sensitive services is an effective method to reduce the impact of traffic. ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT Segregation of internet services; separate internal email and web traffic from product services to reduce the impact. ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT The network team should contact the ISP and discuss what filtering they can provide. The contractual relationship with the ISP should identify any actions they are obliged to take. As a DoS attack tends to impact everyone using the same equipment, the ISP may include contractual options to cut the company connections in order to protect other customers from the attack. This would then impact all of the company’s services using that network link. ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT Inform stakeholders of the progress of containment activities in accordance with the CIRP. ī‚ˇ Information Security Manager ī‚ˇ CIRT ī‚ˇ Resilience Lead ī‚ˇ Business Continuity Lead ī‚ˇ Policy Areas Lead ī‚ˇ Corporate Comms Activity Description Stakeholders Eradication Activities may include, but are not limited to: ī‚ˇ Systems patched to protect against vulnerabilities exploited in the attack. ī‚ˇ Network segmentation implemented. ī‚ˇ Removal of vulnerable systems/services. ī‚ˇ Blacklist attack source IPs. ī‚ˇ Whitelist of source IPs and services allowed into the network. ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT
  • 15. [Type here] [Type here] [Type here] 5. Post Incident Post-Incident Activities Phase Phase objectives The post-incident activities phase has the following objectives: ī‚ˇ Complete an incident report including all incident details and activities; ī‚ˇ Complete the lessons identified and problem management process; ī‚ˇ Publish appropriate internal and external communications. Activity Description Stakeholders Incident reporting Draft a post-incident report that includes the following details as a minimum: ī‚ˇ Details of the cyber incident identified and remediated across the network to include timings, type and location of incident as well as the effect on users; ī‚ˇ Activities that were undertaken by relevant resolver groups, service providers and business stakeholders that enabled normal business operations to be resumed; ī‚ˇ Recommendations where any aspects of people, process or technology could be improved across the organisation to help prevent a similar cyber incident from reoccurring, as part of a formalised lessons identified process. ī‚ˇ Senior Stakeholders ī‚ˇ Head of Information Governance ī‚ˇ Head of IT ī‚ˇ Audit Committee ī‚ˇ Information Security Manager ī‚ˇ Resilience Lead ī‚ˇ Business Continuity Lead ī‚ˇ Policy Area Lead Lessons Identified & Problem Management Complete the formal lessons identified process to feedback into future preparation activities. ī‚ˇ Information Security Manager ī‚ˇ CIRT
  • 16. [Type here] [Type here] [Type here] Consider sharing lessons identified with appropriate external stakeholders ī‚ˇ Information Security Manager ī‚ˇ CIRT ī‚ˇ Resilience Lead ī‚ˇ Business Continuity Lead ī‚ˇ Police Area Lead Conduct root cause analysis to identify and remediate underlying vulnerabilities. ī‚ˇ Information Security Manager ī‚ˇ Core IT CIRT ī‚ˇ CIRT Human Resources Review staff welfare; working hours, overtime, time off in lieu (TOIL) and expenses. ī‚ˇ Information Security Manager ī‚ˇ HR Communications Activities may include, but are not limited to: Publish internal communications in line with the communications strategy to inform and educate employees on DoS attacks and security awareness. ī‚ˇ Information Security Manager ī‚ˇ CIRT ī‚ˇ Communications Published external communications, if appropriate, in line with the communications strategy to provide advice to customers, engage with the market, and inform press of the cyber incident. These communications should provide key information of the cyber incident without leaving the organisation vulnerable or inciting further DoS attacks. ī‚ˇ Head of IT ī‚ˇ Information Security Manager ī‚ˇ Communications Team ī‚ˇ Resilience Lead ī‚ˇ Business Continuity Lead ī‚ˇ Policy Area Lead
  • 17. [Type here] [Type here] [Type here] 6. Appendix A: DoS Attack Types Name Description HTTP Flood A type of resource exhaustion attack. The attacker sends a large volume of apparently legitimate requests for a web page. The server is simply unable to respond to the number of requests. This type of attack is very common as it requires very little knowledge to invoke. ICMP (Ping) Flood A type of volumetric attack, and sub-type of UDP flood. The attacker sends a large amount of ICMP Ping packets (typically used to confirm networks are operating correctly) with the intent of using up the target’s bandwidth. Network Time Protocol (NTP) Amplification A type of volumetric attack. An attacker manipulates a third party NTP service that has been left exposed on the internet, pretending to make requests from the target. The NTP server responds to the requests with its normal packets. What makes this attack work is that the attacker sends 1 maliciously crafted packet to the NTP server and by design the NTP server responds by sending 200 packets to the target, believing that it had asked for them. Ping of Death ‘POD’ A type of volumetric attack. Similar to the ICMP flood above, but this time the packet sent is deliberately crafted to be larger than the system was designed to cope with. Older systems such as the original version of Windows 98 would immediately crash when they received the packet. Modern systems were thought to discard this attack vector automatically, but had only introduced controls for the older IPv4. With IPv6 it has returned with unpatched Microsoft Windows 2012 confirmed as vulnerable to PODv6. Slowloris A type of resource exhaustion attack. This is unusual in DoS in that it is targeted and can overwhelm a single machine without affecting others. It can be used as a distraction whilst an attacker’s true activity carries on unnoticed by the IT team busy trying to fix a rebooting web server. The attack sends packets that open a large number of requests with the server, but once the server starts responding the system asks the server to slow down transmission, stalling the connection and preventing the server from closing the connections. Whilst it is slowing down the existing connections, the attack typically sends additional requests to open yet more connections until the server has run out of memory. If
  • 18. [Type here] [Type here] [Type here] a legitimate client is able to get a response from the server it may report HTTP error 503: The service is unavailable. SNMP Flood A type of volumetric attack. Similar to the NTP flood. This attack has a lower rate of packets returned so is less effective, and consequently less common but is expected to be seen more as fewer NTP servers are left open to the internet. SYN Flood A type of resource exhaustion attack. This leverages weaknesses in TCP, one of the underlying protocols on the internet to use up all resources in the operating system of the target. These resources are often strictly limited by the hardware available and, as the attack is against the operating system, the attacker can easily identify what is the most effective method by performing test runs themselves against their own systems. UDP Flood A type of volumetric attack. The attacker sends a large amount of session-less packets to the target IP addresses with the intent of using up the target’s bandwidth. These may be directed to a single port or multiple ports. Typically results in the clients receiving an ICMP Destination Unreachable response when they try to access the service. Zero Day Attacks These attacks are characterised by their lack of characterisation. They are brand new and may target previously believed secure systems.
  • 19. [Type here] [Type here] [Type here] Denial of Service Playbook Detect Prepare Analyse Remediation Post Incident Prepare Review and rehearse CIRP Review recent cyber incidents and outputs Review threat intelligence feeds, latest vulnerabilities and risks Ensure access to CIRP, Data Flow Diagrams and appropriate documentation Maintain awareness with employees through security awareness training DoS Attack Typical DoS symptoms: ī‚ˇ Slow access to files ī‚ˇ A long-term inability to access a particular website ī‚ˇ Internet disconnection ī‚ˇ Problems accessing all websites ī‚ˇ Excessive amount of spam emails Mobilise the CIRT and verify it is a DoS attack Collate initial incident data and classify cyber incident Escalate in accordance with the CIRP Consider mobilising forensic readiness capability Engage technical staff Confirm systems and/or applications being targeted Scope the attack: ī‚ˇ Is the attack spreading? ī‚ˇ What impact is it having on the organisation? ī‚ˇ Does it appear to be a distraction attempt for a more targeted attack on personal data? Collate a timeline of events from when the attack was first detected Collate details on the type of DoS attack if known at this stage If personal data is at risk consider engaging the DPO and reporting to the ICO Implement immediate steps to mitigate e.g. request ISP to drop all traffic targeting affected systems/ applications Consider whether the Business Continuity Plan should be enacted Consider filtering traffic at the border (engage ISP) Consider placing IP restrictions on sensitive/ critical systems/ applications Patch systems/ applications to protect against vulnerabilities Restore serviced to BAU Draft post-incident report Complete formal lessons learnt process defined in CIRP Publish internal communications to educate employees on DoS attacks Updates to cyber incident documentation where required End 7. Appendix B: Flow Diagram