SlideShare a Scribd company logo
1 of 24
Operational Security
Disaster Recovery
Incident Response
CCSD SECURITY
ESSENTIAL
Security Operations Overview
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Focus Description
Maintain Operational
Resilience
Keep core business functions operating even when a negative event occurs.
Protect Valuable Assets Protect a wide range of assets and resources, from data to equipment to human.
Control System Accounts Control users who have access to critical business systems.
Effective Security Services
Management
Make sure that strong leadership is in place to keep security operations services
consistent and effective.
Incident Response Process
Detect a
Problem
Evaluate the
Problem
Mitigate the
Damage
Determine
Lessons
Learned
Report Details
Recover and
Remediate
Implement
Preventive
Controls
Copyright © 2019 Logical Operations, Inc. All rights reserved.
IRT Roles and Responsibilities
IT
Information
Security
Physical/Corporate
Security
Executive
Management
Legal
Internal
Audit
Human
Resources
Media/Public
Relations
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Incident
Response
Team
• Prevent a situation from becoming worse.
• Ensure that first responders take correct action.
• Provide the team with all of the tools and resources they need.
Incident Response Management
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Volume of log entries and false positives can be overwhelming.
• Adverse occurrence might not actually be a security incident.
• Hardware failures.
• Human error.
• Use professional judgment.
• Document all systems.
• Set a baseline of normal behavior.
• Retain logs from all sources.
• Correlate events, alerts, and indicators from all sources.
• Research reputable sources for information.
• Filter out irrelevant or inconsequential sources.
• Properly document analysis findings in a database.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Evaluation and Analysis
• Use triage method to determine priority by criticality.
• Take care to not inadvertently contaminate a crime scene.
• If you do not intend to prosecute:
• Contain damage.
• Discover the problem.
• Bring systems back online.
Response and Mitigation
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Can be as simple as restoring a single operating system or as complex as moving all
personnel and operations to a new physical location.
• Make sure the recovered system will not be vulnerable to the same attack.
• Use a different team to perform a fresh vulnerability assessment on recovered
system.
• Stop or reverse the damage caused by the incident.
• Discover root cause.
Recovery and Remediation
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Report business impact of incident.
• Report should include:
• Source of incident.
• Triggers.
• Systems targeted.
• Specific impacts.
• Actions taken to mitigate incident.
• Actions taken to recover systems and operations.
• Actions taken to mitigate lingering effects.
• Current state of the system.
• Lessons learned.
Reporting and Documentation
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Identify areas of security that need improvement.
• Determine the best way possible to improve security.
Lessons Learned
 Actions taken.
 Optimal solution.
 How teams reacted/performed.
 Cost in time and money.
 How future response will be different.
 Recommended changes to security policy.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Seeking evidence from computers/networks that might pertain to criminal/civil
matter.
• Remember nearly anything done on computer/network leaves a trace.
• Set of procedures/protocols that are:
• Methodical.
• Verifiable.
• Auditable.
Investigative Procedures
Collect
Evidence
Present
Findings
Analyze
Evidence
Discover
Evidence
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Keep asking "what was the immediate thing that allowed this to happen?”
• With each answer, repeat the question until you find the root cause.
• Most root causes can be uncovered in six questions.
• There are likely to be several root causes.
Root Cause Analysis
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Report findings to management, authorities, stakeholders.
• Tailor report based on audience.
Investigation Reports
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Disaster Recovery Planning Process
Update and Maintain
Identify
Document
Train
Assess
Copyright © 2019 Logical Operations, Inc. All rights reserved.
DRPs
• Well-documented policy that defines:
• How people/resources will be protected during disaster.
• How organization will recover.
• Plan should be tested for effectiveness and fine-tuned before a disaster strikes.
• Train staff on policy so they can respond automatically in case of emergency.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Disaster Recovery Strategy Considerations
Risks
Personnel safety
Essential items
Relocation scheme
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Cost vs.
benefit
Weigh goals and
costs to ensure an
effective DRP
Prioritization
Recover business
critical processes first
Disaster Recovery Priority Levels
Short
term
Mid term
Long
term
Not
required
Copyright © 2019 Logical Operations, Inc. All rights reserved.
DRP Personnel Roles and Responsibilities
Executive emergency
management team
Command
center team
Emergency management
team
Emergency
response teams
End users
DRP
Personnel
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• A master schedule that lists all of the tests.
• A description of the test objectives and methods.
• A list of all test participants.
• The roles and responsibilities of all test participants including support personnel.
• The decision-makers and their successors.
• Test locations.
• Test escalation conditions.
• Contact information.
DRP Test Plan
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Notify all stakeholders:
• Employees and their families.
• Vendors, contractors, and business
partners.
• Facility and site managers.
• Department managers.
• Senior managers and Board of Directors.
• News media.
• Law enforcement.
• Emergency responders.
• Insurance companies.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Suppliers and distributors.
• Customers.
• Government regulators.
• Competitors.
• Unions.
• Internet users.
• The general public or line-of-business
related communities.
• Industry groups.
Communication with Stakeholders
Communication Flow
• Create a fault-tolerant call tree.
• Put emergency numbers on badges or refrigerator magnets.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
• Final part of disaster recovery.
• Part of the DRP.
• Primary working facility and environment is back to normal.
• Part of staff might still be at alternate site for awhile.
• Legal team and insurance agent will play a role.
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Restoration
• What was the root cause of the disaster?
• How can such a disaster be avoided in the future?
• How did the DR/BCP team respond?
• What lessons were learned?
• What went well?
• What could be improved?
Copyright © 2019 Logical Operations, Inc. All rights reserved.
Disaster Post-Mortem
END
Copyright © 2019 Logical Operations, Inc. All rights reserved.

More Related Content

What's hot

CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1Hamed Moghaddam
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...festival ICT 2016
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessnewbie2019
 
Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk ManagementHamed Moghaddam
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgEric Vanderburg
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset SecurityKarthikeyan Dhayalan
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governancenooralmousa
 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset SecurityHamed Moghaddam
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security FrameworkNada G.Youssef
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesJack Nichelson
 

What's hot (20)

CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1CISSP Certification- Security Engineering-part1
CISSP Certification- Security Engineering-part1
 
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
 
Chapter 12 iso 27001 awareness
Chapter 12 iso 27001 awarenessChapter 12 iso 27001 awareness
Chapter 12 iso 27001 awareness
 
Information Security
Information SecurityInformation Security
Information Security
 
Cissp- Security and Risk Management
Cissp- Security and Risk ManagementCissp- Security and Risk Management
Cissp- Security and Risk Management
 
Lesson 4
Lesson 4Lesson 4
Lesson 4
 
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric VanderburgInformation Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
 
CISSP - Chapter 2 - Asset Security
CISSP - Chapter 2 -  Asset SecurityCISSP - Chapter 2 -  Asset Security
CISSP - Chapter 2 - Asset Security
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
CISSP Certification-Asset Security
CISSP Certification-Asset SecurityCISSP Certification-Asset Security
CISSP Certification-Asset Security
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Information Security
Information SecurityInformation Security
Information Security
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Lesson 1 - Introduction
Lesson 1 - Introduction Lesson 1 - Introduction
Lesson 1 - Introduction
 
IT Security & Governance Template
IT Security & Governance TemplateIT Security & Governance Template
IT Security & Governance Template
 
Information Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your VulnerabilitiesInformation Security - Back to Basics - Own Your Vulnerabilities
Information Security - Back to Basics - Own Your Vulnerabilities
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 

Similar to Sec4

Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Emily2014
 
FixNix 17 products1.0
FixNix 17 products1.0FixNix 17 products1.0
FixNix 17 products1.0FixNix Inc.,
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3Anne Starr
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksResilient Systems
 
Recovery and Compliance Services provided by Tom Bronack
Recovery and Compliance Services provided by Tom BronackRecovery and Compliance Services provided by Tom Bronack
Recovery and Compliance Services provided by Tom BronackThomas Bronack
 
Cybertopic_2security
Cybertopic_2securityCybertopic_2security
Cybertopic_2securityAnne Starr
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response PlanResilient Systems
 
Business Continuity as a Career
Business Continuity as a CareerBusiness Continuity as a Career
Business Continuity as a CareerBonnie Canal
 
Cyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineCyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineGraeme Parker
 
Business continuity in general
Business continuity in generalBusiness continuity in general
Business continuity in generalJohn Johari
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1Anne Starr
 
Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001PECB
 
TCG Svcs Pres 2011
TCG Svcs Pres 2011TCG Svcs Pres 2011
TCG Svcs Pres 2011mcourton
 
Isaca csx2018-continuous assurance
Isaca csx2018-continuous assuranceIsaca csx2018-continuous assurance
Isaca csx2018-continuous assuranceFrançois Samarcq
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance MonitoringControlCase
 
Broadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetBroadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetCSI Solutions
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...Accellis Technology Group
 

Similar to Sec4 (20)

Forensic3e ppt ch13
Forensic3e ppt ch13Forensic3e ppt ch13
Forensic3e ppt ch13
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
 
FixNix 17 products1.0
FixNix 17 products1.0FixNix 17 products1.0
FixNix 17 products1.0
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
 
Recovery and Compliance Services provided by Tom Bronack
Recovery and Compliance Services provided by Tom BronackRecovery and Compliance Services provided by Tom Bronack
Recovery and Compliance Services provided by Tom Bronack
 
Cybertopic_2security
Cybertopic_2securityCybertopic_2security
Cybertopic_2security
 
Incident response
Incident responseIncident response
Incident response
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
Business Continuity as a Career
Business Continuity as a CareerBusiness Continuity as a Career
Business Continuity as a Career
 
Cyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated DisciplineCyber Security and Business Continuity an Integrated Discipline
Cyber Security and Business Continuity an Integrated Discipline
 
Business continuity in general
Business continuity in generalBusiness continuity in general
Business continuity in general
 
gkkSecurity essentials domain 1
gkkSecurity essentials   domain 1gkkSecurity essentials   domain 1
gkkSecurity essentials domain 1
 
)k
)k)k
)k
 
Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001Implementing Asset Management System with ISO 55001
Implementing Asset Management System with ISO 55001
 
TCG Svcs Pres 2011
TCG Svcs Pres 2011TCG Svcs Pres 2011
TCG Svcs Pres 2011
 
Isaca csx2018-continuous assurance
Isaca csx2018-continuous assuranceIsaca csx2018-continuous assurance
Isaca csx2018-continuous assurance
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
Broadening Your Cybersecurity Mindset
Broadening Your Cybersecurity MindsetBroadening Your Cybersecurity Mindset
Broadening Your Cybersecurity Mindset
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
 

More from Anne Starr

I01letor20so201leutor2020
I01letor20so201leutor2020I01letor20so201leutor2020
I01letor20so201leutor2020Anne Starr
 
Iso27001leadauditor2020
Iso27001leadauditor2020Iso27001leadauditor2020
Iso27001leadauditor2020Anne Starr
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehAnne Starr
 
2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)Anne Starr
 
Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577Anne Starr
 
01wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-40001wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-400Anne Starr
 
uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00Anne Starr
 
Cloudhnologysstecociat
CloudhnologysstecociatCloudhnologysstecociat
CloudhnologysstecociatAnne Starr
 
Cmbysantocsddsh
CmbysantocsddshCmbysantocsddsh
CmbysantocsddshAnne Starr
 
Cddmbysantcsosh
CddmbysantcsoshCddmbysantcsosh
CddmbysantcsoshAnne Starr
 
Ccbysantsddosh
Ccbysantsddosh  Ccbysantsddosh
Ccbysantsddosh Anne Starr
 
Ccsdbyhday1santodms
Ccsdbyhday1santodmsCcsdbyhday1santodms
Ccsdbyhday1santodmsAnne Starr
 
Serskmanagvicedeement
SerskmanagvicedeementSerskmanagvicedeement
SerskmanagvicedeementAnne Starr
 
foundatamp;practitioner)princeion&2aombigile
foundatamp;practitioner)princeion&2aombigilefoundatamp;practitioner)princeion&2aombigile
foundatamp;practitioner)princeion&2aombigileAnne Starr
 

More from Anne Starr (20)

I01letor20so201leutor2020
I01letor20so201leutor2020I01letor20so201leutor2020
I01letor20so201leutor2020
 
Iso27001leadauditor2020
Iso27001leadauditor2020Iso27001leadauditor2020
Iso27001leadauditor2020
 
Ccsddm5days
Ccsddm5daysCcsddm5days
Ccsddm5days
 
Dayblic
DayblicDayblic
Dayblic
 
Day1cspbeblic
Day1cspbeblicDay1cspbeblic
Day1cspbeblic
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)2 slides(2ndvariadaystion)
2 slides(2ndvariadaystion)
 
Securityic2
Securityic2Securityic2
Securityic2
 
inte
inteinte
inte
 
Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577Awtitioneressentialsdeckscloudprac401-577
Awtitioneressentialsdeckscloudprac401-577
 
01wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-40001wslouAsentialsdeck2dpractitioneres-400
01wslouAsentialsdeck2dpractitioneres-400
 
uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00uderessAwscloentialsdeck1-2ion00
uderessAwscloentialsdeck1-2ion00
 
Cloudhnologysstecociat
CloudhnologysstecociatCloudhnologysstecociat
Cloudhnologysstecociat
 
Cmbysantocsddsh
CmbysantocsddshCmbysantocsddsh
Cmbysantocsddsh
 
Cddmbysantcsosh
CddmbysantcsoshCddmbysantcsosh
Cddmbysantcsosh
 
Ccbysantsddosh
Ccbysantsddosh  Ccbysantsddosh
Ccbysantsddosh
 
Ccsdbyhday1santodms
Ccsdbyhday1santodmsCcsdbyhday1santodms
Ccsdbyhday1santodms
 
Serskmanagvicedeement
SerskmanagvicedeementSerskmanagvicedeement
Serskmanagvicedeement
 
foundatamp;practitioner)princeion&2aombigile
foundatamp;practitioner)princeion&2aombigilefoundatamp;practitioner)princeion&2aombigile
foundatamp;practitioner)princeion&2aombigile
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

Sec4

  • 1. Operational Security Disaster Recovery Incident Response CCSD SECURITY ESSENTIAL
  • 2. Security Operations Overview Copyright © 2019 Logical Operations, Inc. All rights reserved. Focus Description Maintain Operational Resilience Keep core business functions operating even when a negative event occurs. Protect Valuable Assets Protect a wide range of assets and resources, from data to equipment to human. Control System Accounts Control users who have access to critical business systems. Effective Security Services Management Make sure that strong leadership is in place to keep security operations services consistent and effective.
  • 3. Incident Response Process Detect a Problem Evaluate the Problem Mitigate the Damage Determine Lessons Learned Report Details Recover and Remediate Implement Preventive Controls Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 4. IRT Roles and Responsibilities IT Information Security Physical/Corporate Security Executive Management Legal Internal Audit Human Resources Media/Public Relations Copyright © 2019 Logical Operations, Inc. All rights reserved. Incident Response Team
  • 5. • Prevent a situation from becoming worse. • Ensure that first responders take correct action. • Provide the team with all of the tools and resources they need. Incident Response Management Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 6. • Volume of log entries and false positives can be overwhelming. • Adverse occurrence might not actually be a security incident. • Hardware failures. • Human error. • Use professional judgment. • Document all systems. • Set a baseline of normal behavior. • Retain logs from all sources. • Correlate events, alerts, and indicators from all sources. • Research reputable sources for information. • Filter out irrelevant or inconsequential sources. • Properly document analysis findings in a database. Copyright © 2019 Logical Operations, Inc. All rights reserved. Evaluation and Analysis
  • 7. • Use triage method to determine priority by criticality. • Take care to not inadvertently contaminate a crime scene. • If you do not intend to prosecute: • Contain damage. • Discover the problem. • Bring systems back online. Response and Mitigation Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 8. • Can be as simple as restoring a single operating system or as complex as moving all personnel and operations to a new physical location. • Make sure the recovered system will not be vulnerable to the same attack. • Use a different team to perform a fresh vulnerability assessment on recovered system. • Stop or reverse the damage caused by the incident. • Discover root cause. Recovery and Remediation Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 9. • Report business impact of incident. • Report should include: • Source of incident. • Triggers. • Systems targeted. • Specific impacts. • Actions taken to mitigate incident. • Actions taken to recover systems and operations. • Actions taken to mitigate lingering effects. • Current state of the system. • Lessons learned. Reporting and Documentation Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 10. • Identify areas of security that need improvement. • Determine the best way possible to improve security. Lessons Learned  Actions taken.  Optimal solution.  How teams reacted/performed.  Cost in time and money.  How future response will be different.  Recommended changes to security policy. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 11. • Seeking evidence from computers/networks that might pertain to criminal/civil matter. • Remember nearly anything done on computer/network leaves a trace. • Set of procedures/protocols that are: • Methodical. • Verifiable. • Auditable. Investigative Procedures Collect Evidence Present Findings Analyze Evidence Discover Evidence Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 12. • Keep asking "what was the immediate thing that allowed this to happen?” • With each answer, repeat the question until you find the root cause. • Most root causes can be uncovered in six questions. • There are likely to be several root causes. Root Cause Analysis Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 13. • Report findings to management, authorities, stakeholders. • Tailor report based on audience. Investigation Reports Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 14. Disaster Recovery Planning Process Update and Maintain Identify Document Train Assess Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 15. DRPs • Well-documented policy that defines: • How people/resources will be protected during disaster. • How organization will recover. • Plan should be tested for effectiveness and fine-tuned before a disaster strikes. • Train staff on policy so they can respond automatically in case of emergency. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 16. Disaster Recovery Strategy Considerations Risks Personnel safety Essential items Relocation scheme Copyright © 2019 Logical Operations, Inc. All rights reserved. Cost vs. benefit Weigh goals and costs to ensure an effective DRP Prioritization Recover business critical processes first
  • 17. Disaster Recovery Priority Levels Short term Mid term Long term Not required Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 18. DRP Personnel Roles and Responsibilities Executive emergency management team Command center team Emergency management team Emergency response teams End users DRP Personnel Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 19. • A master schedule that lists all of the tests. • A description of the test objectives and methods. • A list of all test participants. • The roles and responsibilities of all test participants including support personnel. • The decision-makers and their successors. • Test locations. • Test escalation conditions. • Contact information. DRP Test Plan Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 20. • Notify all stakeholders: • Employees and their families. • Vendors, contractors, and business partners. • Facility and site managers. • Department managers. • Senior managers and Board of Directors. • News media. • Law enforcement. • Emergency responders. • Insurance companies. Copyright © 2019 Logical Operations, Inc. All rights reserved. • Suppliers and distributors. • Customers. • Government regulators. • Competitors. • Unions. • Internet users. • The general public or line-of-business related communities. • Industry groups. Communication with Stakeholders
  • 21. Communication Flow • Create a fault-tolerant call tree. • Put emergency numbers on badges or refrigerator magnets. Copyright © 2019 Logical Operations, Inc. All rights reserved.
  • 22. • Final part of disaster recovery. • Part of the DRP. • Primary working facility and environment is back to normal. • Part of staff might still be at alternate site for awhile. • Legal team and insurance agent will play a role. Copyright © 2019 Logical Operations, Inc. All rights reserved. Restoration
  • 23. • What was the root cause of the disaster? • How can such a disaster be avoided in the future? • How did the DR/BCP team respond? • What lessons were learned? • What went well? • What could be improved? Copyright © 2019 Logical Operations, Inc. All rights reserved. Disaster Post-Mortem
  • 24. END Copyright © 2019 Logical Operations, Inc. All rights reserved.