Home » Internet Services » What Has Changed Recently With Security?

What Has Changed Recently With Security?

An Overview of the Incident Response Process

Incident response is a process and not simply an isolated event. For incident response to be truly successful, teams have to use an integrated and organized method to tackle any incident.

These are the five key steps that compose an effective incident response program:

Preparation
Figuring Out Services

Preparation is the core of every incident response that works. Even the best incident response group cannot tackle an incident effectively when there are no preset guidelines. A solid plan to support the team is a must. To successfully address security events, this plan should include four elements: IR policy development and documentation, communication guidelines, threat intelligence feeds, and cyber hunting exercises.
Getting To The Point – Experts

Detection and Reporting

This phase is focused on monitoring security events to spot, warn, and report on probable security incidents.

* Monitoring of security events in the environment can be done with the use of firewalls, intrusion prevention systems, and data loss prevention measures.

* Detection of potential security incidents is done by by correlating alerts within a Security Information and Event Management (SIEM) solution.

* Prior to issuing alerts, analysts make an incident ticket, document their initial findings, and then designate an initial incident classification.

* When reporting, there must be room for regulatory reporting escalations.

Triage and Analysis

This is where most of the effort in correctly scoping and understanding the security incident occurs. Resources have to be utilized for the collection of data from tools and systems for more extensive analysis, as well as to find indicators of compromise. People must have in-depth skills and a thorough understanding of digital forensics, live system responses, and memory and malware analysis.

In collecting evidence, analysts have to concentrate on three core areas:

a. Endpoint Analysis

> Determine the tracks of the threat actor

> Get artifacts necessary to the creation of a timeline of activities

> Conduct a forensic analysis of a detailed copy of systems, and have RAM scan through and point to key artifacts to know what transpired on a device

b. Binary Analysis

> Check dubious binaries or tools the attacker used and document those programs’ functionalities.

Enterprise Hunting

> Scrutinize current systems and event log technologies to know the scope of compromise.

< Document all affected accounts, machines, etc. to control and neutralize damage.

Containment and Neutralization

This is among the most crucial steps of incident response. The technique for containment and neutralization is anchored on the intelligence and indicators of compromise spotted during the analysis step. Normal operations can resume once the system has been restored and security has been verified.

Post-Incident Activity

After the incident has been resolved, there is still more work to do. Any information that can be used to stop similar problems in the future, must be documented. This step can be divided into the following:

> completion of incident report to improve the incident response plan and prevent similar security incidents in the future

> post-incident monitoring to keep threat actors from reappearing

> updates of threat intelligence feeds

> identifying preventative measures> identifying preventative techniques

> improving internal coordination in the organization to implement new security measures properly