Manage Security Incident
Mingchao Ma STFC – RAL, UK
ISGC 2010 Security Workshop 7th March 2010
Manage Security Incident Mingchao Ma STFC RAL, UK ISGC 2010 - - PowerPoint PPT Presentation
Manage Security Incident Mingchao Ma STFC RAL, UK ISGC 2010 Security Workshop 7 th March 2010 Overview Actively manage incident handling Be ready BEFORE an incident Based on NIST SP800-61rev1 recommendation
ISGC 2010 Security Workshop 7th March 2010
The Art of War by Sun Tzu
Preparation
Identification Containment Eradication Recovery Lesson-learned Forensic Analysis
–Policies & procedures, write them down on PAPER –A simple and easy-to-follow procedure is very helpful
–Information about the team - "Organizational Models for Computer Security Incident Response Teams (CSIRTs) (http://www.cert.org/archive/pdf/03hb001.pdf)
–Name, telephone, email, PGP keys etc.
–Risk assessment –Patching, hardening, best practice, education etc. –Be aware of your organization's security policy
–Profile systems and network – Know normal behaviours
–Live response, live/dead acquisition and analysis
–Belgian Federal Computer Crime Unit –http://www.lnx4n6.be/
–http://remote-exploit.org/backtrack.html
Preparation Identification Containment Eradication Recovery Lesson-learned
Head up template
FROM: <your_email_address@your_organisation> TO: < project-egee-security-csirts@in2p3.fr > SUBJECT: Security incident suspected at <your site> ** PLEASE DO NOT REDISTRIBUTE ** EGEE-<DATE> (ex: EGEE-20090531) ** This message is sent to the EGEE CSIRTs and must NOT be publicly archived ** Dear CSIRTs, It seems a security incident has been detected at <your site>. Summary of the information available so far: <Ex: A malicious SSH connection was detected from 012.012.012.012. The extent of the incident is unclear for now, and more information will be published in the coming hours as forensics are progressing at our site. However, all sites should check for successful SSH connection from 012.012.012.012 as a precautionary measure.>
Preparation
Identification Eradication Recovery Lesson-learned
Available at http://www.porcupine.org/forensics/tct.html
–What had happened?
–What was modified/changed and or left?
–What was deleted?
–To understand the function of the malware
Preparation Eradication Identification Containment Recovery Lesson-learned
Preparation Recovery Identification Containment Eradication Lesson-learned
Preparation Lesson-learned Identification Containment Eradication Recovery
32 7/03/2010