It is important that an incident response plan is
formulated, supported throughout the organization, and is regularly
tested. A good incident response plan can minimize not only the affects
of the actual security breach, but it may also reduce the negative
publicity.
From a security team perspective, it does not matter whether a breach
occurs (as such occurrences are an eventual part of doing business using
an untrusted carrier network, such as the Internet), but rather,
when a breach occurs. Do not think of a system as
weak and vulnerable; it is important to realize that given enough time
and resources, someone can break into even the most security-hardened
system or network. You do not need to look any further than the
Security Focus website, https://www.securityfocus.com/,
for updated and detailed information concerning recent security breaches
and vulnerabilities, such as the frequent defacement of corporate
webpages or the 2002 attacks on the root DNS nameservers.
The positive aspect of realizing the inevitability of a system breach is
that it allows the security team to develop a course of action that
minimizes any potential damage. Combining a course of action with
expertise allows the team to respond to adverse conditions in a formal
and responsive manner.
The incident response plan itself can be separated into four
phases:
Immediate action to stop or minimize the incident
Investigation of the incident
Restoration of affected resources
Reporting the incident to the proper channels
An incident response must be decisive and executed quickly. Because
there is little room for error, it is critical that practice emergencies
are staged and response times measured. This way it is possible to
develop a methodology that fosters speed and accuracy, minimizing the
impact of resource unavailability and potential damage in the event of
an actual system compromise.
An incident response plan has a number of requirements,
including:
A team of in-house experts (a Computer Emergency
Response Team)
A legally reviewed and approved strategy
Financial support from the company
Executive/upper management support
A feasible and tested action plan
Physical resources, such as redundant storage, standby systems,
and backup services
The Computer Emergency Response Team (CERT) is a
group of in-house experts who are prepared to act quickly in the event
of a catastrophic computer event. Finding the core competencies for a
CERT can be a challenge. The concept of appropriate personnel goes
beyond technical expertise and includes logistics such as location,
availability, and desire to put the organization ahead of ones
personal life when an emergency occurs. An emergency is never a
planned event; it can happen at any moment and all CERT members must
accept the responsibility that is required of them to respond to an
emergency at any hour.
CERT teams typically include system and network administrators as well
as information security experts. System administrators provide the
knowledge and expertise of system resources, including data backups,
backup hardware available for use, and more. Network administrators
provide their knowledge of network protocols and the ability to
re-route network traffic dynamically. Information security personnel
are useful for thoroughly tracking and tracing security issues as well
as performing a post-mortem (after the attack)
analysis of compromised systems.
Although it may not always be feasible, there should be personnel
redundancy within a CERT. If depth in core areas is not applicable to
an organization, then cross-training should be implemented wherever
possible. Note, if only one person owns the key to data safety and
integrity, then the entire enterprise becomes helpless in that one
person's absence.
Some important aspects of an incident response to consider include
legal ramifications. Security plans should be developed with members
of legal staff or some form of general counsel. Just as every company
should have their own corporate security policy, every company should
have its own way of handling incidents from a legal
perspective. Local, state, and federal regulatory issues are beyond
the scope of this document, but are mentioned because the methodology
for performing a post-mortem analysis, at least in part, is dictated
by (or in conjunction with) legal counsel. General counsel can alert
technical staff of the legal ramifications of security breaches; the
hazards of leaking a client's personal, medical, or financial records;
and the importance of restoring service in mission-critical
environments such as hospitals and banks.