SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
Managing Computer Security Incident Response Teams
Introduction
Table of Contents
Notices ............................................................................................................................................ 2
Introduction .................................................................................................................................... 2
Purpose ........................................................................................................................................... 3
Intended Audience.......................................................................................................................... 4
Workshop Goals.............................................................................................................................. 5
Workshop Overview ....................................................................................................................... 6
Applying This Material .................................................................................................................... 7
CERT/CC Lessons Learned............................................................................................................... 9
Page 1 of 11
Notices
8
Managing CSIRTs
© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
Introduction
1
Managing CSIRTs
© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213
[DISTRIBUTION STATEMENT A] Approved for public release
and unlimited distribution.
Introduction
Managing Computer Security
Incident Response Teams
(CSIRTs)
**001 Hello, and welcome to Managing
Computer Security Incident Response Teams.
Page 2 of 11
Purpose
2
Managing CSIRTs
© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
Purpose
To provide a common understanding of
• workshop goals
• how to apply workshop materials for your needs
**002 In this introduction module,
we'll provide an overview of the goals
of this training course, as well as
inform you how to use and apply the
workshop and training materials for
your own particular needs.
Page 3 of 11
Intended Audience
3
Managing CSIRTs
© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
CSIRT managers of all kinds
• prospective
• new
• existing
Other individuals
• C-level managers (CIOs, CSOs, etc.)
• upper management
• public affairs or public relations
• legal counsel
No prerequisite incident handling experience is required for
this course.
Intended Audience
**003 The primary audience that
these training materials are intended
for are people who have an interest
in or who have managed a computer
security incident response team for
any length of time. Whether you
have been a team lead or a manager
of an existing CSIRT or you are new
in the role of managing a CSIRT, or
perhaps you are potentially interested
in becoming a manager of a CSIRT in
the future, we hope that these
materials apply to you.
Others who may be interested in this
training include not just those that
directly manage a CSIRT, but other
managers, such as C-level managers,
chief information officers or chief
security officers; upper management
or executives who interact with the
CSIRT; public affairs or public
relations staff or personnel; human
resources; legal counsel; people who
Page 4 of 11
have a role in other security matters;
system and network administrators;
and anyone who might interact with
the CSIRT. No prior incident
handling knowledge or experience is
required to take this training.
Workshop Goals
4
Managing CSIRTs
© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
To provide insight into the type and nature of work CSIRT
staff may be expected to handle
To provide an overview of the incident response arena
• the nature of incident response activities
• incident handling processes
To help you to understand
• technical issues from a management perspective
• problems and pitfalls to avoid
• best practices where applicable
To emphasize the importance of pre-defined policies and
procedures
To discuss what is needed to operate an effective CSIRT
Workshop Goals
**004 Our goals for this training are
to provide insight into the type and
nature of work the CSIRTs may be
expected to handle. We will provide
an overview of the incident response
field, including the nature of incident
response activities and an overview
of the incident handling processes
themselves. We hope to help you
understand technical issues from a
management perspective and learn
from problems and pitfalls that others
have encountered as they're
managing a CSIRT, highlight best
practices where applicable, and other
things that have worked well from
organizations with CSIRTs.
Page 5 of 11
You will hear us emphasize again
and again the importance of having
documented and predefined policies
and procedures that relate to your
CSIRT operations, and we will share
with you ideas and suggestions on
what you may need to effectively
operate your CSIRT.
Workshop Overview
5
Managing CSIRTs
© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
Workshop Materials focus on
• foundation material, staffing issues
• incident management processes
• other issues, such as working with law enforcement,
insider threat, and publishing information.
Workshop Overview
**005 The training materials are
broken into a series of separate
modules covering various topic areas
that we feel would be useful for
someone to manage a CSIRT more
effectively. The first series of
modules will cover topic areas such
as CSIRT management, the
environment, staffing issues, code of
conduct, dealing with the news
media, and managing a CSIRT
infrastructure.
The next series of modules will go
into the individual incident
Page 6 of 11
management processes, from helping
to better prepare and protect your
critical assets, to detect and triage
events and incident reports, to
respond to those incident reports,
and to deal with different major
events.
After that, we will move into other
topic areas and issues, such as
publishing and disseminating
information, evaluating your CSIRTs,
dealing with and being prepared to
handle insider threats, and working
with law enforcement organizations.
References and citations to other
resources will also be provided
throughout the different training
modules.
Applying This Material
6
Managing CSIRTs
© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
All CSIRTs are different.
• One size does not fit all.
Take what makes sense for your situation.
Refer to your own CSIRT policies and
procedures for
• appropriate responses and response times
• prioritization and escalation criteria
Examples and suggestions point out
• what has worked well for the CERT/CC and other teams
• pitfalls and benefits encountered
Applying This Material
**006 As we present this material,
please keep in mind that our
intention is to provide you with ideas
Page 7 of 11
and suggestions and topics for
consideration on things that can help
you to manage your CSIRT, but we
don't necessarily hope to prescribe
how to do that. Many of the topic
areas that we'll address will vary
depending on your unique and
personal situations.
CSIRTs can vary from one another,
and not one solution will meet all
CSIRTs' needs, so we ask you to
consider with an open mind any
suggestions we offer. Try to adopt
whatever makes sense for your
particular situation, and perhaps
adapt or tailor other ideas as
appropriate for your organization.
Apply the materials to your own
CSIRT and organization and any
existing policies or procedures that
already are in place for computer
security response and other
escalation or prioritization criteria.
The examples and ideas presented in
this training are based on our
experiences and what's worked well
for our team and other organizations
that we've interacted with, and we
hope to share with you the benefit of
lessons that we've learned, including
problems that we've encountered and
things that have worked well for us.
Page 8 of 11
CERT/CC Lessons Learned
7
Managing CSIRTs
© 2020 Carnegie Mellon University
[DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution.
CERT/CC Lessons Learned
Trustworthiness is paramount to the success
of your team.
You will live or die by your credibility.
• Never violate a confidence.
• Speak only in facts.
• Don’t spread rumors.
• Don’t be afraid to say “I don’t know.”
CSIRTs should be proactive.
• Share information as openly as possible.
• Set expectations repeatedly.
Be aware that all CSIRTs differ.
Recognize that things take time; most CSIRTs
• have no authority over their constituency
• are third parties to incidents
• fail to plan for growth and are soon overwhelmed
• take 1-2 years to gain constituency recognition
If your CSIRT has no authority, learn to be effective
through influence.
Train for a marathon, not a sprint.
• We will be doing this for a long time.
• Plan for the long haul.
• Leverage other resources and existing mechanisms.
• Build a network of experts who can advise and help.
• You will need endurance as well as brilliance.
**007 After having worked in this
area for over three decades, the
CERT Coordination Center at the
Software Engineering Institute has
learned a number of lessons and
would like to share some of those
lessons with you before we begin our
training today.
One of the most important lessons is
that recognizing that trustworthiness
is going to be paramount to the
success of your team. If you are not
able to build and maintain the trust
and credibility with your constituency,
it's going to hamper a lot of the
activities that you try to provide to
them.
If your team is new or just starting
out, or if you have limited resources,
many organizations find that their
CSIRTs spend most of their time
being reactive, but if you strive to be
Page 9 of 11
more proactive, share information as
much as possible and repeatedly set
expectations with the stakeholders
that you deal with, you'll find yourself
helping to prevent incidents from
happening in the first place to reduce
the need to be reactive.
As we said, recognize that CSIRTs
differ from one another. What works
well for one may not work in your
situation. If your CSIRT is one that
does not have authority to make
changes or dictate strategies to
respond to incidents, you'll have to
learn to be effective through
influence and providing value-added
services.
Also be aware that many of the
activities and the things that CSIRTs
do may take more time than is
expected. Many organizations that
are just starting to implement their
team or incident management
capability find it may take 12 months,
18 months, 24 months or longer
before they can plan their CSIRT,
implement that CSIRT to become
operational, and become recognized
with their constituents. So don't be
discouraged if things aren't
happening as quickly as you expect,
and don't be afraid to revise or
change your plans or your processes
as appropriate when the time arises.
With the complex technologies and
the interrelated dependencies that
we have on the information systems
that we use today, we're going to be
doing this line of work for a long time
to come, so be prepared to train for a
Page 10 of 11
marathon, not a sprint. Where
possible, build upon or leverage
existing resources and mechanisms
to help you with your incident
management processes. Build a
network of other subject matter
experts who can advise and help you
with your activities, and focus on
endurance, not just speed and easy
solutions.
We expect that you probably have a
number of questions that you hope to
have answered during this training.
If we're successful, we hope to not
only answer many of those questions
but also to inspire new issues and
ideas for you to consider as you
apply this material in managing your
own CSIRTs. Thank you again for
joining us, and good luck.
Page 11 of 11

Weitere ähnliche Inhalte

Ă„hnlich wie Managing Computer Security Incident Response Teams - Introduction

Business continuity in general
Business continuity in generalBusiness continuity in general
Business continuity in general
John Johari
 
The Total Economic Impact of Using ThoughtWorks' Agile Development Approach
The Total Economic Impact of Using ThoughtWorks' Agile Development ApproachThe Total Economic Impact of Using ThoughtWorks' Agile Development Approach
The Total Economic Impact of Using ThoughtWorks' Agile Development Approach
Thoughtworks
 
ISO_6
ISO_6ISO_6
ISO_6
PMI2011
 
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
360 BSI
 

Ă„hnlich wie Managing Computer Security Incident Response Teams - Introduction (20)

Business continuity in general
Business continuity in generalBusiness continuity in general
Business continuity in general
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
BetterCloud Whitepaper: Fixing IT's Blindspots – 8 Critical Security and Mana...
BetterCloud Whitepaper: Fixing IT's Blindspots – 8 Critical Security and Mana...BetterCloud Whitepaper: Fixing IT's Blindspots – 8 Critical Security and Mana...
BetterCloud Whitepaper: Fixing IT's Blindspots – 8 Critical Security and Mana...
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 
Role of the virtual ciso
Role of the virtual cisoRole of the virtual ciso
Role of the virtual ciso
 
All About Cybersecurity Frameworks.pptx
All About Cybersecurity Frameworks.pptxAll About Cybersecurity Frameworks.pptx
All About Cybersecurity Frameworks.pptx
 
All About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pdfAll About Cybersecurity Frameworks.pdf
All About Cybersecurity Frameworks.pdf
 
The Total Economic Impact of Using ThoughtWorks' Agile Development Approach
The Total Economic Impact of Using ThoughtWorks' Agile Development ApproachThe Total Economic Impact of Using ThoughtWorks' Agile Development Approach
The Total Economic Impact of Using ThoughtWorks' Agile Development Approach
 
Mtm8 white paper scenario analysis
Mtm8 white paper   scenario analysisMtm8 white paper   scenario analysis
Mtm8 white paper scenario analysis
 
My skills matrix
My skills matrixMy skills matrix
My skills matrix
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
 
Business Continuity as a Career
Business Continuity as a CareerBusiness Continuity as a Career
Business Continuity as a Career
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Takeaways from a Simulated Cyber Attack
Takeaways from a Simulated Cyber AttackTakeaways from a Simulated Cyber Attack
Takeaways from a Simulated Cyber Attack
 
Scientific Evolution Seminar Catalogue
Scientific Evolution Seminar CatalogueScientific Evolution Seminar Catalogue
Scientific Evolution Seminar Catalogue
 
ISO_6
ISO_6ISO_6
ISO_6
 
IIMK Casebook 2021.pdf
IIMK Casebook 2021.pdfIIMK Casebook 2021.pdf
IIMK Casebook 2021.pdf
 
Best Practices for Implementing Self-Service Analytics
Best Practices for Implementing Self-Service AnalyticsBest Practices for Implementing Self-Service Analytics
Best Practices for Implementing Self-Service Analytics
 
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
Business Continuity & Disaster Recovery Planning, 30 November - 02 December 2...
 
Publishing Strategic Technology for Association of Catholic Publishers
Publishing Strategic Technology for Association of Catholic PublishersPublishing Strategic Technology for Association of Catholic Publishers
Publishing Strategic Technology for Association of Catholic Publishers
 

Mehr von VICTOR MAESTRE RAMIREZ

Mehr von VICTOR MAESTRE RAMIREZ (20)

Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
Intermediate Deep Learning with PyTorch - DataCamp
Intermediate Deep Learning with PyTorch - DataCampIntermediate Deep Learning with PyTorch - DataCamp
Intermediate Deep Learning with PyTorch - DataCamp
 
GestiĂłn de Incidentes de Cibersegurdad - Centro CriptolĂłgico Nacional
GestiĂłn de Incidentes de Cibersegurdad - Centro CriptolĂłgico NacionalGestiĂłn de Incidentes de Cibersegurdad - Centro CriptolĂłgico Nacional
GestiĂłn de Incidentes de Cibersegurdad - Centro CriptolĂłgico Nacional
 
Modernes Leistungsmanagement - Management
Modernes Leistungsmanagement - ManagementModernes Leistungsmanagement - Management
Modernes Leistungsmanagement - Management
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-Council
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - Datacamp
 
Werteorientiertes Management - Management
Werteorientiertes Management - ManagementWerteorientiertes Management - Management
Werteorientiertes Management - Management
 
Artificial Intelligence for Business Leaders
Artificial Intelligence for Business LeadersArtificial Intelligence for Business Leaders
Artificial Intelligence for Business Leaders
 
Hands-on SQL for Data Science - EC-Council
Hands-on SQL for Data Science - EC-CouncilHands-on SQL for Data Science - EC-Council
Hands-on SQL for Data Science - EC-Council
 
Becoming a Network Security Engineer - EC-Council
Becoming a Network Security Engineer - EC-CouncilBecoming a Network Security Engineer - EC-Council
Becoming a Network Security Engineer - EC-Council
 
Implementing Docker Containers with Windows Server 2019
Implementing Docker Containers with Windows Server 2019Implementing Docker Containers with Windows Server 2019
Implementing Docker Containers with Windows Server 2019
 
Unit Testing for Data Science in Python - DataCamp
Unit Testing for Data Science in Python - DataCampUnit Testing for Data Science in Python - DataCamp
Unit Testing for Data Science in Python - DataCamp
 
Project Management Foundations: Risk Management
Project Management Foundations: Risk ManagementProject Management Foundations: Risk Management
Project Management Foundations: Risk Management
 
Project Management Foundations: Communication
Project Management Foundations: CommunicationProject Management Foundations: Communication
Project Management Foundations: Communication
 
Project Management Foundations: Teams
Project Management Foundations: TeamsProject Management Foundations: Teams
Project Management Foundations: Teams
 
Project Management Foundations: Budgets
Project Management Foundations: BudgetsProject Management Foundations: Budgets
Project Management Foundations: Budgets
 

KĂĽrzlich hochgeladen

Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
amitlee9823
 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
Ken Fuller
 
Call Girls Jayanagar Just Call đź‘— 9155563397 đź‘— Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call đź‘— 9155563397 đź‘— Top Class Call Girl Service Ban...Call Girls Jayanagar Just Call đź‘— 9155563397 đź‘— Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call đź‘— 9155563397 đź‘— Top Class Call Girl Service Ban...
only4webmaster01
 
Call Girls Devanahalli Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service B...
Call Girls Devanahalli Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service B...Call Girls Devanahalli Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service B...
Call Girls Devanahalli Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service B...
amitlee9823
 
Call Girls Hoodi Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service BangaloreCall Girls Hoodi Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
amitlee9823
 
➥🔝 7737669865 🔝▻ bhavnagar Call-girls in Women Seeking Men 🔝bhavnagar🔝 Esc...
➥🔝 7737669865 🔝▻ bhavnagar Call-girls in Women Seeking Men  🔝bhavnagar🔝   Esc...➥🔝 7737669865 🔝▻ bhavnagar Call-girls in Women Seeking Men  🔝bhavnagar🔝   Esc...
➥🔝 7737669865 🔝▻ bhavnagar Call-girls in Women Seeking Men 🔝bhavnagar🔝 Esc...
amitlee9823
 
Call Girls Jayanagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Ban...Call Girls Jayanagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Ban...
amitlee9823
 
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
amitlee9823
 
Call Girls Hosur Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hosur Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service BangaloreCall Girls Hosur Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hosur Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
amitlee9823
 
Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
amitlee9823
 

KĂĽrzlich hochgeladen (20)

Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
Nagavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore Es...
 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
 
Personal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando NegronPersonal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando Negron
 
Call Girls Jayanagar Just Call đź‘— 9155563397 đź‘— Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call đź‘— 9155563397 đź‘— Top Class Call Girl Service Ban...Call Girls Jayanagar Just Call đź‘— 9155563397 đź‘— Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call đź‘— 9155563397 đź‘— Top Class Call Girl Service Ban...
 
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdfMiletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
 
Solution Manual for First Course in Abstract Algebra A, 8th Edition by John B...
Solution Manual for First Course in Abstract Algebra A, 8th Edition by John B...Solution Manual for First Course in Abstract Algebra A, 8th Edition by John B...
Solution Manual for First Course in Abstract Algebra A, 8th Edition by John B...
 
Call Girls Devanahalli Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service B...
Call Girls Devanahalli Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service B...Call Girls Devanahalli Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service B...
Call Girls Devanahalli Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service B...
 
Call Girls Hoodi Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service BangaloreCall Girls Hoodi Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hoodi Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptx
 
Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)
Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)
Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)
 
Dubai Call Girls Kiki O525547819 Call Girls Dubai Koko
Dubai Call Girls Kiki O525547819 Call Girls Dubai KokoDubai Call Girls Kiki O525547819 Call Girls Dubai Koko
Dubai Call Girls Kiki O525547819 Call Girls Dubai Koko
 
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls DubaiDark Dubai Call Girls O525547819 Skin Call Girls Dubai
Dark Dubai Call Girls O525547819 Skin Call Girls Dubai
 
➥🔝 7737669865 🔝▻ bhavnagar Call-girls in Women Seeking Men 🔝bhavnagar🔝 Esc...
➥🔝 7737669865 🔝▻ bhavnagar Call-girls in Women Seeking Men  🔝bhavnagar🔝   Esc...➥🔝 7737669865 🔝▻ bhavnagar Call-girls in Women Seeking Men  🔝bhavnagar🔝   Esc...
➥🔝 7737669865 🔝▻ bhavnagar Call-girls in Women Seeking Men 🔝bhavnagar🔝 Esc...
 
Call Girls Jayanagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Ban...Call Girls Jayanagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Ban...
 
Guide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWNGuide to a Winning Interview May 2024 for MCWN
Guide to a Winning Interview May 2024 for MCWN
 
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men  🔝Mirzapur🔝   Escor...
➥🔝 7737669865 🔝▻ Mirzapur Call-girls in Women Seeking Men 🔝Mirzapur🔝 Escor...
 
Call Girls Hosur Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hosur Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service BangaloreCall Girls Hosur Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
Call Girls Hosur Just Call đź‘— 7737669865 đź‘— Top Class Call Girl Service Bangalore
 
Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Chikkabanavara Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
 
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
 
Personal Brand Exploration ppt.- Ronnie Jones
Personal Brand  Exploration ppt.- Ronnie JonesPersonal Brand  Exploration ppt.- Ronnie Jones
Personal Brand Exploration ppt.- Ronnie Jones
 

Managing Computer Security Incident Response Teams - Introduction

  • 1. Managing Computer Security Incident Response Teams Introduction Table of Contents Notices ............................................................................................................................................ 2 Introduction .................................................................................................................................... 2 Purpose ........................................................................................................................................... 3 Intended Audience.......................................................................................................................... 4 Workshop Goals.............................................................................................................................. 5 Workshop Overview ....................................................................................................................... 6 Applying This Material .................................................................................................................... 7 CERT/CC Lessons Learned............................................................................................................... 9 Page 1 of 11
  • 2. Notices 8 Managing CSIRTs © 2020 Carnegie Mellon University [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. Introduction 1 Managing CSIRTs © 2020 Carnegie Mellon University [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. Introduction Managing Computer Security Incident Response Teams (CSIRTs) **001 Hello, and welcome to Managing Computer Security Incident Response Teams. Page 2 of 11
  • 3. Purpose 2 Managing CSIRTs © 2020 Carnegie Mellon University [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. Purpose To provide a common understanding of • workshop goals • how to apply workshop materials for your needs **002 In this introduction module, we'll provide an overview of the goals of this training course, as well as inform you how to use and apply the workshop and training materials for your own particular needs. Page 3 of 11
  • 4. Intended Audience 3 Managing CSIRTs © 2020 Carnegie Mellon University [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. CSIRT managers of all kinds • prospective • new • existing Other individuals • C-level managers (CIOs, CSOs, etc.) • upper management • public affairs or public relations • legal counsel No prerequisite incident handling experience is required for this course. Intended Audience **003 The primary audience that these training materials are intended for are people who have an interest in or who have managed a computer security incident response team for any length of time. Whether you have been a team lead or a manager of an existing CSIRT or you are new in the role of managing a CSIRT, or perhaps you are potentially interested in becoming a manager of a CSIRT in the future, we hope that these materials apply to you. Others who may be interested in this training include not just those that directly manage a CSIRT, but other managers, such as C-level managers, chief information officers or chief security officers; upper management or executives who interact with the CSIRT; public affairs or public relations staff or personnel; human resources; legal counsel; people who Page 4 of 11
  • 5. have a role in other security matters; system and network administrators; and anyone who might interact with the CSIRT. No prior incident handling knowledge or experience is required to take this training. Workshop Goals 4 Managing CSIRTs © 2020 Carnegie Mellon University [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. To provide insight into the type and nature of work CSIRT staff may be expected to handle To provide an overview of the incident response arena • the nature of incident response activities • incident handling processes To help you to understand • technical issues from a management perspective • problems and pitfalls to avoid • best practices where applicable To emphasize the importance of pre-defined policies and procedures To discuss what is needed to operate an effective CSIRT Workshop Goals **004 Our goals for this training are to provide insight into the type and nature of work the CSIRTs may be expected to handle. We will provide an overview of the incident response field, including the nature of incident response activities and an overview of the incident handling processes themselves. We hope to help you understand technical issues from a management perspective and learn from problems and pitfalls that others have encountered as they're managing a CSIRT, highlight best practices where applicable, and other things that have worked well from organizations with CSIRTs. Page 5 of 11
  • 6. You will hear us emphasize again and again the importance of having documented and predefined policies and procedures that relate to your CSIRT operations, and we will share with you ideas and suggestions on what you may need to effectively operate your CSIRT. Workshop Overview 5 Managing CSIRTs © 2020 Carnegie Mellon University [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. Workshop Materials focus on • foundation material, staffing issues • incident management processes • other issues, such as working with law enforcement, insider threat, and publishing information. Workshop Overview **005 The training materials are broken into a series of separate modules covering various topic areas that we feel would be useful for someone to manage a CSIRT more effectively. The first series of modules will cover topic areas such as CSIRT management, the environment, staffing issues, code of conduct, dealing with the news media, and managing a CSIRT infrastructure. The next series of modules will go into the individual incident Page 6 of 11
  • 7. management processes, from helping to better prepare and protect your critical assets, to detect and triage events and incident reports, to respond to those incident reports, and to deal with different major events. After that, we will move into other topic areas and issues, such as publishing and disseminating information, evaluating your CSIRTs, dealing with and being prepared to handle insider threats, and working with law enforcement organizations. References and citations to other resources will also be provided throughout the different training modules. Applying This Material 6 Managing CSIRTs © 2020 Carnegie Mellon University [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. All CSIRTs are different. • One size does not fit all. Take what makes sense for your situation. Refer to your own CSIRT policies and procedures for • appropriate responses and response times • prioritization and escalation criteria Examples and suggestions point out • what has worked well for the CERT/CC and other teams • pitfalls and benefits encountered Applying This Material **006 As we present this material, please keep in mind that our intention is to provide you with ideas Page 7 of 11
  • 8. and suggestions and topics for consideration on things that can help you to manage your CSIRT, but we don't necessarily hope to prescribe how to do that. Many of the topic areas that we'll address will vary depending on your unique and personal situations. CSIRTs can vary from one another, and not one solution will meet all CSIRTs' needs, so we ask you to consider with an open mind any suggestions we offer. Try to adopt whatever makes sense for your particular situation, and perhaps adapt or tailor other ideas as appropriate for your organization. Apply the materials to your own CSIRT and organization and any existing policies or procedures that already are in place for computer security response and other escalation or prioritization criteria. The examples and ideas presented in this training are based on our experiences and what's worked well for our team and other organizations that we've interacted with, and we hope to share with you the benefit of lessons that we've learned, including problems that we've encountered and things that have worked well for us. Page 8 of 11
  • 9. CERT/CC Lessons Learned 7 Managing CSIRTs © 2020 Carnegie Mellon University [DISTRIBUTION STATEMENT A] Approved for public release and unlimited distribution. CERT/CC Lessons Learned Trustworthiness is paramount to the success of your team. You will live or die by your credibility. • Never violate a confidence. • Speak only in facts. • Don’t spread rumors. • Don’t be afraid to say “I don’t know.” CSIRTs should be proactive. • Share information as openly as possible. • Set expectations repeatedly. Be aware that all CSIRTs differ. Recognize that things take time; most CSIRTs • have no authority over their constituency • are third parties to incidents • fail to plan for growth and are soon overwhelmed • take 1-2 years to gain constituency recognition If your CSIRT has no authority, learn to be effective through influence. Train for a marathon, not a sprint. • We will be doing this for a long time. • Plan for the long haul. • Leverage other resources and existing mechanisms. • Build a network of experts who can advise and help. • You will need endurance as well as brilliance. **007 After having worked in this area for over three decades, the CERT Coordination Center at the Software Engineering Institute has learned a number of lessons and would like to share some of those lessons with you before we begin our training today. One of the most important lessons is that recognizing that trustworthiness is going to be paramount to the success of your team. If you are not able to build and maintain the trust and credibility with your constituency, it's going to hamper a lot of the activities that you try to provide to them. If your team is new or just starting out, or if you have limited resources, many organizations find that their CSIRTs spend most of their time being reactive, but if you strive to be Page 9 of 11
  • 10. more proactive, share information as much as possible and repeatedly set expectations with the stakeholders that you deal with, you'll find yourself helping to prevent incidents from happening in the first place to reduce the need to be reactive. As we said, recognize that CSIRTs differ from one another. What works well for one may not work in your situation. If your CSIRT is one that does not have authority to make changes or dictate strategies to respond to incidents, you'll have to learn to be effective through influence and providing value-added services. Also be aware that many of the activities and the things that CSIRTs do may take more time than is expected. Many organizations that are just starting to implement their team or incident management capability find it may take 12 months, 18 months, 24 months or longer before they can plan their CSIRT, implement that CSIRT to become operational, and become recognized with their constituents. So don't be discouraged if things aren't happening as quickly as you expect, and don't be afraid to revise or change your plans or your processes as appropriate when the time arises. With the complex technologies and the interrelated dependencies that we have on the information systems that we use today, we're going to be doing this line of work for a long time to come, so be prepared to train for a Page 10 of 11
  • 11. marathon, not a sprint. Where possible, build upon or leverage existing resources and mechanisms to help you with your incident management processes. Build a network of other subject matter experts who can advise and help you with your activities, and focus on endurance, not just speed and easy solutions. We expect that you probably have a number of questions that you hope to have answered during this training. If we're successful, we hope to not only answer many of those questions but also to inspire new issues and ideas for you to consider as you apply this material in managing your own CSIRTs. Thank you again for joining us, and good luck. Page 11 of 11