SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Process One– Key Concepts
Process One – Fundamental Approach




      Process One was specifically developed to assist security incident responders in
      handling the myriad of investigative, remedial, and reporting tasks involved in
      resolving security incidents.
      The first phase of every Process One implementation is the creation of a
      customized Computer Security Incident Response Team process guide. This
      process guide becomes the governing document for the responders, and is
      electronically manifested in the Process One software.
      An understanding of the approach used during the construction of this process
      guide will facilitate a deeper understanding of the system.




  June 17, 2011                                                                          2
The Extended CSIRT Model




 Core CSIRT Team: Core CSIRT team                                    External
 members act as incident coordinators who
 are ultimately responsible for the final             HR
                                                                                       Physical

 resolution of all computer security related
 incidents.                                                        Extended


 Extended CSIRT Team: Extended CSIRT
 team members are individuals within various
 operational departments possessing specific                          Core
                                                  Finance                                     Legal
 skills to assist in case actions and/or having                      CSIRT
 intimate departmental and institutional
 knowledge.


 Individual CSIRT Contributors: Individual                           CSIRT
 CSIRT contributors are assigned specific
                                                        OPS
 actions to complete based on their                                                    Risk

 knowledge, skill sets, and responsibilities.
                                                              Individual Contributor




  June 17, 2011                                                                                   3
Consistent Prioritization




An incident’s priority can be
determined by establishing
the highest level of impact
on the organization using an
established matrix.

In this example, the incident
reflects a “High” priority even
though most impacts are
considered “Low”.




   June 17, 2011                  4
Proper Notification




Now a CSIRT process can
effectively utilize a Reporting
Escalation Matrix to
ascertain which departments
should receive immediate
alerts about an incident.

Process One then
automatically notifies
appropriate personnel when
incidents are created or
escalated.




   June 17, 2011                  5
Establishing Incident Categories



                                                            Email Usage




                                                Personnel
                                                            Internet Usage
                                                            Workstation Usage
                                                            Application Misuse
                                                            Network Probing
            The desired granularity of
            incident categories must be                     Email Spamming




                                              External
                                              Internet
            determined, and then those                      Network Probing

            categories must be defined.                     Denial of Service

            This is important for both                      Logical Attach

            establishing work flows and for
                                                            Legal Hold




                                              Support
            reporting purposes.


                                               Legal
                                                            Forensic Request
                                                            Outside Legal Support

                                              Equipment
                                                            Computing Equipment Loss
                                               Loss of
                                                            Electronic Media Loss
                                                            Paper Media Loss




  June 17, 2011                                                                        6
Determining Available Response Actions




Once an incident has
been properly
categorized, utilizing a
response matrix
ensures that incidents
are handled in a
standard and
repeatable fashion.




   June 17, 2011                         7
Codifying the Response Process




  June 17, 2011                  8
For more information contact:

           Patrick Wynn
           Reclamere, Inc.
           Senior Business Development Director
           patrick@reclamere.com
           410.218.4179




1-Nov-11                                          9

Weitere ähnliche Inhalte

Andere mochten auch

Παρουσίαση για το σεμινάριο "Καλές διδακτικές πρακτικές με έμφαση στην παραγω...
Παρουσίαση για το σεμινάριο "Καλές διδακτικές πρακτικές με έμφαση στην παραγω...Παρουσίαση για το σεμινάριο "Καλές διδακτικές πρακτικές με έμφαση στην παραγω...
Παρουσίαση για το σεμινάριο "Καλές διδακτικές πρακτικές με έμφαση στην παραγω...founes
 
Hoang dinh thang portfolio - PSB college
Hoang dinh thang portfolio - PSB collegeHoang dinh thang portfolio - PSB college
Hoang dinh thang portfolio - PSB collegeGee Media
 
ζωγραφικη
ζωγραφικηζωγραφικη
ζωγραφικηfounes
 
Γ ΕΠΑΛ - Προγραμματισμός Υπολογιστών - Δομή Ακολουθίας
Γ ΕΠΑΛ - Προγραμματισμός Υπολογιστών - Δομή ΑκολουθίαςΓ ΕΠΑΛ - Προγραμματισμός Υπολογιστών - Δομή Ακολουθίας
Γ ΕΠΑΛ - Προγραμματισμός Υπολογιστών - Δομή Ακολουθίαςfounes
 
highway engineering
 highway engineering highway engineering
highway engineeringGowtham Raja
 
strength of materials
strength of materialsstrength of materials
strength of materialsGowtham Raja
 
Water pollution and treatment PPT
Water pollution and treatment PPTWater pollution and treatment PPT
Water pollution and treatment PPTGowtham Raja
 

Andere mochten auch (8)

Παρουσίαση για το σεμινάριο "Καλές διδακτικές πρακτικές με έμφαση στην παραγω...
Παρουσίαση για το σεμινάριο "Καλές διδακτικές πρακτικές με έμφαση στην παραγω...Παρουσίαση για το σεμινάριο "Καλές διδακτικές πρακτικές με έμφαση στην παραγω...
Παρουσίαση για το σεμινάριο "Καλές διδακτικές πρακτικές με έμφαση στην παραγω...
 
Hoang dinh thang portfolio - PSB college
Hoang dinh thang portfolio - PSB collegeHoang dinh thang portfolio - PSB college
Hoang dinh thang portfolio - PSB college
 
ζωγραφικη
ζωγραφικηζωγραφικη
ζωγραφικη
 
Γ ΕΠΑΛ - Προγραμματισμός Υπολογιστών - Δομή Ακολουθίας
Γ ΕΠΑΛ - Προγραμματισμός Υπολογιστών - Δομή ΑκολουθίαςΓ ΕΠΑΛ - Προγραμματισμός Υπολογιστών - Δομή Ακολουθίας
Γ ΕΠΑΛ - Προγραμματισμός Υπολογιστών - Δομή Ακολουθίας
 
highway engineering
 highway engineering highway engineering
highway engineering
 
strength of materials
strength of materialsstrength of materials
strength of materials
 
surveying ii
surveying iisurveying ii
surveying ii
 
Water pollution and treatment PPT
Water pollution and treatment PPTWater pollution and treatment PPT
Water pollution and treatment PPT
 

Process One Key Understandings Updated 11.01.2011

  • 2. Process One – Fundamental Approach Process One was specifically developed to assist security incident responders in handling the myriad of investigative, remedial, and reporting tasks involved in resolving security incidents. The first phase of every Process One implementation is the creation of a customized Computer Security Incident Response Team process guide. This process guide becomes the governing document for the responders, and is electronically manifested in the Process One software. An understanding of the approach used during the construction of this process guide will facilitate a deeper understanding of the system. June 17, 2011 2
  • 3. The Extended CSIRT Model Core CSIRT Team: Core CSIRT team External members act as incident coordinators who are ultimately responsible for the final HR Physical resolution of all computer security related incidents. Extended Extended CSIRT Team: Extended CSIRT team members are individuals within various operational departments possessing specific Core Finance Legal skills to assist in case actions and/or having CSIRT intimate departmental and institutional knowledge. Individual CSIRT Contributors: Individual CSIRT CSIRT contributors are assigned specific OPS actions to complete based on their Risk knowledge, skill sets, and responsibilities. Individual Contributor June 17, 2011 3
  • 4. Consistent Prioritization An incident’s priority can be determined by establishing the highest level of impact on the organization using an established matrix. In this example, the incident reflects a “High” priority even though most impacts are considered “Low”. June 17, 2011 4
  • 5. Proper Notification Now a CSIRT process can effectively utilize a Reporting Escalation Matrix to ascertain which departments should receive immediate alerts about an incident. Process One then automatically notifies appropriate personnel when incidents are created or escalated. June 17, 2011 5
  • 6. Establishing Incident Categories Email Usage Personnel Internet Usage Workstation Usage Application Misuse Network Probing The desired granularity of incident categories must be Email Spamming External Internet determined, and then those Network Probing categories must be defined. Denial of Service This is important for both Logical Attach establishing work flows and for Legal Hold Support reporting purposes. Legal Forensic Request Outside Legal Support Equipment Computing Equipment Loss Loss of Electronic Media Loss Paper Media Loss June 17, 2011 6
  • 7. Determining Available Response Actions Once an incident has been properly categorized, utilizing a response matrix ensures that incidents are handled in a standard and repeatable fashion. June 17, 2011 7
  • 8. Codifying the Response Process June 17, 2011 8
  • 9. For more information contact: Patrick Wynn Reclamere, Inc. Senior Business Development Director patrick@reclamere.com 410.218.4179 1-Nov-11 9