Threat Intelligence Defined Four Approches to Critical

Four Approches
Threat
Intelligence
to Defined
Critical Incident
Response
White
Paper
Executive
Brief
Tables of Contents
Selecting the Best Fit for the Enterprise
Introduction3
3
Assessing
the
Four
Approaches
to
Incident
Response
4
Benefits of On-Premise SIEM Solutions—Security and Privacy
Making
Most
of Incident
Response
Capabilities
6
Benefitsthe
of an
MSSP
— Efficiency,
Scalability
and Intelligence
4
Benefits of On-Premise SIEM Solutions—Security and Privacy
7
Appendix8
Risk Assessments
Four
Approaches to
forCritical
HealthIncident
Care Providers
Response
2
Selecting the Best Fit for the Enterprise
Even those in the security business know preventive security
measures are not enough to stop malware infiltrations and other
security threats completely. Security technology fulfills a vital
role in the IT infrastructure, but it’s only a matter of when - not
if - an organization is breached in some manner. A data breach, a
malware outbreak, a successful hacker infiltration, a DDoS attack…
many have experience trying to slay one of these cyber dragons,
while others have yet to deal with one, or may not even know
they’ve suffered from an incident.
Critical Incident Response is
the security industry term
for mitigating a cyber threat.
Security experts have long
advocated that detailed
incident response plans be
created, maintained and
practiced to strengthen
an organization’s ability
“It does not do to leave a live dragon out of your calculations,
if you live near him.”
to detect and mitigate an
attack. Not every enterprise,
– J.R.R. Tolkien, The Hobbit
When calculating security spending, most organizations emphasize security
controls to a much greater extent than monitoring and incident response.
Bringing more balance to this spending ratio and a more proactive approach
to critical incident response could mean the difference between crippling
after-effects of a breach and a manageable effort to thwart attacks and properly
investigate.
however, has the same
requirements, budget and
in-house security resources.
NTT Security research has
identified four primary
ways organizations typically
approach incident response:
• No response plan and no
external support from a
Aligning Critical Incident Response to the Organization
Taking a proactive approach to incident response can drastically improve an
organization’s security posture. Security frameworks and some compliance
mandates also require organizations to have a security program and an incident
response plan. While every enterprise may strive for a mature incident response
plan backed by a skilled security operations team, this is not a realistic goal for
many organizations. Is it possible to still identify, contain and mitigate an attack
without the most robust incident response plan and team in place? Yes, to a
degree.
third party.
• No response plan, but
keep a third party on
retainer for response in
the event of a breach.
• Have a response plan that
is still maturing; hire a
third party to evaluate the
incident response process
and remain on standby to
Successful incident response largely depends on creating a customized incident
response plan that is realistic and manageable — then training and preparing
employees and practicing the steps outlined in the plan.
mitigate threats.
• Maintain a mature
incident response plan, a
skilled security operations
The First Step in Critical Incident Response—Know your Organization
team and retain thirdparty support when
“Know thyself.”
needed.
– Ancient Greek aphorism
Throughout history, military commanders have known that highly attuned
self-awareness is one of the best defenses against attacks. Armed with the
Four Approaches to Critical Incident Response
3
knowledge of specific weaknesses, organizations can work to outsmart the
enemy’s plan of attack. The same principles can drive an effective incident
response plan, customized around the most critical data and systems, for a
particular organization.
Security frameworks and compliance mandates can be helpful guideposts for
establishing a critical incident response capability, but they are not meant for
cutting and pasting into a company’s plan. Similarly, industry checklists and
ISO standards provide helpful insight into common vulnerabilities, but do not
complete the picture. The security team should study the guidelines and standards that most closely affect the business, then go a step further to identify
the specific and customized points of intersection with the organization’s IT and
business operations.
Analysis by NTT Group
shows that 74 percent of the
organizations NTT Group
supported with incident
response engagements
during 2014 had no
policy, plan, procedure
or contracted support to
address a major incident.
Regardless of where an organization falls along the continuum of incident
response capabilities, there are options to be as prepared as possible to
contend with a security breach. The four approaches outlined below can help an
organization determine where it stands and what it can do to be proactive.
Assessing the Four Approaches to
Incident Response
Level one – no response plan, no external support
Having no plan for critical incident response is not advisable, but unfortunately,
this approach is far too common. Many organizations do not have the time or
resources to develop or test response plans. If a qualified third party can be
engaged to either develop a response plan, or provide support in the event of
an incident, that can help prevent the worst effects of a breach. However, many
of the same organizations that lack an incident response plan also lack budget
for external incident response management or support. Analysis by NTT Security shows that 74 percent of the organizations NTT Security supported with
incident response engagements during 2014 had no policy, plan, procedure or
contracted support to address a major incident.1
Even without budget for incident response, there are proactive measures
to take. For example, an organization can identify an internal resource that
recognizes and accepts the real risk of a breach. This resource can make sure
the company is following the industry and federal guidelines required. And
the organization can at least talk with a third-party incident response provider
about where its logs are located, how far back they go, how easily they can be
accessed and other capabilities that will be quickly needed during a breach. For
very little investment, a third party can conduct a simple discovery that helps
prepare the organization to answer questions that arise following an incident.
1 2015 NTT Group Global Threat Intelligence Report, p.6
Four Approaches to Critical Incident Response
4
Level two – no response plan, but engaged with outside support
Some organizations realize the value of incident response, even if they lack
the capabilities to create and maintain a response plan internally. These businesses proactively invest in third-party incident response support. Typically,
organizations which have smaller in-house IT resources will contract with
incident response providers who specialize in supporting organizations without
response capabilities. This can be of great value, but the contracting entity must
realize it still has a role to play should an incident occur.
For example, when a security breach is detected, what are the protocols for
capturing and preserving vital attack data? How will the organization engage at
a tactical level with its incident response provider in terms of providing essential
logs, packet captures and volatile memory dumps while knowing when to and
when not to run security tools that can taint evidence? A structured working
agreement should be created and periodically reviewed and tested to ensure
both parties are poised to detect, mitigate and contain a security incident.
Why a CSIRT? Learn what
a critical security incident
response team brings to an
organization. Read this NTT
Security Blog:
https://www.solutionary.
com/resource-center/
blog/2014/06/why-a-csirt/
Level three – working to strengthen an existing response plan and
hiring a third party to evaluate and support incident response
Over the past year, NTT Security has identified a positive trend related to how
organizations mitigate the impact of threats.2 Some organizations have started
to invest more heavily in incident response capabilities. These organizations
have a renewed focus on the development of plans, processes, procedures,
tools and education related to incident response. Many enterprises find value
in engaging third-party providers for continued support while they are building
and testing response capabilities in-house. Qualified third-party incident
response providers bring a wealth of technical security expertise to incident
response, especially when it comes to handling forensics, which can involve
specialized tools and skills. They can also evaluate the organization’s current
incident response plan, identify gaps and assist with planning, procedures and
policy development.
When a third-party incident response provider is on retainer and familiar with
the organization’s incident response procedures, it becomes another security
tool in the arsenal. Acting as the Computer Security Incident Response Team
(CSIRT), the third-party experts augment the efforts of internal responders to
contain computer security incidents. This extended team helps the organization
prevent and mitigate major incidents and supports the protection of valuable
assets. It functions as a main technical component within the organization’s
incident response plan.
Even when engaging a CSIRT to support incident response for the organization,
the working relationship should serve the unique needs of the business. No two
enterprises are likely to operate in the exact same manner, so CSIRT operating
agreements should reflect this uniqueness.
2 2015 NTT Group Global Threat Intelligence Report, p. 42
Four Approaches to Critical Incident Response
5
Level Four – maintaining a mature incident response plan with external
support as needed
Few organizations have the capability, talent and financial backing to define,
build, refine and maintain an effective incident response capability on their own.
It requires a consistent effort to monitor security threats and repeatedly practice incident response procedures, refining them as needed to best protect the
enterprise. Even in cases where incident response capabilities are successfully
handled by an internal team, NTT Security still observes circumstances where
special expertise is needed to support advanced response requirements.3 For
instance, many internal incident response teams do not maintain expensive
forensics toolsets required to identify the root cause of a breach. Nor do they
have the necessary skills and experience to ensure that forensic evident can
stand up in court. Some organizations will engage a qualified third-party incident
response provider to assist in these situations.
The advantages of engaging
a qualified CSIRT on retainer
include:
• A centralized point of
coordination for handling
IT security issues within
the organization.
• The use of expert incident
response resources for
events that require a
Making the Most of Incident Response
Capabilities
Organizations are starting to realize that security technology investments run
by system and network administrators cannot always protect business assets.
By selecting the best possible approach to incident response they can afford,
enterprises should spend dramatically less time reacting and also help significantly reduce the impact and cost associated with security incidents.
An effective incident response plan will define the following activities before an
attack occurs:
••
Identify the incident response team, along with roles and responsibilities.
••
Document contact information for relevant vendors and third parties, such
as ISP tech support, and define how they fit into the process.
••
Identify any required skillsets which do not exist within the organization and
determine how missing skills will be obtained and utilized from a qualified
third party.
••
Define processes for effective communication during incidents.
••
Set criteria for declaring when an incident has started and ended.
A critical incident response team and capability cannot be developed and made
operational overnight. Creating the plans and processes for the team is a significant endeavor. It is, however, worth the effort. Proactive implementation of core
incident response capabilities can improve an organization’s ability to detect,
investigate and respond to incidents—leading to faster attack mitigation and
containment and an overall reduction in losses resulting from a security breach.
specialized tool set, such
as forensics investigations.
• More efficient, effective
incident response and
recovery, which directly
reduces the financial
effects and softens the
impact (brand/reputation)
of an attack.
• Knowledge and
understanding of legal
issues concerned with
proper evidence handling
along with competent
computer forensics
analysis. This ensures
evidence is prepared in a
manner that can stand up
in potential litigation.
• Access to emerging
developments in the cyber
security field as well as a
plethora of intelligence
data to correlate incidents
to actor groups and recent
behaviors.
3 2015 NTT Group Global Threat Intelligence Report, p. 43
Four Approaches to Critical Incident Response
6
NTT Security seamlessly delivers cyber resilience by enabling organizations to build high-performing and effective
security, and risk management programs with controls that enable the increasingly connected world and digital
economy to overcome constantly changing security challenges. Through the Full Security Life Cycle, we ensure that
scarce resources are used effectively by providing the right mix of integrated consulting, managed, cloud, and hybrid
services – delivered by local resources and leveraging our global capabilities. NTT Security is part of the NTT Group
(Nippon Telegraph and Telephone Corporation), one of the largest information and communications technology (ICT)
companies in the world. For more information, visit www.nttsecurity.com.
2050EB 9/16