-
Security Event vs Security Incident
-
Security Event
- Any event that could have potential InfoSec implications.
-
Example:
- A spam email is a security event because it may contain links to malware.
- Organizations may witness thousands of identifiable security events daily.
-
Security Incident
- A security event that could potentially require an investigation from the organization's incident response team.
-
Incident Response
- A set of procedures that an investigator follows when examining a computer security incident.
-
Incident Management
- The monitoring and detection of security events on a computer network and the execution of proper responses to those security events.
-
Incident Response Process
-
Preparation
-
An organization with a well-planned incident response procedure, a strong security posture, and a knowledgeable chief information security officer (CISO) will be able to limit damage:
- Quickly discovering the breach
- Having an internal response team ready to take action
- Quickly obtaining forensics data
- Beginning an incident response plan
-
Identification
- The recognition of whether an event that occurs should be classified as an incident.
- Once identified, you might be required to make contact with other groups or escalate the problem if necessary.
-
Containment
- Isolating the problem
- This phase might also include evidence gathering, and further investigation
-
Eradication
- Removal of the attack or threat
-
Recovery
- Retrieve data, repair systems, re-enable servers and networks.
-
Lessons Learned
- Document the process and make any changes to procedures and processes that are necessary for the future.
- Damage and loss should be calculated and that information should be shared with the accounting department of the organization.
- The affected systems should be monitored for any repercussions.