-
Order of Volatility
- The order in which you should collect evidence.
-
The Internet Engineering Task Force (IETF) released a document titled, "Guidelines for Evidence Collection and Archiving"
- RFC 3227
- https://www.ietf.org/rfc/rfc3227.txt
-
According to the IETF, the Order of Volatility is as follows:
- Registers, Cache
- Routing Table, ARP Cache, Process Table, Kernel Statistics, Memory
- Temporary File Systems
- Disk
- Remote Logging and Monitoring Data that is Relevant to the System in Question
- Physical Configuration, Network Topology
- Archival Media
-
Chain of Custody
- The chronological documentation or paper trail that records the sequence of custody, control, transfer, analysis, and disposition of physical or electronic evidence.
-
Legal Hold
- A process that an organization uses to preserve all forms of relevant information when litigation is reasonably anticipated.
-
Data Acquisition
-
Capture and Hash System Images
- If a computer’s data is to be used as evidence, the entire drive should be imaged (copied) before it is investigated.
- The imaging process should be secured and logged, and the image itself should be hashed.
- The hashing process should take place before and after the image is created. This will protect the image from tampering and prove the integrity of the image.
-
Network Traffic and Logs
- As part of an investigation, an analyst will review network captures made with a network sniffing program such as Wireshark
- Logs should also be preserved, hashed, and stored, including firewall logs, server logs, and router/switch logs.
-
Capture Video
- Any video surveillance equipment that recorded an incident will need to be analyzed.
- Before doing so, recorded video should be captured to a computer or to an external media device.
- The process should be secured and logged so that a person cannot claim that the evidence has been tampered with.
-
Record Time Offset
- The “real” time should be compared to the time stamp of the video or captured traffic log. The difference between the two is known as the record time offset.
-
Screenshots
- Because a computer being investigated might be compromised, it is usually unwise to use screen-capturing software installed on the affected computer.
- Instead, take actual photos of the various screens you wish to capture using a camera.
-
Witness Interviews
- Witnesses are people who were present during an event and were cognizant of what happened during the event.
- A witness can corroborate evidence that was gathered from video, computer logs, captures, and other technical evidence.
-
Preservation
- Ensuring data is not tampered with or altered
-
Recovery
- Retrieve data, repair systems, re-enable servers and networks, reconstitute server rooms and/or the IT environment, and so on. Damage and loss control comes into play here; it can be a very slow process to make sure that as much data is recovered as possible.
-
Tracking Man-Hours
- Every action that is taken by the investigators of an incident response team should be logged and documented so as to act as a proper audit trail.
- Investigators normally need to sign in before being allowed access to an affected area or computer.
- The total man hours, sign in and sign out times, as well as any expenses incurred should be thoroughly documented. Man hours might be tracked through a computer system.