CFC Week 9: Incident Management

CFC Week 9: Incident Management

Learning outcomes

  • Explain the Incident Management process.
  • List the elements of the logging process.
  • Describe the life cycle of events.

What is the incident?

is an unexpected event that disrupts the normal operation of a system

What is the objective of the incident management process?

is to return the service to normal operation as quickly as possbile after disruption

What is the aim of incident management process?

create as little negative impact as possbile on the business

What are two modes of operations in incident management process?

  1. In practice : find a temporal workaround to ensure services are up and running

  2. In parallel : - investigate the incident

    • identify the cause root
    • find a permanent fix

What are frameworks used to tackle incidents?

ITIL
  • Information technology infrastructure library
  • uses a workflow for efficient resolution

What are incident management workflow?

  1. Incident management
  2. Logging

Streamlined processes

  1. Categorisation
  2. Prioritisation
  3. Response

Follow corporations’ guidelines

  1. Diagnosis

  2. Escalation

  3. Resolution and recovery

  4. closure

What is Incident identification in incident management workflow?

Incidents are generally reported when attacks or incidents have been identified

Unreported incidents
False negative, pose a systematic risk to the organisation
Mistakenly reported incidents
False positives, when the system begin to report anomalous behaviours?

Where does incident identification start with?

It start with identify through the automated/manual analysis of digital artefacts and logs

What is logging process in incident management workflow?

  • Logging is the process in which systems and applications inform about “what they do.”
  • Useful to administrators to check when something goes wrong

Does incident management workflow always start with analysis of digital artefacts and logs?

Incidents are often discovered by the user of the system

  • they notice that something is abnormal
  • they simply see evidence of an attack

What are the most important elements of the logging process?

The most important one is the event.

Event
a single occurrence within an environment
  • consists of event fields and event records
  • event fields describe characteristic of the event
  • event records describe a collection of event fields

What is Log in logging process?

Log
a collection of event records
  • data logs
  • log files

What is Audit in logging process?

Audit
process of evaluating logs

What is Recording in logging process?

Recording
Process of tracking event fields (“I am going to track an IP address”)

What is Logging in logging process

Logging
is the process of saving events into logs

What is Security incident in logging process

Security incident
is the occurrence of a security event (intrusion attempt or data leakage)

What is the lifecycle of events?

  • turn information from unstructured logs with low-level descriptions of the characteristics of events

  • into a high-level representation of actionable events, namely alarms

  • The first funnel filters

      1. decentralised logs into centralised logs
      1. then turn into normalised logs
      1. then into the second funnel
  • The second funnel produces alarms through

    • log filtering
    • aggregation,
    • correlation
    • finally trigger the alarms
  • Final alarms supported by

    • false alarm reduction
    • attack strategy analysis
    • prioritisation

What are Alarms?

Alarms
  • are meant to be reported to humans
  • alarms help security operator analyse the strategy of an attack and prioritise responses.
Intrusion detection system should be configured in such a way that false alarms are minimised

What is normalisation of logs?

is the procedure in which

  • all logs that are processed by an intrusion detection system
  • are processed and stored in a common format
  • and all relevant attributes of the event are identified and processed

What is event correlation?

Event correlation brings a higher level of intelligence to the process

It teaches the system to consider various conditions before trigger the alarm

What is the Security information management (SIM)?

The practice of collecting, monitoring and analysing security-related data from computer logs.

What is the Security information management system (SIMS)?

  1. It automates the collection of event log data from security devices
  2. It translates the logged data into correlated and simplified formats
  3. It has strong log management capabilities (compress logs for storing over long periods of time)

What is the Security event management (SEM) systems?

It provides strong:

  • event management
  • real time threat analysis
  • visualisation
  • ticketing
  • incident response
  • and security operations

Based on enterprise SQL databases

Not ideal for log management and long-term storage of excessive amounts of logs (poor at log compression)

What is the (OSSIM)?

How Open Source Security Information Management (OSSIM) evaluates the risks?

Risk = (Asset * Priority * Reliability) /25
Asset
  • is the quantitative measure of the importance
  • and/or a notion of how vulnerable a given asset is
Priority
is the threat or impact of the attack
Reliability
is the probability that a given set of events will actually be an attack
  • Asset - 0 - 5
  • Priority - 0 - 5
  • Reliability - 0 - 10
  • 0 - 2 = Low
  • 3 - 4 = Medium
  • 5 - 6 = Medium-high
  • 7 - 8 = High
  • 9 - 10 = Very high

How forensics cooperate with SIEM?

forensic investigator would collect the evidence from the source, the native logs.

What is the Sensing strategies?

It defines how the SIEM is deployed.

It details:

  • Where to place the different sensors

  • how these sensors are interconnected

  • what the security measures are

  • who the people in charge of each sensor are

    • collectors,
    • normalisers
    • aggregators
    • Intrusion Detection Systems and correlation and report engines

Licensed under CC BY-NC-SA 4.0
Last updated on May 09, 2022 10:37 +0100
comments powered by Disqus
Cogito, ergo sum
Built with Hugo
Theme Stack designed by Jimmy