How to React to a Cyber Incident?
What is a Cyber Incident?
Let’s begin at the beginning, what is a cyber incident? According to NIST, a cyber incident refers to: “An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.”
When dealing with a cybersecurity incident, the organization must be able to react quickly and appropriately. In other words, it is crucial to decide beforehand how to handle certain situations rather than waiting until the first confrontation during an incident. You need to develop a strategy to limit damage, reduce costs and recovery time, as well as communicate with internal and external stakeholders.
The cyber incident response lifecycle
In this section, we are going to discuss the incident response lifecycle. But first, what is this exactly? It is your organization’s step-by-step framework for identifying and reacting to a service outage or security threat.
Phase 1: Preparation
Firstly, comes the preparation. This phase covers the work an organization does to be ready for incident response including putting the right tools and resources in place and training the team. This phase includes the work done to prevent incidents from occurring.
Some of the important points for the preparation phase are:
📌 Develop a response plan in case of a cybersecurity incident and update it regularly
📌 Identify your assets and potential threats
📌 Assign responsibilities and create a team to lead the cybersecurity incident response
📌 Work with external experts that are specialized in cybersecurity incidents
Phase 2: Cyber incident's detection and analysis
Secondly, we have to monitor security events to detect, alert, and report on potential security incidents.
📌 Monitor security events in your environment using firewalls, intrusion prevention systems, and data loss prevention
📌 Detect potential security incidents by correlating alerts within a SIEM solution
📌 Analysts create an incident ticket, document initial findings, and assign an initial incident classification
📌 The reporting process should include accommodation for regulatory reporting escalations.
Phase 3: Containment, Eradication, Recovery
Thirdly, we have to keep the incident impact as small as possible and mitigating service disruptions.
Phase 4: Post-Incident Activity
Finally, learning and improving after an incident is one of the most important parts of incident response yet too often ignored. In this phase, the incident and incident response efforts are analyzed. The goals here are to limit the chances of the incident happening over again and as well as identify ways of improving future incident response activity.
Cyber incident challenges
Organizations face daily attempts to get access to their data or systems. This creates a new form of expertise, which needs to be deployed across the different teams to respond to the following:
📌 Manage intrusions and security incidents
📌 Neutralize or contain the attack
📌 Elaborate intrusion response plan
📌 Gather information on discovered malicious file
📌 Assessment of controls in place
📌 Damage’s evaluation
📌 Keep evidence
📌 Train team to incident handling
📌 Stop data leakage.
TCS-CERT: Computer Security Incident Response Team of Thales
A Computer Security Incident Response team is a bit like the fire brigade except that instead of putting out fires they help organizations contain, neutralize, and eradicate intrusions. Just as fire drills help save lives if a real fire strikes. Along these lines, careful preparation makes it easier to detect, handle and mitigate actual intrusions.
With the expertise of TCS-CERT, you may react in real-time to security incidents. Not to mention that the networking and data intelligence of TCS-CERT also help you improve drastically your threat survey.
The Thales CSIRT helps organizations respond efficiently to IT incidents by providing the following services:
📌 Help customer with incident handling
📌 Malware analysis (Windows, Unix & Mobile)
📌 Prepare and evaluate your incident response plan
📌 Forensic Investigations
📌 Malicious document analysis
📌 Breach analysis
📌 CERT collaboration and intelligence sharing
📌 Server “takedown”
Security Skills:
TCS-CERT is composed of highly experienced security experts who can handle sophisticated attacks and threats.
Intelligence:
TCS-CERT gathers, aggregates, integrates, and analyses intelligence feeds.
Furthermore, TCS-CERT also develops tools to identify threats to your infrastructure.
Networking:
Regarding networking, TCS-CERT is a member of the CERT.LU initiative and an accredited member of Trusted Introducer.
Confidentiality:
TCS-CERT as Thales has held PSF accreditation since 2016.