Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 249 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
249
Dung lượng
1,9 MB
Nội dung
Defining Incident
Management Processes
for CSIRTs:AWorkin
Progress
Chris Alberts
Audrey Dorofee
Georgia Killcrece
Robin Ruefle
Mark Zajicek
October 2004
TECHNICAL REPORT
CMU/SEI-2004-TR-015
ESC-TR-2004-015
Pittsburgh, PA 15213-3890
Defining Incident
Management Processesfor
CSIRTs: AWorkinProgress
CMU/SEI-2004-TR-015
ESC-TR-2004-015
Chris Alberts
Audrey Dorofee
Georgia Killcrece
Robin Ruefle
Mark Zajicek
October 2004
Networked Systems Survivability Program
Unlimited distribution subject to the copyright.
This report was prepared for the
SEI Joint Program Office
HQ ESC/DIB
5 Eglin Street
Hanscom AFB, MA 01731-2116
The ideas and findings in this report should not be construed as an official DoD position. It is published in the interest of
scientific and technical information exchange.
FOR THE COMMANDER
Christos Scondras
Chief of Programs, XPK
This work is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a
federally funded research and development center sponsored by the U.S. Department of Defense.
Copyright 2004 Carnegie Mellon University.
NO WARRANTY
THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS
FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY
KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO,
WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED
FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF
ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.
Use of any trademarks in this report is not intended in any way to infringe on the rights of the trademark holder.
Internal use. Permission to reproduce this document and to prepare derivative works from this document for internal use is
granted, provided the copyright and "No Warranty" statements are included with all reproductions and derivative works.
External use. Requests for permission to reproduce this document or prepare derivative works of this document for external
and commercial use should be addressed to the SEI Licensing Agent.
This work was created in the performance of Federal Government Contract Number F19628-00-C-0003 with Carnegie Mel-
lon University for the operation of the Software Engineering Institute, a federally funded research and development center.
The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose the work,
in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the copy-
right license under the clause at 252.227-7013.
For information about purchasing paper copies of SEI reports, please visit the publications portion of our Web site
(http://www.sei.cmu.edu/publications/pubweb.html).
CMU/SEI-2004-TR-015 i
Table of Contents
Preface ix
Acknowledgements xiii
Abstract xv
1 Introduction 1
1.1 Definition of a CSIRT 1
1.2 Definition of IncidentManagement 2
1.3 Who Performs IncidentManagement 5
1.4 A Process Model forIncidentManagement 8
1.5 Purpose of this Report 9
1.6 Scope of this Report 10
1.7 Intended Audience 11
1.8 Use of this Report 12
1.9 Structure of the Report 13
1.10 Reading and Navigating this Report 14
2 IncidentManagement Concepts and Processes 15
2.1 IncidentManagement Requirements 15
2.2 Overview of IncidentManagementProcesses 16
2.3 Why We Chose These Processes 19
2.4 IncidentManagement Versus Security Management 23
2.5 Applying These IncidentManagement Concepts and Processes 27
2.6 Getting Started 34
2.7 Detailed Workflow Diagrams and Descriptions 35
3 Overview of Process Mapping 37
3.1 What is Process Mapping? 37
3.2 Applying Process Mapping to IncidentManagement 38
3.3 Our Process Mapping Methodology 39
3.3.1 Additional Uses for the Workflow Model 41
ii CMU/SEI-2004-TR-015
3.4 Guide to Reading the IncidentManagement Process Maps 42
3.4.1 Workflow Diagrams 42
3.4.2 Workflow Descriptions 46
4 IncidentManagement Process Workflows and Descriptions 49
4.1 Overview 49
4.2 IncidentManagement 50
4.2.1 PC: Prepare/Sustain/Improve Process (Prepare) 54
4.2.1.1 PC: Prepare/Sustain/Improve Workflow Diagram 56
4.2.1.2 PC: Prepare/Sustain/Improve Workflow Description 58
4.2.1.3 Handoff from Any Activity Inside or Outside CSIRT
Process to PC: Prepare/Sustain/Improve 68
4.2.1.4 Handoff from PC: Prepare/Sustain/Improve to PI: Protect
Infrastructure 72
4.2.2 PI: Protect Infrastructure Process (Protect) 76
4.2.2.1 PI: Protect Infrastructure Workflow Diagram 80
4.2.2.2 PI: Protect Infrastructure Workflow Description 82
4.2.2.3 Handoff from Any Activity Inside or Outside CSIRT
Process to PI: Protect Infrastructure 86
4.2.2.4 Handoff from PI: Protect Infrastructure to D: Detect
Events 90
4.2.3 D: Detect Events Process 94
4.2.3.1 Reactive Detection 94
4.2.3.2 Proactive Detection 94
4.2.3.3 Detect Events Details 95
4.2.3.4 D: Detect Events Workflow Diagram 98
4.2.3.5 D: Detect Events Workflow Description 100
4.2.3.6 Handoff from Any Activity Inside or Outside of the
Organization to D: Detect Events 104
4.2.3.7 Handoff from D: Detect Events to T: Triage Events 108
4.2.4 T: Triage Events (Triage) Process 112
4.2.4.1 T: Triage Events Workflow Diagram 116
4.2.4.2 T: Triage Events Workflow Description 118
4.2.4.3 Handoff from T: Triage Events to R: Respond 122
4.2.5 R: Respond Process 128
4.2.5.1 Technical Response 128
4.2.5.2 Management Response 129
4.2.5.3 Legal Response 129
4.2.5.4 Coordination of Response Activities 129
4.2.5.5 R: Respond Workflow Diagram 132
4.2.5.6 R: Respond Workflow Description 134
4.2.5.7 Handoff from R: Respond to PC:
Prepare/Sustain/Improve 140
CMU/SEI-2004-TR-015 iii
4.2.5.8 R1: Respond to Technical Issues
Workflow Diagram 144
4.2.5.9 R2: Respond to Management Issues
Workflow Diagram 148
4.2.5.10 R3: Respond to Legal Issues Workflow Diagram 152
5 Future Work 157
Bibliography 161
Appendix A: Context for Each of the Process Workflows A-1
Appendix B: Acronyms B-1
Appendix C: Glossary C-1
Appendix D: One-Page Versions of the Process Workflow Diagrams D-1
Incident Management Workflow Diagram D-2
PC: Prepare/Sustain/Improve Workflow Diagram D-3
PI: Protect Infrastructure Workflow Diagram D-4
D: Detect Events Workflow Diagram D-5
T: Triage Events Workflow Diagram D-6
R: Respond Workflow Diagram D-7
R1: Respond to Technical Issues Workflow Diagram D-8
R2: Respond to Management Issues Workflow Diagram D-9
R3: Respond to Legal Issues Workflow Diagram D-10
Appendix E: One-Page Versions of the Process Workflow Descriptions
and Handoffs E-1
PC: Prepare/Sustain/Improve E-2
Handoff from Any Activity Inside or Outside CSIRT Process to PC:
Prepare/Sustain/Improve E-7
Handoff from PC: Prepare/Sustain/Improve to PI: Protect
Infrastructure E-8
PI: Protect Infrastructure Workflow Description E-9
Handoff from Any Activity Inside or Outside CSIRT Process to PI:
Protect Infrastructure E-11
Handoff from PI: Protect Infrastructure to D: Detect Events E-12
Detect Events Workflow Description E-13
Handoff from Any Activity Inside or Outside of the Organization to
D: Detect Events E-15
Handoff from D: Detect Events to T: Triage Events E-16
T: Triage Events Workflow Description E-17
Handoff from T: Triage Events to R: Respond E-19
Respond Process Workflow Description E-21
Handoff from R: Respond to PC: Prepare/Sustain/ Improve E-24
iv CMU/SEI-2004-TR-015
CMU/SEI-2004-TR-015 v
List of Figures
Figure 1: CSIRT Services 4
Figure 2: Defining the Relationship between Incident Response, Incident Handling,
and IncidentManagement 4
Figure 3: Five High-Level IncidentManagementProcesses 18
Figure 4: Operational Comparison of Incident and Security Management 25
Figure 5: Overlap of Security Management, Incident Management, and IT
Operations 26
Figure 6 Example of an IncidentManagement Workflow Diagram 27
Figure 7 Example of an IncidentManagement Workflow Description 28
Figure 8: Example of Swim-Lane Chart Showing a Specific Instantiation of an
Incident Handling Capability Derived from the Detect, Triage, and
Respond Process Workflows and Descriptions 33
Figure 9: Process Map Example 38
Figure 10: Merging Workflows Triggering an Activity 45
Figure 11: Separate Workflows Triggering an Activity 45
Figure 12: Process Decisions and Alternative Branches 46
Figure 13: IncidentManagement Workflow Diagram 52
Figure 14: PC: Prepare/Sustain/Improve Workflow Diagram 56
Figure 15: PI: Protect Infrastructure Workflow Diagram 80
Figure 16: D: Detect Events Workflow Diagram 98
Figure 17: T: Triage Events Workflow Diagram 116
Figure 18: R: Respond Workflow Diagram 132
Figure 19: R1: Respond to Technical Issues Workflow Diagram 146
Figure 20: R2: Respond to Management Issues Workflow Diagram 150
Figure 21: R3: Respond to Legal Issues Workflow Diagram 154
vi CMU/SEI-2004-TR-015
[...]... processes that outline the main functions and activities required for a successful incidentmanagement capability The model, with the appropriate guidance and supporting materials, can then be used by an organization to plan a new capability, benchmark their current capability, and provide a path for improving and expanding the capability Because of the variety of ways that incidentmanagement capabilities... 1.4 A Process Model forIncidentManagement As mentioned previously, many organizations are looking for guidance on how to structure and implement an incidentmanagement capability Also, many existing teams are looking for a way to benchmark their existing structure and processes and evaluate the quality of their incidentmanagement efforts Our work and observations have led us to the belief that organizations... activities are often performed across multiple parts of the organization, including the CSIRT, as well as across multiple organizations such as contractors and service providers • A capability for providing incidentmanagement activities can take many forms; a CSIRT is one type of incidentmanagement capability Often when working with a newly forming CSIRT or an organization wishing to develop an incident management. .. that outline the various incidentmanagementprocesses Based on this model, methodologies for assessing and benchmarking an organization’s incidentmanagementprocesses can be developed This methodology and resulting assessment instrument will enable organizations to evaluate their incidentmanagement performance and also allow CSIRTs to evaluate their performance for the following processes: Prepare/Sustain/Improve... incidentmanagement process workflows.9 1.5 Purpose of this Report This report documents the initial work done to date to define incidentmanagementprocesses It is a first step in providing the framework for creating and operating incidentmanagement capabilities, including CSIRTs As such it can be used as a foundational publication and reference to detail a best practice model forincidentmanagement processes. .. look at incidentmanagement outside of its historical boundaries within the IT department and instead see incidentmanagement as a distributed capability Just like a CSIRT, an incidentmanagement capability can take many forms It can be a set of comprehensive policies and procedures for reporting, analyzing, and responding to computer security incidents It can be an ad hoc or crisis team with defined... national and international teams We then make this body of knowledge and resulting products available through publications, training courses, collaboration, and direct assistance to organizations interested in building or improving incidentmanagement capabilities Incidentmanagement capabilities1 can take many forms—they can be an ad hoc group that is pulled together in a crisis, they can be a defined set... performed in incident handling; incident handling is one of the services provided as part of incidentmanagement Figure 2: Defining the Relationship between Incident Response, Incident Handling, and IncidentManagement As we have continued to workin the security community, we have seen that not all organizations provide the services we associate with CSIRT work or incidentmanagement activities through a. .. incidentmanagement activities in a coordinating CSIRT 1.7 Intended Audience The primary audience for this report is individuals tasked with creating, operating, benchmarking, or evaluating a CSIRT or incidentmanagement capability, including • CSIRT development project team members • CSIRT managers • CSIRT staff • internal, external, and third-party evaluators • MSSPs • regional or national initiatives... believe that although incident handling and incident response are part of that work, the range of work that can be done actually encompasses a larger set of activities that we refer to as incidentmanagement We see a defined difference in scope and leveling between the terms incident response, incident handling, and incidentmanagement 2 CMU/SEI-2004-TR-015 We have outlined the differences between incident . collaboration, and direct assistance to organizations interested
in building or improving incident management capabilities.
Incident management capabilities
1
can. their incident management capability.
Correspondingly, we are asked how best to evaluate and measure the success and quality of
an existing incident management