Lsn 12: Preparing for Incident Response

advertisement
Lesson 12
Preparing for Incident Response
and the
Investigative Process
Overview
• Preparing for Incident Response
• Investigative Guidelines
UTSA IS 6973 Incident Response
Ranum on Forensics
• “The real value of intrusion detection is
diagnosing what is going on…never collect
more data than you could conceivably want
to look at. If you don’t know what to do
with the data, it doesn’t matter how much
you’ve got.”
Marcus Ranum
Network Flight Recorder
UTSA IS 6973 Incident Response
Preparing for Incident Response
Identify Vital Assets
•
•
•
•
What can damage your organization the most?
What concerns you?
Who could be a threat?
Do hackers concern you?
This step saves you time & $ later
UTSA IS 6973 Incident Response
Preparing Systems
• Record cryptographic checksums of critical
files (MD5)
– Tripwire is widely accepted commercial product
•
•
•
•
Increase or enable secure audit logging
Build up your host’s defenses
Backup critical data and store media securely
Educate users about security
UTSA IS 6973 Incident Response
Critical File Preparation
• Cryptographic checksums or Message Digest
(MD)
– Basically a digital signature
• MD5 creates a 128-bit checksum from a large file
• System Administrator can create checksum of
critical file (use separate media) then compare
against subsequent MD5 runs
UTSA IS 6973 Incident Response
Unix Auditing
Turn on system logging
– /var/log/syslog
– Create Central Syslog server
• run syslogd -r
– Enable Process Accounting
• Tracks the command each user executes
– accton command
– /usr/lib/acct/startup
UTSA IS 6973 Incident Response
Windows Auditing
• By default security auditing is not enabled
• NT: Start|Programs|Administrative Tools| User
Manager
– User Manager select Policies|Audit
– Logs => C:\WINNT\System32\Config\*.evt
• WIN2K: Administrative Tools| Local Security
Policy
– Logs => C:\WINNT\System32\Config\*.evt
UTSA IS 6973 Incident Response
Other Steps
• Application Logging
• Backup Critical Data
– Unix: dump, restor, cpio, tar & dd
– WIN2K: Start|Programs|Accessories| System
Utilities| Backup
– NT: NT Backup (NT Resources Kit)
– WIN98: Start|Accessories| System Utilities| Backup
UTSA IS 6973 Incident Response
Network Preparations
• Know your network: document,
document, document
– hardware, software, users
• Smart topology/architecture
• Use access control list (ACL) on
router
UTSA IS 6973 Incident Response
Network Preparations-contd
• Require authentication (host, network,
kerberos, IPsec)
• Audit regularly (manpower intensive)
• Use network time protocol (NTP) to
synchronize all events
UTSA IS 6973 Incident Response
Organizational Preparations
• Institute comprehensive policies
• Institute comprehensive procedures
• Develop response procedures
– Firedrills?
• Create a response toolkit
• Establish an Incident Response Team
• Obtain top-level management support
– Agree to ground rules/ rules of engagement
UTSA IS 6973 Incident Response
Often overlooked
Response Toolkits
• High-end processor w/lots of memory
• Large IDE and SCSI drives
• Backup storage: CD-RW and Tape Drives
• Spare cables
• Router/Hub and network interface card
• Digital camera
• Trusted software
ref: www.computer-forensics.com
UTSA IS 6973 Incident Response
Establish Incident Response Team
• Technical experts
• Management POC
• Team leader/principal investigator
• Decide on mission/goal
“Critical thinking team players who
enjoy hardwork and long hours”
UTSA IS 6973 Incident Response
IR Professional Organizations
Training
Organizations
• WWW.SANS.ORG
• WWW.FOUNDSTONE.COM
• WWW.CERT.ORG
• Information Sharing and
Analysis Centers (ISACs)
• InfraGard
• High Tech Investigation
Association
• Information Systems
Security Association
(ISSA)
• Forum of Incident
Response and Security
Teams (FIRST)
UTSA IS 6973 Incident Response
Investigative Guidelines
Investigative Guidelines
•
•
•
•
Initial assessment
Incident notification checklist
Investigating
Formulating Response Strategy
Initial assessment not always accurate
UTSA IS 6973 Incident Response
Initial Assessment
• What probably happened?
– Uncertainty regins
– Each situation unique
– Need to learn enough to determine course of action
• What is the best response strategy?
– Does it meet pre-established goals/ROEs?
– Does it have management support?
– Will your team need outside help?
UTSA IS 6973 Incident Response
Incident Notification Checklist
• WWW.CERT.ORG
• Collect network maps and know
architecture
• Verify corporate policies
– Many actions can only be taken if appropriate
policies exist
UTSA IS 6973 Incident Response
Investigating the Incident
•
•
•
•
Prime directive: DO NO HARM
Personnel interviews
Hands-on activities
Many suspected incidents turn into nonevents
• Will the investigation do more damage than
the incident itself?
UTSA IS 6973 Incident Response
Investigating the Incident-contd
• Personnel interviews
– System administrators: logs
– Managers: know workforce, critical data
– End-users
• Taking hands-on actions
– Step carefully
– My contaminate “crime scene”
UTSA IS 6973 Incident Response
Formulate Response Strategy
• Declare Incident
• Restore Normal Operations?
– Off-line recovery
– On-line recovery
• Determine public relations play
– “To spin or not to spin?”
UTSA IS 6973 Incident Response
Formulate Response Strategy-contd
• Determine probable attacker
– Internal: handle internally
– External: prosecute?
• Determine Type of Attack
– DOS, Theft, Vandalism, Policy violation,
ongoing intrusion
• Classify victim system
– Critical server/application?
– # of users?
UTSA IS 6973 Incident Response
Closing Thought
• “The biggest problem for 2001 was keeping
servers running MS-Windows products properly
patched. We have numerous servers, and it’s
constant fight to keep up with the patch level and
test to confirm that the new patch doesn’t break
something. This is the same problem for 2002.”
• J.G.
• Peace of mind depends on the action plan
for response.
UTSA IS 6973 Incident Response
Summary
•
•
•
•
•
•
Prepare for Incidents
Build a good team
Rehearse/Practice procedures
Perform initial assessment
Formulate response
Do No Harm
UTSA IS 6973 Incident Response
Download