Miami University Incident Response Policy and Procedures

advertisement
University Incident Response
Policy and Procedures
Index: SOP-1001
DRAFT
William L. Custer
Information Security Policy Manager
Revision E: 1/18/2005
106752710
3/7/2016 10:49:10 PM
Page 1 of 10
“… documented incident response procedures are among the most critical elements of an
effective security program.” Ed Skoudis
106752710
3/7/2016 10:49:10 PM
Page 2 of 10
Abstract
Policy Statement
Critical incidents will occur that require full participation of IT technical personnel as well as divisional leadership
to properly manage the outcome. To accomplish this IT Services will establish a critical incident response
procedures that will ensure appropriate leadership and technical resources are involved to (i) assess of the
seriousness of an incident, (ii) assess the extent of damage, (iii) identify the vulnerability created and (iv) estimate
what additional resources are required to mitigate the incident. It will also ensure that proper follow-up reporting
occurs and that procedures are adjusted so that responses to future incidents are improved.
Summary of Responsibilities
CIO
 Communicate status of critical incidents to the PEC
 Forward briefings to University Communications
IT Services Management
 Distribute Critical Incident Response Policy
Incident Response Working Group (IRWG)
 Assist in development and promotion of policy and procedures
 Select and train incident response team members and coordinators
 Develop a representative inventory of critical incidents
 Declare a critical incident and form a CIRT
Critical Incident Coordinator (CIC)
 Declare a critical incident if it is on the inventory and form a CIRT from a pool of trained members
 Communicate to IT Services Leadership that an incident has been declared and a CIRT formed
Critical Incident Response Team (CIRT)
 Follow the leadership of the CIC
 Develop a plan and
Supporting Groups
 Provide technical and other assistance to CIRT as requested

106752710
3/7/2016 10:49:10 PM
Page 3 of 10
Table of Contents
Section
Page #
1. Introduction ...............................................................................................................................................................5
2. Statement of management commitment.....................................................................................................................5
3. Purpose and objectives of this policy ........................................................................................................................5
4. Scope of this policy ...................................................................................................................................................5
A. This policy applies to University Information Technology Services and all system and services for which it is
responsible. ...............................................................................................................................................................5
B. Nothing in this Incident Response Policy and Procedures document should be taken to be in conflict with the
following higher level policies: ................................................................................................................................5
C. These policies and procedures specifically exclude the following: .....................................................................6
5. Definition of critical incidents and their consequences within the context of the University ....................................6
6. Definition of Appropriate Response to Critical Incidents .........................................................................................6
7. Organizational structure and delineation of roles, responsibilities and levels of authority. .......................................7
A. Incident Response Working Group ......................................................................................................................7
B. Critical Incident Response Team (CIRT) .............................................................................................................7
C. Critical Incident Coordinator (CIC) .....................................................................................................................7
8. Types of Incidents .....................................................................................................................................................7
9. Prioritization or severity rating of incidents ..............................................................................................................7
10. Performance measures ............................................................................................................................................7
11. Reporting and contact forms ...................................................................................................................................8
I. Appendices ................................................................................................................................................................9
II. Glossary ....................................................................................................................................................................9
III. Diagrams................................................................................................................................................................ 10
IV. Bibliography .......................................................................................................................................................... 10
V. Index ....................................................................................................................................................................... 10
106752710
3/7/2016 10:49:10 PM
Page 4 of 10
1. Introduction
A rapid response to incidents that threaten the confidentiality, integrity, and availability of university information
assets, information systems, and the networks that deliver the information, is required to protect those assets.
Without a rapid response, those assets could be compromised and the University could be in violation of Federal,
State, and Local statutes, in violation of its own stated policies, and in violation of trust endowed by its constituents.
Rapid incident response that is consistently applied requires planning to identify clear location of responsibility,
decision points, clear action items and communication channels.
The following advantages will result from a well-conceived plan of response to incidents of this nature (from
Vangelos in Krause and Tipton 2003 Chapter xx):
 Following a predefined plan of action during the confusion of an incident can minimize damage
 Policy decisions made in advance rather than in the heat of the moment will be superior
 Details likely to be overlooked can be documented in the plan
 Non-technical business areas who must also prepare for an incident can give advanced input to the plan
 A plan can communicate the potential consequences of an incident to senior management and garner support
Perhaps the most significant advantage of having an incident response plan is to integrate its policies and procedures
tightly into the overall information security plan, into higher level policy, and related to risk assessment. To quickly
respond to unexpected technical events or incidents, the University’s IT Services department of necessity switches
from a supporting role to a diagnostic and response role based on the Policies and Procedures in this document.
2. Statement of management commitment
The Strategic Plan for Information Technology Services identified improvement of Information Security as a
strategic goal. Management of Information Systems and Services has identified improvement of Incident Response
as a strategic task for attention.
3. Purpose and objectives of this policy
The purpose of these policies and procedures is to provide the basis of appropriate response to incidents that threaten
the confidentiality, integrity, and availability of university information assets, information systems, and the networks
that deliver the information. These policies and procedures underlie the establishment and ongoing deployment of
trained critical incident response teams, formed with the purpose of managing the afore mentioned incidents at the
University. This effort is being taken to improve the response time to incidents, to provide consistent response, and
improve incident reporting.
4. Scope of this policy
A. This policy applies to University Information Technology Services and all system and services for which it is
responsible.
B. Nothing in this Incident Response Policy and Procedures document should be taken to be in conflict with the
following higher level policies:




University Computing Security Policy
Responsible Use Policy
GLB Information Security Plan
Memoranda from the University Counsel
106752710
3/7/2016 10:49:10 PM
Page 5 of 10
C. These policies and procedures specifically exclude the following:




Non-electronic information including paper mail.
Copier and fax.
Physical security.
Contingency planning, business continuity and disaster recovery. Disaster’s are governed by a different set of
policies and declared by a different governing body than Critical Incidents. An event may initially be declared
a ‘Critical Incident’ and subsequently declared to be a ‘Disaster’ by the appropriate body. In this case, a critical
incident response team would be subsumed into the Disaster Recovery process.
5. Definition of critical incidents and their consequences within the context of the University
An incident is any adverse event that threatens the confidentiality, integrity, or availability of university information
assets, information systems, and the networks that deliver the information. Any violation of computer security
policies, acceptable use policies, or standard computer security practices is an incident.
Adverse events may include, denial-of-service attacks, loss of accountability, or damage to any part of the system.
Examples include the insertion of malicious code (e.g. viruses, Trojan horses, or backdoors), unauthorized scans or
probes, successful and unsuccessful intrusions, and insider attacks. See Vangelos.
Incidents as defined above vary in their impact on the University and in the degree of threat they pose; consequently
not all incidents require the same response. Incidents with high impact and high threat involve high risk and great
vulnerability to the University; such high risk incidents are called ‘critical incidents’ and require that a Critical
Incident Response Team (CIRT) be assembled to apply appropriate response. Non-critical incidents are incidents
with either low or acceptable risk. (See chart in Appendix on threat, impact, risk and vulnerability). CIRT and
appropriate response are defined further below.
Non-critical incidents also have appropriate response; however procedures for non-critical incidents are not outlined
in this policy.
An incident is declared to be critical and a CIRT assembled in one of the following ways:
 A member of the Incident Response Steering Team declares it to be critical.
 Critical Incident Coordinator declares it to be critical.
 An appropriate University official declares to be critical.
 NOC staff declares it to be critical because the incident is on a list of critical incidents approved by the Incident
Response Steering Team. See Appendix for this list (to be developed).
6. Definition of Appropriate Response to Critical Incidents
The following items define appropriate response of a CIRT to a critical incident.














Determine if an incident has occurred and the extent of the incident
Select which CIRT members should respond
Assume control of the incident and involve appropriate personnel, as conditions require
Report to management for the decision on how to proceed
Begin interviews
Contain the incident before it spreads
Collect s much accurate and timely information as possible
Preserve evidence
Protect the rights of clients, employees, and others, as established by law, regulations, and policies
Establish controls for the proper collection and handling of evidence
Initiate a chain of custody of evidence
Minimize business interruptions within the organization
Document all actions and results
Creates a communication plan and data sheets for use by IT Services Senior Management
106752710
3/7/2016 10:49:10 PM
Page 6 of 10
 Restore the system
 Conduct a post-incident critique
 Revise response as require
Primarily from Alan Sterneckert, “Incident Response Management”.
7. Organizational structure and delineation of roles, responsibilities and levels of authority.
A. Incident Response Working Group
The Incident Response Working group is the Incident Response Team’s steering committee. They are charged with
establishing the basic policies and procedures which will be employed by the Incident Response Team and may be
called upon to oversee team activities. This group selects the pool of Critical Incident Coordinators and Critical
Incident Response Team members.
B. Critical Incident Response Team (CIRT)
The Critical Incident Response Team (CIRT) is a group of individuals who have been trained in Incident
management, each having distinct response roles. The CIRT works under the direction of the Critical Incident
Coordinator.
C. Critical Incident Coordinator (CIC)
The Critical Incident Coordinator is an individual who is selected to oversee and direct the Critical Incident
Response Team actions as well as to act as the single point of contact for the given incident. The Critical Incident
Coordinator will typically also be responsible for ensuring that specific information is communicated to
management in a timely fashion
8. Types of Incidents
Each incident presents a different problem with regard to identification and response determination. Here is a
sampling of incident types.







Unauthorized entry / Breach
Denial of Service
Malicious code or virus
Inappropriate use
Networking system failures (widespread)
Application or Database failures (widespread)
Multiple types
9. Prioritization or severity rating of incidents
In addition to identifying the type of incident that is underway, it is also important to understand the potential
severity of the incident as well.



Severity 1 – Critical systems
Severity 2 – User system
Severity 3 – Background system, non-critical
10. Performance measures


Response times for Severity 1 incidents
Response times for Severity 2 incidents
106752710
3/7/2016 10:49:10 PM
Page 7 of 10

Response times for Severity 3 incidents
11. Reporting and contact forms
A. Types of reports




Incident declaration
Incident status update
Incident closure and end of recovery
Incident Review
B. Incident Declaration
 Is prepared by a Critical Incident Coordinator
 Specifies the criteria by which the incident was declared critical
 Is communicated to the IT Services senior management as well as to the Incident Response Working Group
C. Incident Status Update Report
D. Incident Closure and End of Recovery Report
E. Incident Review Report
Preparation
• Were controls applicable to the specific incident working properly?
• What conditions allowed the incident to occur?
• Could more education of users or administrators have prevented the incident?
• Were all of the people necessary to respond to the incident familiar with the incident response plan?
• Were any actions that required management approval clear to participants throughout the incident?
Detection
• How soon after the incident started did the organization detect it?
• Could different or better logging have enabled the organization to detect the incident sooner?
• Does the organization even know exactly when the incident started?
• How smooth was the process of invoking the incident response plan?
• Were appropriate individuals outside of the incident response team notified?
• How well did the organization follow the plan?
• Were the appropriate people available when the response team was called?
• Should there have been communication to inside and outside parties at this time; and if so, was it done?
• Did all communication flow from the appropriate source?
Containment
• How well was the incident contained?
• Did the available staff have sufficient skills to do an effective job of containment?
• If there were decisions on whether to disrupt service to internal or external customers, were they made by
the appropriate people?
• Are there changes that could be made to the environment that would have made containment easier or
faster?
• Did technical staff document all of their activities?
Eradication and Recovery
• Was the recovery complete — was any data permanently lost?
• If the recovery involved multiple servers, users, networks, etc., how were decisions made on the relative
priorities, and did the decision process follow the incident response plan?
• Were the technical processes used during these phases smooth?
• Was staff available with the necessary background and skills?
106752710
3/7/2016 10:49:10 PM
Page 8 of 10
I. Appendices
Appendix A – Approved list of critical incidents
II. Glossary
The following terms are defined:
Confidentiality. “Confidentiality provides the ability to ensure that the necessary level of secrecy is enforced at each
junction of data processing and prevention of unauthorized disclosure. This level of confidentiality should prevail
while data resides on systems and devices within the network, as it is transmitted, and once it reaches its
destination.” Harris 2003, p. 55
Integrity. “Integrity is upheld when the assurance of accuracy and reliability of information and systems is
provided, and unauthorized modification of data is prevented.” Harris 2003, p. 55.
Availability. “Systems and networks should provide adequate capacity in order to perform in a predictable manner
with an acceptable level of performance.” Harris 2003, p. 54.
Vulnerability. Vulnerability is a software, hardware, or procedural weakness that may provide an attacker the open
door he is looking for to enter a computer or network and have unauthorized access to resources within the
environment. Vulnerability characterizes the absence or weakness of a safeguard that could be exploited.
Threat. A threat is any potential danger to information systems. The threat is that someone or something will
identify a specific vulnerability and use it against the organization or individual.
Risk. A risk is the likelihood of a threat agent taking advantage of vulnerability. A risk is the possibility and
probability that a threat agent will exploit vulnerability.
Exposure. An exposure is an instance of being exposed to losses from a threat agent. Vulnerability can cause an
organization to be exposed to possible damages.
Countermeasure. A countermeasure, or safeguard, mitigates a potential risk. A countermeasure is a software
configuration, hardware, or procedure that eliminates vulnerability or reduces the risk of a threat agent from being
able to exploit a vulnerability.
106752710
3/7/2016 10:49:10 PM
Page 9 of 10
III. Diagrams
IV. Bibliography
Hare, Chris. “CIRT: Responding to Attack”. In Information Security Management Handbook, edited by Harold F.
Tipton and Micki Krause. Auerbach, 2003
Harris, Shon. All In One CISSP Certification. Second Edition. McGraw-Hill, 2003.
Shaurette, Ken M. “The Building Blocks of Information Security”. In Information Security Management
Handbook, edited by Harold F. Tipton and Micki Krause. 4 th ed, Vol II. Auerbach, 2001.
Skoudis, Ed. “Hacker Tools and Techniques”. In Information Security Management Handbook, edited by Harold F.
Tipton and Micki Krause. 4th ed, Vol II. Auerbach, 2001.
Sterneckert, Alan B. “Incident Response Management”. In Information Security Management Handbook, edited by
Harold F. Tipton and Micki Krause. Auerbach, 2003
Vangelos, Michael. “Managing the Response to a Computer Security Incident”. In Information Security
Management Handbook, edited by Harold F. Tipton and Micki Krause. Auerbach, 2003.
V. Index
106752710
3/7/2016 10:49:10 PM
Page 10 of 10
Download