Retainer Template Start

advertisement
OnDemand Forensic & Incident Response
Service Description
OnDemand Forensic & Incident Response
Service Description
Forensic Investigation & Investigative Response Services
The goal of the Verizon Investigative Response service offering is to assist our
customers in responding rapidly and effectively to perceived threats to sensitive
information, customer data, and network quality of service. Verizon is a registered
and assessed provider of incident response services under the CREST cyber
incident response scheme, a scheme led by CREST and endorsed by GCHQ and
CPNI, which focuses on appropriate standards for incident response aligned to
demand from all sectors of industry, the wider public sector and academia.
Overview
The Investigative Response process follows the following process which is
described in the next section of the document.
Figure 1 – Investigative Response Process
This document contains Verizon proprietary and confidential material that shall not be disclosed,
duplicated, or used for any purpose other than to evaluate this proposal.
07 March 2016
1
OnDemand Forensic & Incident Response
Service Description
Investigation steps
The following tasks are to be performed by our specialists:
1. Initial Incident Response Phase
a. Introduction
The Initial Incident Response Phase begins when a potentially harmful incident is
first suspected. The goal of this phase is to mobilize quickly to identify the source
of the unwanted activity and contain it. The primary objective of the Initial Incident
Response phase is to identify the breach take appropriate steps to contain the
compromise, while at the same time, taking steps to maintain the integrity of the
environment.
b. Approach
During the Initial Incident Response phase, Verizon will coordinate with Customer
IT security personnel to identify the source of the unwanted activity for the
purposes of analysis, documentation, and potential reporting / disclosure.
c. Methodology
The following elements are critical components of the Verizon Initial Incident
Response process:
i.Identify the Source: Verizon will work in close coordination with Customer IT
Security personnel to analyze network and application activity, in addition
to the impacts of any internal analysis, to identify the source of any
perceived unwanted activity.
ii.Containment: Once the source of the unwanted activity has been
conclusively identified, the next critical objectives of the phase are to
contain the breach and take appropriate steps to contain the compromise.
This component of the process may involve network and/or system-level
modifications to Customer systems. All modifications should be carried
out by Customer under the direction of Verizon.
iii.Evidence Preservation: In situations involving the theft of sensitive
information, Customer must provide Verizon all necessary approvals so
that Verizon may clearly understand the cause and full extent of the
breach. Verizon will make best efforts to maintain the quality and integrity
of the crime scene. At the conclusion of the phase, relevant forensics
data sources identified will be transitioned to the Investigative Response
team for further analysis, regardless of whether that role is fulfilled by
Verizon, Customer, or law enforcement.
d. Customer Responsibilities
During the Initial Incident Response phase of the Investigative Response
engagement, Customer agrees to:
This document contains Verizon proprietary and confidential material that shall not be disclosed,
duplicated, or used for any purpose other than to evaluate this proposal.
07 March 2016
2
OnDemand Forensic & Incident Response
Service Description
i.Provide Verizon with copies of all configuration information, log files, network
and connectivity diagrams, intrusion detection events, and other forensic
data deemed relevant to the Incident and its analysis;
ii.Manage the collection and dissemination of all information regarding an
Incident with Customer technical and managerial personnel, legal and
public relations departments, others within Customer enterprise, and other
involved companies;
iii.Be responsible for and facilitate all communications between the Investigative
Response Team and any third-party vendors, including Internet service
providers and content-hosting firms, utilized by Customer;
iv.Provide a secure office or work area equipped with desks, chairs, telephones,
and laptop computer connections (or analog telephone lines, as Verizon
specifies) for use by the Investigative Response Team while working onsite at Customer premises;
v.Provide the Investigative Response Team with supervised access to
computer systems and computer networks during the agreed upon
timeframe;
vi.Be responsible for the decision and authority to implement (or not to
implement) any recommendations, the actions taken to do so, and the
results achieved from such implementation; and
vii.Be responsible for the actual content of any data file, selection, and
implementation of controls and use, and security of stored data.
e. Verizon Responsibilities
Verizon will provide consulting services and support in the following areas of
Initial Incident Response:
i.Threat Identification: Personnel interviews and analysis of forensics data
sources to clearly identify the source of the perceived unwanted activity;
ii.Containment: Coordinate with Customer to identify the unwanted activity, and
take appropriate steps to contain the compromise; and
iii.Evidence Preservation: Identify and maintain the integrity of relevant forensic
data sources that may be necessary for the purposes of forensic analysis
and transition that information to the Investigative Response team.
f.
Deliverables
Upon completion, Verizon will provide Customer with documentation outlining the
specific impacts and findings relative to the Initial Incident Response phase of the
engagement. Depending upon the requirements of Customer, this report may
either be in the form of an Incident Report Short Form or Statement of Preliminary
Findings.
This document contains Verizon proprietary and confidential material that shall not be disclosed,
duplicated, or used for any purpose other than to evaluate this proposal.
07 March 2016
3
OnDemand Forensic & Incident Response
Service Description
2. Computer Forensic Analysis Phase
a. Introduction
Computer Forensic Analysis commences only after the Initial Incident Response
phase has completed and the perceived unwanted activity has been identified
and contained. This second stage of the Investigative Response engagement is
intended to document the source and full extent of the breach for the purposes of
the Incident Post-mortem process as well as to support criminal prosecution or
other litigation support relative to a civil matter.
b. Approach
The Verizon Investigative Response Team utilizes a combination of open-source,
commercially available, and proprietary forensic tools in efforts to gain multiple
analysis vantage points.
c. Methodology
During the Computer Forensic Analysis phase of the Investigative Response
engagement, Verizon will make efforts to clearly establish the full extent of the
security breach or data compromise event. The full extent of the breach may
include the source, the initial point of entry, the tools and methods employed by
the intruder(s), and a listing of the systems, accounts, and third-parties exposed.
More importantly, in situations involving the theft of sensitive information, the full
extent may include the quantities and types of information compromised as a
result of the breach.
To support the Computer Forensic Analysis phase, Verizon may use a number of
forensic, network, and/or application analysis tools. These tools may include, but
are not limited to, the following:
i.FTK: An over-the-counter forensic tool that features powerful file filtering and
search functionality, allowing the user to search through thousands of files
to find evidence quickly;
ii.EnCase: A versatile over-the-counter Windows-based forensic analysis tool
supporting data acquisition, data recovery, and de-duplication. ;
iii.IDA Pro: A Freeware multi-platform disassembly and debugger;
iv.iLook: A non-commercially-available tool. ILook is commonly used to capture
and analyze images from computer drives and other external storage
media; and
v.Coroner’s Toolkit (TCT): A Freeware tool used for Post-mortem analysis of a
UNIX system. Notable TCT components are the Grave-Robber tool that
captures information, the ILS and MACTIME tools that display access
patterns of files, dead or alive, the UNRM and LAZARUS tools that
recover deleted files, and the FINDKEY tool that recovers cryptographic
keys from a running process or from files.
This document contains Verizon proprietary and confidential material that shall not be disclosed,
duplicated, or used for any purpose other than to evaluate this proposal.
07 March 2016
4
OnDemand Forensic & Incident Response
Service Description
Also during the Computer Forensic Analysis phase, Verizon may use several
techniques to identify relevant data:
i.Time line of file, application, network, and system event activity;
ii.Analysis of allocated disk sectors, files, and directories for the purposes of
recovering deleted data;
iii.Analysis of unallocated file system space for relevant information that may
have been deleted;
iv.In-depth analysis of file system binaries and executables for evidence of
tampering or misuse;
v.Recovery of relevant data stored on damaged or otherwise unusable media;
and
vi.Analysis of tapes, optical media, and other backup related mediums for
evidence of relevant information.
The specific results of this type of file recovery analysis may restore the target
data files to their original locations on the disk or media they were recovered
from. In many cases, Verizon may be able to recover most of the files and
individual file versions that have existed on a given target system. Note: due to
the variables encountered when attempting to recover deleted, destroyed, or
otherwise unrecoverable data, results cannot be guaranteed.
d. Customer Responsibilities
During the Computer Forensic Analysis phase of the Investigative Response
engagement, Customer agrees to:
i.Provide Verizon with copies of all configuration information, log files, network
and connectivity diagrams, intrusion detection events, and other forensic
data sources deemed relevant to the Incident and its analysis;
ii.Manage the collection and dissemination of all information regarding an
Incident with Customer technical and managerial personnel, legal and
public relations departments, others within Customer enterprise, and
other involved companies;
iii.Be responsible for and facilitate all communications between the Analysis
Team and any third-party vendors, including Internet service providers
and content-hosting firms, utilized by Customer;
iv.Provide a secure office or work area equipped with desks, chairs, telephones,
and laptop computer connections (or analog telephone lines, as Verizon
specifies) for use by the Analysis Team while working on-site at Customer
premises;
v.Provide the Analysis Team with supervised access to computer systems and
computer networks during the hours agreed upon;
This document contains Verizon proprietary and confidential material that shall not be disclosed,
duplicated, or used for any purpose other than to evaluate this proposal.
07 March 2016
5
OnDemand Forensic & Incident Response
Service Description
vi.Be responsible for the decision and approval to implement (or not to
implement) our recommendations, the actions taken to do so, and the
results achieved from such implementation;
vii.Be responsible for the actual content of any data file, selection and
implementation of controls on its access and use, and security of stored
data; and
viii.Be responsible for the decision to notify any outside parties, including law
enforcement, of the findings.
e. Verizon Responsibilities
Verizon will provide consulting services and support in the following areas of
Computer Forensic Analysis:
i.Evidence Acquisition and Analysis: Verizon will utilize a combination of opensource, proprietary, and commercially available forensic and network
analysis tools to acquire and analyze relevant evidence.
ii.Maintaining Chain of Custody: All evidence acquired for the purposes of the
investigation, including electronic media, forensic images, and paperbased reports, will be handled in accordance with industry-practices in
relation to maintaining chain of custody. Verizon will securely transport
and store all acquired evidence to maintain the confidentiality and integrity
of the data;
iii.Achieving Informational Objectives: Data acquisition and analysis will be
performed specifically for the purposes of understanding the source and
extent of the breach. Achieving the informational objectives of the
investigation, as stated above, will set up the litigation and/or prosecution
phase and serve to minimize any potential fraud losses or impact to
consumers.
f.
Deliverables
At the conclusion of the Computer Forensics Analysis phase, Verizon will provide
Customer with an Investigative Management Report. This report will detail the
specific findings of the investigation and the extent of the breach.
This document contains Verizon proprietary and confidential material that shall not be disclosed,
duplicated, or used for any purpose other than to evaluate this proposal.
07 March 2016
6
OnDemand Forensic & Incident Response
Service Description
3. Litigation Support Phase
a. Introduction
Successfully pursuing the prosecution of the intruders, or achieving any
successes in civil proceedings, will be in reliance of Customer meeting Customer
obligations, as defined herein so that Verizon may achieve the informational and
milestone objectives outlined in the Initial Incident Response and Computer
Forensic Analysis phases. Litigation Support activities commence at the
conclusion of the first two phases of the Incident Response lifecycle and may
involve electronic data recovery, case evidence preparation, transitioning of case
evidence to law enforcement, and expert witness testimony.
b. Approach
The Verizon Investigative Response team uses a very careful and detailed
approach to the first two phases of the Investigative Response lifecycle that
assists in the Litigation Support Phase. Verizon can assist if Customer chooses to
pursue the prosecution of the intruder(s), notify outside parties of the Incident, or
engage law enforcement officials.
c. Methodology
The Verizon Investigative Response includes both assisting customers in public
disclosure following a data compromise event and working in coordination with
law enforcement to assist in the capture and successful prosecution of the
intruder(s). Verizon may also provide expert witness as needed by Customer.
Note: the Litigation Support phase does not always come into play following an
Incident. Given the background and facts of the case, the requirement for
Litigation Support may be very clear at the onset of an Investigative Response
engagement. If not, services in this regard are not scoped or priced as part of the
initial engagement. In these circumstances, Litigation Support services are priced
and scoped separately if deemed necessary by Customer.
d. Customer Responsibilities
During the Litigation Support phase of the Investigative Response engagement,
Customer agrees to:
i.Provide Verizon with copies of all configuration information, log files, network
and connectivity diagrams, intrusion detection events, and other forensic
data sources deemed relevant to the Litigation Support activity;
ii.Manage the collection and dissemination of all information regarding an
Incident with Customer technical and managerial personnel, legal, and
public relations departments, as well as any others individuals deemed
necessary by Customer;
iii.Be responsible for and facilitating and arranging all necessary court time,
evidence discovery, and other trial related requirements;
This document contains Verizon proprietary and confidential material that shall not be disclosed,
duplicated, or used for any purpose other than to evaluate this proposal.
07 March 2016
7
OnDemand Forensic & Incident Response
Service Description
iv.Provide a secure office or work area equipped with desks, chairs, telephones,
and laptop computer connections (or analog telephone lines, as Verizon
specifies) for use by the Litigation Support Team while working on-site at
Customer premises;
v.Be responsible for the decision and proper approval to implement (or not to
implement) any recommendations, the actions taken to do so, and the
results achieved from such implementation; and
vi.Be responsible for the actual content of any data file, selection, and
implementation of controls on its access and use, and security of stored
data.
e. Deliverables
Unlike situations involving Initial Incident Response and advanced Computer
Forensic Analysis, Litigation Support activities can vary greatly depending upon
the circumstances and the specific Customer needs. At the onset of any
Litigation Support engagement, Verizon will agree to a suitable documentation
format that will satisfy reporting needs.
Note - engagement deliverables will be formatted in accordance with payment
industry guidelines.
Also note - as an approved QFI - Verizon is required to provide the Associations
(MasterCard and Visa) with copies of all engagement deliverables upon request
unless there is a national law preventing this or there is a previous contract with
an NDA in place between Verizon and the customer prior to this investigation.
Always check with your legal department or your legal advisor if these
investigative steps can be taken or if additional requirements are necessary.
Verizon does NOT provide legal services but is well experienced in liaising with
legal advisors.
Customers are advised to store the original investigative items themselves in a
secure location. Any evidentiary items that are processed by the IR lab in the
course of an investigation are retained for 18 months. After the investigation they
are securely deleted or can handed over to the customer or the party of your
choice upon request.
This document contains Verizon proprietary and confidential material that shall not be disclosed,
duplicated, or used for any purpose other than to evaluate this proposal.
07 March 2016
8
Download