Incident Response – How to Fight Back

advertisement
SANS Incident Response Survey
Incident Techniques and Processes:
Where We Are in the Six-Step Process
Presented by:
Alissa Torres
Certified SANS Instructor
© 2014 The SANS™ Institute – www.sans.org
Six Steps of Incident Response
IR Survey Overview
• Survey online from May to June 2014
• Respondents solicited from 13 different
regions and countries
• 259 qualified respondents
• Qualified = “professionals working w/or in IT
organizations to promote cybersecurity,
especially in the area of IR”
• 85% of respondents work in incident
response roles within their organizations
© 2014 The SANS™ Institute – www.sans.org
3
0%
© 2014 The SANS™ Institute – www.sans.org
Engineering/Construction
Aerospace
Transportation
Law practice/Legal support
services
ISP/Hosting/Service
provider
Religious/Nonprofit
8%
Retail
12%
Insurance
14%
Manufacturing
16%
Telecommunications/Servic
e provider
Incident
response/Forensics…
Government (nonmilitary)
Forensics
consulting/Incident…
Other
Energy/Utilities
Government (law
enforcement and military)
Health care/Pharmaceutical
Education
Financial services
Technology/IT services
Survey Demographics
“What is your company's primary industry?”
15% Tech/IT Industry
14% Financial Services
11% Government
10%
“cross section of all major industries”
6%
4%
2%
4
Organization Size
“How large is your organization’s workforce, including both employee and
contractor staff?”
24% over 20,000 employees
17% less than 100 employees
17.0%
“fantastic audience to enable
correlation of organization’s size
with incident activity”
23.6%
Over 20,000
12.0%
15,000–19,999
6.9%
10,000–14,999
5,000–9,999
5.8%
13.9%
2,000–4,999
500–1,999
9.3%
11.6%
100–499
Fewer than 100
© 2014 The SANS™ Institute – www.sans.org
5
Respondent Roles
“What is your primary role in the organization, regardless of whether
you are considered an employee or consultant?”
29% Security Analysts
28% Management
11% Forensic Examiners/Investigators
30%
25%
20%
15%
10%
5%
© 2014 The SANS™ Institute – www.sans.org
Legal professional
Helpdesk
agent/Technician
Network operations
Compliance
officer/Auditor
Investigator
System administrator
Other
Digital forensics
specialist
IT manager/Director/CIO
Incident responder
Security
manager/Director/CSO/
CISO
Security analyst
0%
6
Respondent Roles
“Are you actively involved in the detection, analysis or remediation
of incidents in your organization?”
85% Actively Involved in
Detection, Analysis or
Remediation of Incidents
15.2%
Yes
No
84.8%
© 2014 The SANS™ Institute – www.sans.org
7
Respondent Roles
“Did you play a role in any of the above incidents’ detection, analysis or
remediation? If so, what was that role?”
33% Led Remediation Process
20% Assisted with Identification of the Incident
5.4%
1.1%
5.4%
Led remediation process
33.3%
11.8%
Assisted with identification of incident
Assisted with remediation
Discovered and reported
Didn’t play a role
20.4%
Didn’t play a role, but observed
22.6%
Other
© 2014 The SANS™ Institute – www.sans.org
8
Self-Reported IR Effectiveness
“How effective do you feel your incident response capabilities and
processes are (including your outsourcing arrangement)?”
0.0%
25.6%
9.3%
41.9% Very Effective/Effective
25% NOT Effective
“the personality of the IR community”
Very effective
Effective
32.6%
Somewhat effective
Not effective
Unknown
32.6%
© 2014 The SANS™ Institute – www.sans.org
9
Incident Quantity
“Over the past two years, how many critical incidents (such as those
resulting in data breach, unauthorized access, denial of service) has your
organization experienced that required incident response?”
48% 1-25 Incidents/24 mths
18% None
21% Unknown
50%
45%
40%
35%
30%
25%
20%
15%
10%
5%
© 2014 The SANS™ Institute – www.sans.org
Over 500
101–500
51–100
26–50
1–25
None
Unknown
0%
10
Incidents by Type
“What was the nature of the incidents? If possible, please provide the
frequency for each type of incident or false alarm experienced.”
90%
80%
70%
More than 20
60%
10–20
50%
40%
6–10
30%
20%
2–5
10%
Other
Distributed denial of
service
Advanced persistent
threat
Data breach
False alarms
Unauthorized access
Malware
0%
1
© 2014 The SANS™ Institute – www.sans.org
82% Malware
70% Unauthorized Access
66% False Alarms **
49% DDOS
11
Incident Identification Methods
“How does your organization identify impacted systems, and how
automated are these processes of identification?”
100%
90%
80%
Manual
70%
60%
50%
Automated
Automated:
54% Network Scanning
46% HIDS alerts
45% Firewall/IDS alerts
22% SIEM Correlation
40%
30%
Both
20%
10%
0%
N/A
© 2014 The SANS™ Institute – www.sans.org
Manual:
52% User Notification
51% Log Analysis
37% Forensic Suites
31% Network Sniffing
12
Detection to Containment
“From the time the incident was discovered, how much time elapsed until
containment was accomplished?”
© 2014 The SANS™ Institute – www.sans.org
More than 12
months
6–12 months
3–6 months
1–3 months
1–2 weeks
2–7 days
1–2 days
9–24 hours
4–8 hours
1–4 hours
Less than 1 hour
Not achieved
Unknown
20%
18%
16%
14%
12%
10%
8%
6%
4%
2%
0%
2–4 weeks
20% 4-8 Hours
16% 1-4 Hours
13% 9-24 Hours
14% 2-7 Days
11% Over a month
2.2% Never
13
Detection to Containment
What Steps are Accomplished in this Timeframe?
•
•
•
•
•
System Identification
Rule Out False Positive
Triage Process
Escalation to Higher Tier Support
Automated or Manual Network Isolation
20% 4-8 Hours
16% 1-4 Hours
13% 9-24 Hours
14% 2-7 Days
11% Over a month
2.2% Never
© 2014 The SANS™ Institute – www.sans.org
13
Detection to Remediation
“From the time the incident was discovered, how much time elapsed
until remediation was achieved?”
© 2014 The SANS™ Institute – www.sans.org
More than 12
months
6–12 months
1–3 months
2–4 weeks
1–2 weeks
2–7 days
1–2 days
9–24 hours
4–8 hours
1–4 hours
Less than 1 hour
Not achieved
Unknown
20%
18%
16%
14%
12%
10%
8%
6%
4%
2%
0%
3–6 months
21.5% 2-7 Days
17% 1-2 Days
7.5% 1-2 Weeks
7.5% 9-24 Hours
15% Over a Month
14
Detection to Remediation
What Steps are Accomplished in this Timeframe?
•
•
•
•
•
•
•
•
System Identification
21.5% 2-7 Days
17% 1-2 Days
Rule Out False Positive
7.5% 1-2 Weeks
Triage Process
7.5% 9-24 Hours
Escalation to Higher Tier Support
15% Over a Month
Automated or Manual Network Isolation
Enterprise Scoping
Reset Compromised Credentials
Removal of Malware/Rebuilding of a Machine
© 2014 The SANS™ Institute – www.sans.org
14
Targeted Data
“If you experienced a data breach in the past two years, what type of data
was exfiltrated from the environment? Please select all that apply.”
36.4% Employee Data
36.4% Consumer Info
32% Proprietary Customer Data
32% Intellectual Property
40%
35%
30%
25%
20%
15%
10%
5%
© 2014 The SANS™ Institute – www.sans.org
Legal data
Other
Intellectual property
(source code,
manufacturing plans,
etc.)
Proprietary customer
information
Individual consumer
customer information
Employee information
0%
15
Barriers to Efficient IR
“What do you believe are the key impediments to effective IR at your
organization?”
Lack of time to review/…
Lack of budget for…
Lack of a formal IR team or IR service
Little visibility into system/endpoint…
Lack of IR plans and procedures
Difficulties correlating events…
Silos between IR and other groups
Difficulty in finding and…
Accessing records involved…
62% Lack of Time to Review Procedures
60% Lack of Budget for Tools/Tech
55% Lack of Formal IR Team/Service
52% Lack of Visibility into Endpoints
Difficulties finding tools…
Legal/HR impediments
Lack of trusted service providers available
Jurisdictional issues with cloud services
Other jurisdictional issues
Other
0%
10%
20%
30%
© 2014 The SANS™ Institute – www.sans.org
40%
50%
60%
16
Planned Area of Improvements
“What improvements is your organization planning for incident response
programs over the next 24 months? Select all that apply.”
68% More Automation/SIEM Integration
58% Improved Visibility into Threats/Vulns
53.7% Improved Remediation/Follow-Up
41.5% Improved Ability to Scope Intrusion
70%
60%
50%
40%
30%
20%
10%
© 2014 The SANS™ Institute – www.sans.org
Other
Better response time
Improved ability to scope
impacted systems and
pinpoint source
Improved remediation
and follow-up processes
Improved visibility into
threats and associated
vulnerabilities as they
apply to the environment
More automation/security
event information
management (SEIM)
integration for reporting
and analysis
0%
17
Sources for IR Capability
“What resources does your organization utilize in responding to incidents?
Select all that apply.”
4.3%
22.9%
61.4% Surge Team
59% Dedicated Internal Team
25% 3rd Party IR Services as needed
25% 3rd Party IT Service Provider
61.4%
Surge team drawn from our internal
staff
27.1%
Dedicated internal team focused on
IR, reporting and remediation
Third-party IR services we call as
needed
Third-party IT management provider
Other
58.6%
© 2014 The SANS™ Institute – www.sans.org
20
Sources for IR Capability
“How large is your response team? Please indicate your dedicated capability as
well as surge capability (additional manpower called in during large incidents).“
Surge Team:
24% Size of 3-5
17% Size of 6-10
17% Size of 11-20
Dedicated Team:
31% Size of 3-5
25% Size of 1-2
35%
30%
25%
None
20%
15%
10%
1–2
5%
3–5
Surge
capability
Dedicated
team
0%
6–10
11–20
More than 20
© 2014 The SANS™ Institute – www.sans.org
21
0%
Other
In the cloud marketplace via
shared applications, such as…
Third-party social media accounts
or platforms
Virtual servers running in the cloud
(e.g., Azure or Amazon EC2)
Web applications
Embedded, or non-PC devices,
such as media and…
Employee-owned computers,
laptops, tablets and…
Corporate-owned social media
accounts
Internal network systems and
applications, including…
Company-owned laptops,
smartphones, tablets and other…
Business applications in the cloud,
such as SAP or email
Capability for Incident Types
“What business processes and systems can your organization investigate in-
house? What capabilities do your outsourced IR services provide?”
100%
90%
80%
70%
60%
50%
40%
30%
Inhouse:
Company Owned Assets
Internal Network Systems
Outsourced:
Cloud Services/Apps
Non-PC Devices
20%
10%
In-house
Outsourced
Both
N/A
© 2014 The SANS™ Institute – www.sans.org
22
0%
© 2014 The SANS™ Institute – www.sans.org
Other
60%
Using automated methods to
surgically remediate
compromised machines
70%
Restoring gold builds
80%
Rebuilding compromised
machines from OS media and
reinstalling programs
Using manual methods to
surgically remediate
compromised machines (i.e.,
remove file and registry keys
related to the compromise…
Restoring compromised
machines from backup
Removing rogue files
Killing rogue process
Wiping and reimaging
compromised machines from
golden (baseline) image
Remediation Techniques
“What practices do you have in place for remediating incidents? Select all
that apply.”
74.6% Wiping/Reimaging
68.7% Killing Rogue Processes
68.7% Removing Rogue Files
56.7% Restore from Backup
54% Surgically Remediate
50%
40%
30%
20%
10%
23
Historical Network Data Archives
“Does your organization have a way to look back and find incidents that
occurred in the past using network history data?”
50.7% - Yes
32.8% - No
16.4% - Unknown
16.4%
50.7%
Yes
No
32.8%
Unknown
© 2014 The SANS™ Institute – www.sans.org
24
Threat Intel Tracking
“Does your organization perform adversary/attacker attribution based on
the data/signatures collected during the incident response process?”
31.3% Yes
46.3% No
22.4% Unknown
22.4%
31.3%
Yes
No
Unknown
46.3%
© 2014 The SANS™ Institute – www.sans.org
25
IR Budget Allotments
“What percentage of your security budget is assigned to incident response?”
38.6% Unknown
29.5% None
11.4% - 4-5% of Budget
6.8% - 1-2% of Budget
6.8% - 5-10% of Budget
4.5%
6.8%
11.4%
38.6%
Unknown
2.3%
None
1–2%
6.8%
2–3%
4–5%
5–10%
29.5%
Greater than
10%
© 2014 The SANS™ Institute – www.sans.org
26
IR Expense Tracking
“Do you measure the associated costs of handling incident response?”
62.8% Do Not Track
14% Do Track Expenses
23.3% Unknown
14.0%
23.3%
Yes
No
Unknown
62.8%
© 2014 The SANS™ Institute – www.sans.org
27
IR Expense Tracking:
Metrics to Track
•
•
•
•
•
•
•
•
Travel Expenses
Cost of System Downtime
Productivity Loss for Employees
Security Team Man Hours
Forensics Imaging/Analysis Costs
Cost of Ineffective/Inefficient Tools
Reinventing Procedures due to Lack of Formal Plan
Cost of Training Surge Staff
© 2014 The SANS™ Institute – www.sans.org
28
IR Expense Tracking:
Benefits of Keeping Metrics
•
•
•
•
•
•
•
Justify Additional Full-Time Employees
Justify Additional Tool/Skill Training
Support Acquisition of Enterprise Forensic/IR Tools
Support Vendor Training on Tools
Justify Enterprise Tool “Baselining”
Fuel Stakeholder Buy-In
Emphasize Security Focus in All Departments
© 2014 The SANS™ Institute – www.sans.org
29
Bottom Line
• Many IR professionals feel their organizations’ IR
capabilities are ineffective.
• Broad definitions of an incident place a strain on
IR teams.
• Lack of time to review and practice IR
procedures is a primary barrier to effective
incident response.
• Lack of formalized IR plans and dedicated staff
plague most organizations.
• Organizations need to implement collection and
correlation of threat intelligence.
© 2014 The SANS™ Institute – www.sans.org
18
Bottom Line (2)
• SIEM tools are the focus on those working to
improve their IR capability.
• Organizations have not yet implemented the
collection and correlation of threat intelligence.
• Efficient response to incidents is hindered by lack
of budget dedicated in support of the IR mission.
• Metrics such as costs incurred per incident are
NOT being tracked within organizations.
© 2014 The SANS™ Institute – www.sans.org
31
Recommendations
• Define your specific organization’s definition
of incident and staff team accordingly.
• Increase efficiency of IR tools to maximize
limited manpower.
• Build security into other business unit’s
processes.
• Formalize incident response plans, policies
and procedures.
© 2014 The SANS™ Institute – www.sans.org
32
Recommendations (2)
• Effective IR team management must include
tracking budgetary and human resources to
meet to IR mission.
• Implement internal training and tabletop
exercises for gap analysis of skill sets and IR
process/procedures.
• Track Incident Response metrics to justify IR
tools and increased team size, training, tool
maintenance.
© 2014 The SANS™ Institute – www.sans.org
33
Survey Results
https://www.sans.org/readingroom/whitepapers/analyst/incident-response-fight35342
© 2014 The SANS™ Institute – www.sans.org
34
Download