ThaiCERT Formation & Thailand Incident Report By Miss Siriwan Apisiridej (siriwan@nectec.or.th) NECTEC Seminar on Information Security Technologies 19 November 2003 Information Warfare Mail bomb Terminal Hacking Internet Terminal Terminal Root compromise Terminal DDoS What is IR Team? IR Team : Incident Response Team - is a capability responsible for dealing with potential or real information security incidents - is assigned a set of duties related to bringing each security-related incident to a conclusion, ideally in accordance with the goal of the organization it serves What is IR Team? Many incident response teams have many team members, each with a specialized role. Some of the members : – daily operations – receiving reports of incidents – attempting to identify the type, source, impact, and other facets of security-related incidents that are reported What is IR Team? Others : – deal with vendors to close known vulnerabilities in operating system Others : – examine data to identify and project incident trends, something that is more related to research Definition of “CERT” CERT Computer Emergency Response Team An organization or a team that provides, to defined constituency, services and support for both preventing and responding the computer security incidents. ThaiCERT Formation • NECTEC launched the project of Forming Thai Computer Emergency Response Team (ThaiCERT) since April, 2000 • Apply CERT/CC, USA (1st CERT in the world) as the model of ThaiCERT formation • Currently, there are 10 team members – 1 management – 8 technical staffs – 1 general coordinate staff ThaiCERT Formation (Cont.) Objective : - In order to handle the computer crime and coordinate with the related organizations. - To gain the knowledge and skill in the information security which is the factor effects to the stability of Thailand. - To establish the team, which can handle the incidence of computer security and develop personnel’s skill because the international organization cannot support every cases for us. Scope of ThaiCERT’s Role Major Role 1. Incident Response General Role 1. Distribute security knowledge & alert through Mailing List and Website: http://www.thaicert.nectec.or.th 2. Analyze and Response to system vulnerabilities and security risks 3. Analyze computer security incident Scope of ThaiCERT’s Role (Cont.) 4. Provide training and seminar 5. Follow the computer security news 6. Intrusion detection 7. Computer forensic 8. Computer security consultant 9. Develop security tools i.e. Web Scan 10. Coordinate and support ThaiCERT Incident Response Cases Types of Incidents 170 Port Scan & Probe Virus 36 Spam Mail 29 Other (Hacks, DDos, ...) 23 0 50 100 150 200 Number of Cases (Jan 2003 – Present) [ Total = 258 cases ] Why Form an IR Team? • Ability to coordinate • Expertise • Efficiency • Ability to work proactively • Ability to meet agency or corporate requirements • Serving a liaison function • Ability to deal with institutional barriers Issues in Forming a Response Team • Policy • Whether or not a team is really necessary • Defining and communicating with a constituency • Defining functional requirements • Defining the role of the incident response team • Staffing the team appropriately • Creating and updating operational procedures Policy Example : Policy • No employee make contact with or answer questions from the press unless that person obtains written approval from the head of public relations department. • No system being attacked can stay connected to the network if it holds extremely valuable resources. Policy (Cont.) • No team member can spread information about any incident outside of the immediate team without the direct permission of the team leader. Is a team really necessary? Alternative Approach : To have individuals who are not part of an incident response team but who are available when incidents occur. Advantage of this alternative approach : – Smaller organization generally do not need a team – Few resources might be available – Incident response might work better as a distributed effort Who is Constituency? 1. Determining exactly whom you are supporting – to be able to communicate with that constituency to learn the needs that exist – to know how to better focus your efforts 2. Establishing communication channel is essential (2-way communication) Who is Constituency? Attacker CEO SIRM = Site Incident Response Manager CERT Two way communication SIRO = Site Incident Response Officer Have contact no. i.e. home phone no., mobile phone no., and E-Mail Functional Requirements and Roles • Basic Requirements : providing incident response support to the constituency - Go to a site or area within a facility and take over all incident response efforts - Control sharing – both the incident response team and operations or business unit staff - Do something only when its constituency requests - Provide indirect rather than direct support in the form of advice Functional Requirements and Roles (Cont.) •Additional Requirements - Interagency/corporation coordination/liaison - Serving as a clearinghouse : a central repository for information, patches, tools, and so forth - Contingency planning and business continuity services - Information security tool development - Incident response planning and analysis - Training and awareness Staffing Issues • Team size – Minimum : 1 management, 1 technical staff – Add staff to broaden the range of expertise as funding allows Staffing Issues (Cont.) • Team skills 1. Management skills 2. Technical skills 3. People skills 4. Teamwork skills 5. Communication skills Staffing Issues (Cont.) • Location of Staff Should all team members reside at one location, or be divided to different location? Creating Operating Procedures Issues that any set of procedures must address : - Purpose of the procedure - To whom or what the procedures apply and under what conditions - Lines of authority within the IR team and the organization it serves - Restrictions on the kinds of actions in which team members can and cannot engage - How information and evidence must be documented Creating Operating Procedures - Who can contact outside entities (i.e. media, law enforcement agencies) and under what conditions - Priorities is response efforts (i.e. protecting the lives of humans, keeping systems and networks operational) - What to do in case of incidents in highly valuable, sensitive, proprietary, or classified systems and/or networks - Kinds of information that can and cannot be disseminated outside - Management’s role with respect to the response team and its activities Creating Operating Procedures - When and how the procedures must be changed - How the procedures are to be distributed Incident Response Process 2 via E-Mail 1 Victim Incident Report Receiving Process 3 Incident Confirmation Process via Telephone 5 Coordinate and give advice to the related organization NO Analyze Scope of responsibility YES - Analyze the incident - Technical support - Coordinate and response 4 6 Cooperation is necessary!! Contact ThaiCERT URL : http://www.thaicert.nectec.or.th E-mail : thaicert@nectec.or.th Telephone : 0-2564-6868 Fax 0-2564-6871 :