Conf42 Incident Management 2024 - Online

- premiere 5PM GMT

Master Incident Response: Elevate Efficiency with Playbooks

Video size:

Abstract

Elevate your knowledge of incident response with my talk on ‘Master Incident Response: Elevate Efficiency with Playbooks’. Learn how to optimise processes and manage cybersecurity incidents effectively. Discover how tailored guides can make all the difference when it matters most.

Summary

Transcript

This transcript was autogenerated. To make changes, submit a PR.
Hello everyone and welcome to Conf42 Incident Management 2024 conference. Imagine your organization facing a major security issue. Time is running out, things are chaotic, and everyone is scrambling to fix the problem to fix the problem. And to make the situation more interesting, communications are falling apart. Does it sound familiar? As a cybersecurity analyst, we spend a whole lot of our time building security controls that we hope will prevent an incident from happening in the first place. But the reality is that the incident happens or will happen. What if you have had a clear step by step guide to tackle any incident quickly and efficiently? Which is why a cyber security team or an organization is expected to have a strong understanding of what to do or how to do or what to do when things go wrong. In today's talk, I'll be exploring what an incident response playbook is and how we can implement one. for listening. My name is Chinye Chinekizi. I'm an SUL security analyst with Saifal Technologies. And on today's talk, I'll be looking at master incident response, elevate efficiency with playbook. Let's dive into it. So in order to, drive this talk, I'll be looking at some outline. One of them is understanding what incident response is. We also be considering the challenges that in incident management. What is incident response playbook is, we also be considering the benefits of using incident response playbook. Then the guide to creating one. We also consider looking at the elements of an effective incident playbook. And then we look at an example, the tools and technology, and then we conclude. Understanding incident response. According to NIST, NIST actually defined incident response as a systematic process for handling cyber security incidents. Incidents like data breaches or malware infection or any form of cyber security incidents. Why do we actually need incident response? One of the reasons why we need it. It's because it actually helps to reduce damage and downtime. It also ensures business continuity and protects sensitive data from being exploited by the tracked actors when there is an incident. And in order to do this, or to be able to effectively protect our data from being exploited, NIST actually provided us with four guides. These four guides are preparations. We have the detection and analysis. We have the curtailment and eradication and recovery. We also have the post incident activities. We also have the sound incident response, which actually also states or outline the steps that could be taken in order to detect and prepare for an incident. Now we're looking at the challenges in incident management. One of the challenges in incident management is lack of clear procedures. Without a clear process, there is a risk of confusion and delay in response, especially when something goes wrong. And also, there is bound to be an error in the incident management process, because at that point, The team might end up working on an assumption without a clear path to follow. We also have inadequate incident categorization and prioritization. This is a major issue. Where incidents are not properly categorized, it can lead to the team giving top priority to the least expected, incidents. Thanks. Lack of tools and resources, where there is no tools and resources, it becomes a challenge to effectively manage or, quickly respond to the incident. We have the inadequate training, where there is no training, it makes it difficult for the team to effectively, jump at the incident when it happens. We have lack of communication and collaborations. And now we're looking at what incident response playbook is. An incident response playbook is a detailed, structured set of procedures that actually outlines what an organization should do in an event an incident happens. It tells them how to detect it, how to respond to it, and how to recover from the cybersecurity incident. One primary goal of incident response is to help organization minimize the impact of breaches and to ensure they restore back to normal. Or they return back to business as quickly as possible. So there are different types of playbooks that an organization can actually decide to develop. And this is based on the potential threat identified in the environment. As well as the kind of operation they are into. And as well as their sizes. So there are different playbooks that they could choose from. This is a list of some playbooks. There are more playbooks that could be exploited, but this one listed here are just few. One is the Ransom playbook. We also have the DataBridge. We have the Marwell playbook. We have up to the Zero Day Variability playbook. This list are just few. There are many other playbooks that could be developed by an organization based on their identified traits within their business operations as well as their sizes. Then we look at the benefits of incident response playbook. One of the benefits of incident playbook is improved efficiencies. Because there's already streamlined process, it helps the team to quickly respond to the incident and then reduce the downtime or the impact of those incidents. You have the enhanced effectiveness. Because of the clear procedures that are already outlined what they to do and how they are to go about it, it helps the decision making very fast. And then they end up making an impactful action or taking a more impactful action. It also increase collaboration where there is a well defined role. It helps them to be able to know who to escalate to because they already have The role metrics that spells out what school they are to escalate to in an event something goes wrong. So it shows the chain of escalation, making the coordination of the incident very smooth. And then we have guides to creating incidents playbook. One important thing to note is that before an organization can go ahead in, Developing an instant playbook, there's need for them to actually understand their security posture. And this is actually done by, identifying the potential variability and threats that are specific to the operations. And by so doing, they are able to come up with the strategy to curtail those identified weaknesses. And this is done by performing penetration testing. Or, We're really assessment. These two testing actually gives them an overview of how that environment is as well as the witnesses and possible remediation of what they can do to ensuring a stronger security posture and you have creates reporting. Checklist. would like to also mention before I go to create a reporting checklist that This test actually helps them to determine the severity as well as also be able to define the priorities because identifying those vulnerabilities within the environment will help them to be able to have a proper categorization as well as prioritizing those incidents based on their severity and impact on their businesses. I move on to the CREATE REPORTING CHECKLIST. So this checklist is like a template that helps the team to be able to document their findings during the investigation and be able to enter the activities that are executed in order to, curtail those incidents. They will have defined a clear procedures. Like we rightly mentioned, there are different types of playbooks. And these playbooks should have a clear process for detecting, investigating and also identifying the potential security and then prioritizing them based on their severity and impact. This can only be achieved where the organization already have a clear understanding of what poses a threat in their environment. They have established roles and responsibilities. This is very key because it helps in the escalation point. Also have developed communication plans. Then you have tests. After developing those processes, there is a need to actually test to know the effectiveness of those processes, of those tools that have been implemented, to detect and actually help this, the organization's security. This can be done by performing a tabletop exercise. This tabletop exercise helps to determine the readiness of the team in fighting against incidents. And then we have the reform, the refined. The refined actually helps in identifying the gaps and possible improvements of the processes. When an exercise is done, the tabletop exercise is done, then you're able to identify what is not properly taken care of and you're able to improve on it by refining those processes as needed. And taking into account the new identifying gaps is and how they could build a stronger security posture. And then we have the next four phase explained. These four steps actually gives a better understanding to the organization or the security team on how they could know be incident ready. Firstly, I would like to highlight that for any organization to be able to have And if effective playbook there is need for them to have a better understanding of what needs guideline incident guideline is, which has a clear understanding of what needs guideline is, it's very difficult for them to be able to, take into account these four phases and be able to get ready for any form of incident. So in order to have this incident properly outlined, and, in line with the best practices. It is important the organization understand this framework and by so doing, they are able to build it into this process and then have an effective playbook. Now we'll be looking at the key elements of an effective incident playbook. So the key elements are four. One is the initiating condition. This particular one defines What the trigger is, then you have the process steps. This actually spelled out the step by step instruction on how to execute the playbook. Like I said, there are different types of playbook and each playbooks has its unique processes. The way phishing playbook is actually different from how the malware playbook is, because the flow of the two are actually different. And so the steps to curtailing them also differs. So the playbook actually spelled out how this can be executed. Then you have the roles and responsibilities. This actually tells you which of the team is responsible for what, which must be in line with the best practices. And then we have the communication. Here describes the internal and external communication procedures. With the communication metrics, you are able to identify the escalation points for the escalation. Line or chain, which helps to the team to be able to coordinate properly. Now we're looking at a typical example of efficient attack response playbook. This is not the best of it, but this is just for the purpose of learning. So I'll be assuming it. A large organization, a financial organization, faced a suffocated phishing attack targeting its employees. The attacker aimed to steal sensitive information and gain unauthorized access to the complaint system. Remember the first thing we said, trigger, which is the initiating condition. The employer, the employee reports a suspicious email or the security team detected the unusual logging attempt and flagged them as potential phishing attempts. So this is a trigger. The employee reports it as a suspicious email. Or, the security team are able to detect it using any of the automated tools. Now, we'll go to how this can be built into the NIST Incident Response Plan. One, we have the detection state. Or, Remember we said it's a phishing email. So the first thing is to verify that it's a phishing attempt because the trigger said it's a phishing attempt to steal information. in verifying the phishing attempt, we're going to be considering looking at the IOCs. We're talking about the malicious link, the attachments, and the impersonated domains using some threat intelligent platforms. let's such as Recorded Future or SODAN or Abuse IDP, IDPX, sorry. So in such situation, the team goes in there to check and see if there have been any reported abuse on the identified hiruses. And then we move to containment. Containment has to do with stopping this freight. And stopping this thread is stated that you block the sender's email address. You quarantine the affected email. You also revoke any access that is granted by the compromise credentials. So I'll move to the eradication. So you have scanned the affected endpoint. You also review the logs to ensure that there is no other employee who must have clicked on the, compromised or interacted with the emails. If there is any, you reset their passwords just to ensure that there is no more spread. Then we go to the recovery. Here you are ensuring that all the compromised accounts on the system are secured. You can test by also stimulating the potential phishing exploits to be sure that there is no residue remaining within the environment. Then you post incident activity. There you are reviewing the attack details. The response efforts and the results, you're looking at what you've done and you're trying to identify the gaps as well as what you can do better to improve on the pull on the security posture and here you can determine or begin to consider looking at strengthening the email filters and possible also providing possible trainings to the employee to ensure that they are actually phishing aware, especially when they see any of those emails being sent by the threat actors. So this is a sample of possible phishing response playbook that could be developed to, prevent a spread of phishing attack. This is not the best of it, but just to give us an idea of how efficient response playbook look like. And then we look at the tools. These tools are actually used to automate the playbooks. One of them is the security information and events management, which is the same. And under this team, there are different, SIM tools that could be used. One of them is Plum, and you have the list of orders. You also have the endpoints detection and response, tools. An example, you have the Carbon Black, you have the Microsoft Defender, and we have the SOAR, which is also the Security Orchestration, Automation, and Response tools. One of the examples is Microsoft Sentinel. So there are different tools that could be used in that regards. We also have the Incident Management tools. So we have different tools within that square that could be used. We also have the Threat Intelligence Platform. One of them is Recorded Future, and you have all the rest of others that could be used. In using this tool, we cannot rule out the woman factor or the woman intelligence, because the woman intelligence helps to analyze some of the, identified, threat indicators, and they are able to, speak to those issues. Actually, when In especially when in identifying the incidents, in, in identifying those incidents, you either be true or false. Sometimes you have some incidents that are false positive. So with the women intelligence, you're able to identify and look at the behavior as well as their normalities and be able to determine if they're true or they're false. This is also the role of woman intelligence in deter in playbooks and also in. Ensuring the security of incidents. then we have common pitfalls to avoid. One is outdated playbook. Due to the evolving nature of technology, the cyber actors or the threat actors also keep improving their tactics on how to get into our system and steal valuable information. So organizations need to ensure that their playbooks are updated and updated. And they are also up to the current security, trend. They have lack of testing where processes or tools are not tested to validate their effectiveness in detecting those abnormalities, those incidents. It can be an issue and that should be avoided. And then we have poor communication where there is no proper definition of communication metrics. It becomes a challenge because You wouldn't know who to escalate to. So the chain of communication becomes a challenge, so that need to be avoided. And then in conclusion, I will say that by using a well designed incident response playbook, organizations are able to enhance efficiency and reduce downtime, and also improve on their role. overall security posture. Thank you for listening.
...

Chinyere Chinekezi

XDR Security Analyst @ Sapphire

Chinyere Chinekezi's LinkedIn account



Join the community!

Learn for free, join the best tech learning community for a price of a pumpkin latte.

Annual
Monthly
Newsletter
$ 0 /mo

Event notifications, weekly newsletter

Delayed access to all content

Immediate access to Keynotes & Panels

Community
$ 8.34 /mo

Immediate access to all content

Courses, quizes & certificates

Community chats

Join the community (7 day free trial)