This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP Incident Response Project
OWASP Incident Response ProjectThe OWASP Incident Response Project is a proactive set of recommendations for organizations to use as a best practice for for building a proactive incident response program Introduction1. Introduction A Security incident is an identified occurrence or weakness indicating a possible breach of security policies or failure of safeguards, or a previously unknown situation which may be security relevant.[1] Organizations are susceptible to different types of attacks which might be simple or sophisticated in nature and attack vectors such as attempted hacks, viruses, and trojans keep evolving at a pace that calls for constant vigilance. Incidents have the potential to affect the confidentiality, integrity and availability of information or services provided by an organization. Incident Response is the reaction to an identified occurrence whereby responders classify an incident, investigate and contain the incident . Incident Documentation is also a part of this procedure which should be conducted in an efficient and timely fashion. More often than not, many companies fail to appreciate how much they stand to lose when they do not have the people, processes and tools that are required for Incident Recovery procedures. Statistics reveal that security incidents now occur on a regular basis and cause substantial business interruption when it is not well handled. Why is Incident Response Important? The answer is straightforward. Any challenge or problem which is not properly contained and handled can and will spiral into bigger problems that can eventually lead to the total collapse of the system. Incidents will occur even in environments that are adequately prepared for it. A competent Incident Response operation will help to Minimize loss. Mitigate the weaknesses that were exploited. Restore services and processes. Reduce the risk that can occur from future incidents.
Our advice is that you do a comprehensive audit or review of your constituency in order to have a very good picture of where the organization stands.
2. Consideration 1. Audit and Due Diligence. Performing an audit will let you know how well prepared the organization is for Incident Response in terms of: · People. Is there a formal Incident Response team? if yes , do the team members have adequate technical skills for the designated roles or tasks ? · Process. When an incident occurs do the team members know what to do, when to do it and how to do it? · Equipment and Materials. Has the organization identified the equipment, materials or information mission critical to the business? Where are such equipment or materials stored? What are the interactions between business processes, supportive systems and external suppliers? Are these interactions monitored and documented ? etc. All these questions and more will be answered when an audit is performed. Remember due diligence will expose the problems an organization can face in implementing an effective Incident Response Plan.
4. Consideration 3. Create a Documented Incident Response Plan. An organization should have a well-documented Incident Response plan that would guide the Incident Response Team during an incident. There are many sample documents available which can help you in this exercise. Any plan drawn up for the team and firm must be practicable and in accordance with best practice. A good starting point is to start off with standards such as the ISO/IEC 27000 series. However, in a bid to follow best practice , do not draft a plan that will not be feasible for your team and organization . You can ask an auditor, a third party expert or an ISO 27001 certification body, to confirm that your incident response plan is at par with your standard practices. A comprehensive plan at minimum , should cover Roles and Responsibilities, Investigation, Triage and Mitigation, Recovery, and Documentation process. These steps should be actionable by members of the Incident Response Team. Executives should be familiar with the plan and equipped with appropriate procedures for handling outside inquiries.
A Web server’s log entries that that indicates the use of a vulnerability scanner. A host’s audit log indicating a suspicious change in its configuration. Just to mention a few These triggers or indicators should be documented. It is advisable that it also goes into your documented Incident Response Plan (see the previous section for more details) and known to the all members of your organizations . This may require some training or a comprehensive awareness campaign as the information should not be limited to the Incident Response team. 6. Consideration 5.Investigate the Problem When an event occurs, an Incident Response Team is required to categorize the event and identify whether or not you have an incident. The review will determine if it is a valid potential incident or not. A thorough investigation will require input from the Incident Response Team and might require input from external resources (see Incident Response Team members above). In investigation, the necessary course of action will depend on the cause of the incident and plan according to the Incident Response documentation. Note that some incidents can be fixed swiftly while some may take a while to resolve. In any scenario, communication within and without the team is very important and all stakeholders should be briefed accordingly. The investigation will document the incident details, including what to look for, who to involve, and how to document what is found. Some other activities that can be carried out are listed below. Establishing , clearly what has occurred.(Is it a malware attack, system hack, session hijack, Denial of Service etc) Identify what systems, people or processes have been compromised or affected based on incident. Determine what happened to what was compromised. Determine the point of origin of the incident where possible .This infers that you establish the source of the threat or attack vector. Specifying your investigation objectives, triage and resolution methodology. Gathering , reviewing and detailed analysis of all information concerning the incident, Adequate checks on equipment for malfunctions and vulnerability that may have led to the incident. What information (if any) has been disclosed to unauthorized parties, deleted or corrupted. Identifying the potential business impact of the incident: i.e. Business Interruption , Financial Loss. Other investigative procedures to be carried out like Forensics , Prosecution etc For example , if the Incident has to do with a compromised equipment within a network, it will be advisable to determine which equipment was compromised, if the compromise came from an external or internal source. If it is determined that the incident merits probable legal action, preserving the evidence in its original form will be a crucial requirement. The Legal Counsel will recommend proper steps for documenting the evidence and collaborate with Law enforcement agencies where necessary.
For some incidents, the response may require more complicated and coordinated actions to remove the attack vectors or attackers from your environment. Some organizations may not have the expertise or experience to execute and document all steps and would require external input. The details for vendors who may need to respond, such as an ISP during a Denial of Service attack, or a forensics firm to mitigate a Complex Advanced Persistent threat should be included in the Incident Report. In summary , the triage process should cater for the following activities: Classification of the Incident. Incident Prioritization. Assigning specific tasks to specific people. Note that the initial part of an investigation is sometimes referred to as Triage.
· Install or replace equipment that are susceptible to exploits. The overall objective of the recovery process in Incident Response is to reinstate systems to normalcy , affirm that the systems are functioning normally, and repudiate all known vulnerabilities to prevent similar incidents from reoccurring.
Sharing Information with internal and external stakeholders. Sometimes, there is a considerable amount of information generated from incidents that occur within an organization and you can share information with external vendors or trusted service providers in a bid to educate them and also receive helpful information from them when the need arises. Note that sharing information should be on a ‘need to know’ basis and it is advisable for organizations to involve the Legal Counsel expert when creating reports so that factors such as regulatory obligations, contractual obligations, and insurance obligations are properly considered as an incident investigation proceeds. All team members should be trained in a common lexicon of language to guarantee prompt and clear communication during incident response. 10. Consideration 9. Process Review. It is imperative to continuously monitor an incident and the workload/performance of the team or Incident Handler. When you review an incident comprehensively you can make intelligent decisions about the factors listed below. · Should I increase or decrease the number of Incident Handlers? · Do we need to develop automated procedures for Incident Handling? . What risks did we identify during the incident that needs to be followed up for action and monitored closely ? Other activities that should also be considered during a process review is keeping a Lessons Learnt log. The lessons can be positive or negative in nature but they should be current and relevant and ensure the maturity of your team over time. You might want to keep versions of the log so that you can keep track of its development and know which previous lessons learned were either integrated successfully and which needs to be revisited. 11. Consideration 10. Practice , Practice , Practice. Do not wait until an incident occurs before you put your team to work. Once the organization has a workable plan in place, it is advisable to run through part or all of it as a tabletop exercise. Assemble the various stakeholders and talk through different scenarios and how the group would react. Document the results of these exercises and incorporate the findings into your plan. When new resource persons join your Incident Response team, it is important that they understand how important these mock drills and practice are to the firm. Sometimes you can practice the organization’s plan by simulating a live scenario. This test can be as simple as dropping a thumb drive on the floor of the office and seeing what happens, to simulating a data breach or phishing attack. Your objective is not to intimidate the team members or peers but to determine if your plan works or not before the real event occurs. Drills and practices also reveal where lapses are and they can be resolved before real life scenarios happen.
References. 1. An empirical study on the use of the Generic Security Template for structuring the lessons from information security incidents. 2014. By Ying He, Chris Johnson,Karen Renaud ,Yu Lu and Salem Jebriel. School of Computing Science University of Glasgow,Glasgow, UK URL:http://www.researchgate.net/profile/Ying_He14/publication/262300500_An_empirical_study_on_the_use_of_the_Generic_Security_Template_for_structuring_the_lessons_from_information_security_incidents/links/5433e19c0cf2dc341dae01aa.pdf 2. Top Considerations for Incident Response by Legal Sec URL: http://www.proactiverisk.com/wp-content/uploads/2015/06/IR-Guidance.pdf 3. Information Security Incident Reporting Policy by Herefordshire Council , 2013 4, Good Practice Guide for Incident Management by ENISA , 2010. URL:https://www.enisa.europa.eu/activities/cert/support/incident-management/files/good-practice-guide-for-incident-management 5. Local Government Cyber Security :Cyber Incident Response Guide,A Non-Technical Guide Essential for Elected Officials ,Administrative Officials and Business Managers by MS-ISAC URL:http://msisac.cisecurity.org/members/local-government/documents/finalincidentresponseguide.pdf DescriptionThis project is a guide of suggested best practices for stand-alone IR of a web application on dedicated hardware that you have 100% access to as well as when the application is part of a cloud service offering. The goal is to provide a best practices checklist that can be used to ensure chain of custody and to assist with investigations of root-cause. LicensingThe OWASP Incident Response Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
|
What is the OWASP Incident Response Project?The OWASP Incident Response Project provides:
PresentationMore Coming at AppSecUSA 2015 join us! Project LeaderYolanda Baker Related Projects
|
Quick Download
News and Events
In PrintThis project WILL be available as a publication when released. Classifications |
- Q1 Will this project help me respond to a computer security breach
- A1 Yes, we are providing a sample IR plan and related reference materials to get started review this Top Considerations
- Q2 Is there a googledoc associated with this project or a wiki page?
- A2 Yes with your @owasp.org email address you can access the google docs page click here
Volunteers
Incident Response Project is developed by a worldwide team of volunteers. The primary contributors to date have been:
- Tom Brennan
- <insert your name>
- <insert your name>
- <insert your name>
- <insert your name>
Want to help? Get in touch with us
Others
- OWASP NYC Metro Chapter
As of 27-July-2015, the priorities are:
- Collect materials in the public domain and list them as reference points.
- Review existing materials and extract the Top 10 most important things for common common environments based on OS Type
Involvement in the development and promotion of OWASP Incident Response Project is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
- Proof Reading
- Graphic Design
- Conduct Industry Survey
- <insert your idea>
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|