• Latest
Surviving the Incident – DZone

Surviving the Incident – DZone

December 19, 2022
How to make MKBHD logo ( Marques Brownlee) in Adobe illustrator CC 2020 – TUTORIAL for beginners .

How to make MKBHD logo ( Marques Brownlee) in Adobe illustrator CC 2020 – TUTORIAL for beginners .

March 23, 2023
OnePlus One Review!

OnePlus One Review!

March 23, 2023
Microsoft Scrapped a PS5 Version of Redfall, Says Arkane Director

Redfall Isn’t Using Unreal Engine 5 After All

March 23, 2023
CloudWatch Custom Log Metric Alarm Notification

CloudWatch Custom Log Metric Alarm Notification

March 23, 2023
Most Overrated Tech? 8K Ask MKBHD 2020!

Most Overrated Tech? 8K Ask MKBHD 2020!

March 23, 2023
Apple further cracks down on remote work

Apple further cracks down on remote work

March 23, 2023
Tesla's Wireless Charger: Explained!

Tesla's Wireless Charger: Explained!

March 23, 2023
Introduction to Container Orchestration – DZone

Introduction to Container Orchestration – DZone

March 23, 2023
Samsung Galaxy M54 silently goes official as an amped up version of the A54

Samsung Galaxy M54 silently goes official as an amped up version of the A54

March 23, 2023
Casey Neistat Studio Tour!

Casey Neistat Studio Tour!

March 23, 2023

Apple Watch Series 8 vs 7 and earlier

March 23, 2023
Final Fantasy XI Producer Akihiko Matsui Passes The Torch, Plans Backend Upgrade

Final Fantasy XI Producer Akihiko Matsui Passes The Torch, Plans Backend Upgrade

March 23, 2023
Advertise with us
Thursday, March 23, 2023
Bookmarks
  • Login
  • Register
GetUpdated
  • Game Updates
  • Mobile Gaming
  • Playstation News
  • Xbox News
  • Switch News
  • MMORPG
  • Game News
  • IGN
  • Retro Gaming
  • Tech News
  • Apple Updates
  • Jailbreak News
  • Mobile News
  • Software Development
  • Photography
  • Contact
No Result
View All Result
GetUpdated
No Result
View All Result
GetUpdated
No Result
View All Result
ADVERTISEMENT

Surviving the Incident – DZone

December 19, 2022
in Software Development
Reading Time:7 mins read
0 0
0
Share on FacebookShare on WhatsAppShare on Twitter


This is an article from DZone’s 2022 Enterprise Application Security Trend Report.

For more:

Read the Report

A wave of cyber incidents in recent years, such as the SolarWinds supply chain attack, Accellion data breach, Exchange Server, and Log4j vulnerabilities, have exposed the “fragility” of modern businesses and the challenges in information security. The outcome of a cyber event can range from a minor business operations disruption to “crippling financial and legal costs” (Alan P., GCST). Despite how increasingly sophisticated threat actors have become, the typical attack scenarios remain the same, and thus analysts and responders can adequately address these events using previous tactics. 

Effective incident response (IR) playbooks are the best antidote to unpredictable attacks. A practical IR playbook is key to stay organized and lead to minimal risk. According to Jyotsana Gupta, an “incident response is a process that allows you to respond quickly and effectively to a cybersecurity breach” (Wire19). IR playbooks enable analysts to respond to an incident consistently, ensure correct procedures are followed, and provide organizations with a roadmap to determine where processes can be automated and enhanced to improve critical response time. 

What goes into creating an IR playbook? We will discuss how to design an IR playbook for an organization, covering topics such as assembling your IR team, identifying critical systems, creating notification procedures, and conducting post-incident review. For those eager to design a large-scale IR playbook, NIST and SANS are the two most popular incident response frameworks for granular IR planning approaches. While they differ in categorizing the incident response phases, both follow the same basic process.

How to Build an Incident Response Playbook

What’s your plan? While Indiana Jones might say, “I don’t know, I’m making this up as I go,” good luck trying that line on customers and regulators. To begin drafting the IR playbook, some companies require engagement from critical business units to form an incident response (IR) team, while other large organizations may already have an established, dedicated computer security incident response team (CSIRT). The core of the IR or CSIRT team will usually be IT or cybersecurity staff, and the ideal sponsor is from the C-Suite, such as the CISO, who will help empower the team with resources to act swiftly and drive accountability across the organization. Other members may be drawn from the IT operations staff, the vulnerability and risk management team, security engineers and architects, and intelligence analysts. Extended partners may include other capabilities, such as PR, HR, and legal. 

Hierarchy of a CSIRT/IR team

Figure 1: Hierarchy of a CSIRT/IR team

Identify the Crown Jewels

The next step to the IR playbook is to identify the “crown jewels” of the organization — the critical systems, services, and operations that, if impacted by a cyber event, would disrupt business operations and cause a loss of revenue. Similarly, understanding the collected data type, how it is transmitted and stored, and who should access it must be mapped to ensure data security. 

Identifying and mapping critical systems can be accomplished through penetration tests, risk assessments, and threat modeling. A risk assessment is often the first tool to identify potential attack vectors and prioritize security events. However, to achieve a proactive stance, organizations are increasingly leveraging threat intelligence and modeling to identify and address vulnerabilities and security gaps early on before a known attack occurs. The primary goal is to identify weaknesses or vulnerabilities with assets to reduce the attack surface and close all the security gaps.

This guide will focus on web application security as our attack scenario. Why web application security? Applications have become the backbone of most organizations, making web applications, websites, and web-based services a prime target for malicious threat actors attempting to exploit vulnerable application code. As is stated by Gupta: 

Web applications are attractive targets for the following reasons: 

  • Complexity – Web applications have inherent complex source code, making it likely that an app contains unpatched vulnerabilities or is open to code manipulation.
  • High-value rewards – Attackers can manipulate source code to access valuable data, including personal and sensitive business information.
  • Easy execution – attacking web applications is usually straightforward with automation and large-scale attacks targeting multiple sites simultaneously (Wire19).

Understand the Threats 

The next step is creating notification procedures led by the IR or CSIRT team. In the attack scenario (Figure 2), the IR team or CSIRT will often begin with basic security procedures of securing web applications, such as deploying and configuring a web application firewall (WAF) or configuring access control policies. The security team might block cyber attacks using WAF rules to block active exploits and prevent further damage. 

Sample attack scenario response workflow

Figure 2: Sample attack scenario response workflow

Web application configurations allow and deny access by creating policy rules in the web access layer. A baseline example is focusing on URL category filtering by creating policies: 

  • Allow users to access all organizations’ approved social networking sites such as LinkedIn and block other sites such as TikTok.
  • Allow users to access personal email accounts but prevent sending email attachments.

When WAFs and configurations are in place, the web application is monitored for suspicious activity. The communication aspect of the IR playbook comes into play when careful logging and monitoring at the application level detect suspicious activity, such as repeated access attempts or unexpected user accounts being created. Suspicious activity is often detected using a security information and event management (SIEM) solution or through regular security testing using a web vulnerability scanner (Alan P., GCST). 

After detecting a security incident, the IR team should “triage it,” meaning they should determine the appropriate action to limit short-term consequences and stop minor incidents from growing into large-scale attacks (Alan P., GCST). But what happens when the cyber event cannot be contained, and the evidence of a data breach is quickly mounting? 

According to Alan P., “global cyberattacks have served as a reminder that plugging security holes is often the easiest part.” Threat actors such as advanced persistent threats (APT) don’t conduct hit-and-run attacks. These attacks “infiltrate target systems to maintain a stealthy and persistent presence. Eliminating the entry point is the start of a long and arduous process” with the IR or CSIRT team (Alan P., GCST). 

Determine Communication Channels

When outages in programs or degradation of system performance occur, communication must be clear and effective. Communication will directly impact your team’s responsiveness to threats. While the CSIRT team is focused on analysis, containment, and remediation, proper incident response communications to leadership and read-in members are critical to success. 

Managers should be informed of the situation and understand the implications to give their team the next steps to respond to an incident. Many users have questions such as whether the users should keep working or turn off their machines. What is worse are users unplugging machines with the belief it will stop the issue from spreading (David Landsberger, CompTIA). 

The next phase is to manage staff and customers. Gupta notes: 

After a data breach, there might be a legal obligation to notify data owners (i.e., per the GDPR). The jurisdiction and data class will determine whether you must report the incident to the relevant authorities and provide updates when new information is available (Wire19). 

A few examples of how to communicate an incident to staff and customers include: 

  • An email for internal incident response
  • A status page
  • A message via chat channels within your team (e.g., Slack)
  • Outward-facing communication with clients and customers through public relations teams

Enable Postmortems

Molly Star (Lightstep Blog) states: “Incident response management doesn’t end when the incident is resolved. Your playbook should detail your postmortem process, from documentation and discussion to action items.” Postmortem follow-up is essential because the organization needs to review how they can improve the security of their systems and, in other words, “harden” their perimeter.

The first step is to identify the root cause of the cyber event via the logs on your firewall/WAFs or through the SIEM. By identifying the root cause, remediation can begin to prevent the same or similar cyber events. No solution is perfect, and even if an organization is doing everything right, it is best to adopt an assume-breach mentality.

Summary of incident response process

Figure 3: Summary of incident response process 

Conclusion

Data breaches are inarguable and demonstrate a failure to secure systems, and it’s on the organization to respond quickly and effectively. Having a tested IR playbook in hand, continually practiced through tabletop exercises, can help your team cross the finish line while minimizing material impact to the company. Incidents can have a lasting impact, even if adequately handled. A developer-driven, security-first mindset is worth considering. It has a positive ripple effect on the business if developers and security teams can work together and learn lessons from previous incidents. 

This guide is a wake-up call to implement holistic information security practices that have both developers and security teams moving toward the same goal as a collective. Dedicating time to threat model with developers to build secure code upfront is a small resource investment that has the potential to yield significant gains for the business in the long term. After all, it can shrink the attack surface, reducing impact should an incident occur. 

References: 

This is an article from DZone’s 2022 Enterprise Application Security Trend Report.

For more:

Read the Report



Source link

ShareSendTweet
Previous Post

Samsung Galaxy A04, Galaxy A04e arrive in India

Next Post

Oppo and OnePlus announce new strategic partnership

Related Posts

CloudWatch Custom Log Metric Alarm Notification

March 23, 2023
0
0
CloudWatch Custom Log Metric Alarm Notification
Software Development

Amazon CloudWatch metric alarm allows customers to watch a metric value, or a math expression value for the metric, and...

Read more

Introduction to Container Orchestration – DZone

March 23, 2023
0
0
Introduction to Container Orchestration – DZone
Software Development

Container orchestration is a critical aspect of modern software development, enabling organizations to deploy and manage large-scale containerized applications. In...

Read more
Next Post
Oppo and OnePlus announce new strategic partnership

Oppo and OnePlus announce new strategic partnership

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

© 2021 GetUpdated – MW.

  • About
  • Advertise
  • Privacy & Policy
  • Terms & Conditions
  • Contact

No Result
View All Result
  • Game Updates
  • Mobile Gaming
  • Playstation News
  • Xbox News
  • Switch News
  • MMORPG
  • Game News
  • IGN
  • Retro Gaming
  • Tech News
  • Apple Updates
  • Jailbreak News
  • Mobile News
  • Software Development
  • Photography
  • Contact

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?