Defining Incident Management Processes for Csirts: a Work in Progress
Total Page:16
File Type:pdf, Size:1020Kb
Defining Incident Management Processes for CSIRTs: A Work in Progress Chris Alberts Audrey Dorofee Georgia Killcrece Robin Ruefle Mark Zajicek October 2004 TECHNICAL REPORT CMU/SEI-2004-TR-015 ESC-TR-2004-015 Pittsburgh, PA 15213-3890 Defining Incident Management Processes for CSIRTs: A Work in Progress CMU/SEI-2004-TR-015 ESC-TR-2004-015 Chris Alberts Audrey Dorofee Georgia Killcrece Robin Ruefle Mark Zajicek October 2004 Networked Systems Survivability Program Unlimited distribution subject to the copyright. This report was prepared for the SEI Joint Program Office HQ ESC/DIB 5 Eglin Street Hanscom AFB, MA 01731-2116 The ideas and findings in this report should not be construed as an official DoD position. It is published in the interest of scientific and technical information exchange. FOR THE COMMANDER Christos Scondras Chief of Programs, XPK This work is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a federally funded research and development center sponsored by the U.S. Department of Defense. Copyright 2004 Carnegie Mellon University. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks in this report is not intended in any way to infringe on the rights of the trademark holder. Internal use. Permission to reproduce this document and to prepare derivative works from this document for internal use is granted, provided the copyright and "No Warranty" statements are included with all reproductions and derivative works. External use. Requests for permission to reproduce this document or prepare derivative works of this document for external and commercial use should be addressed to the SEI Licensing Agent. This work was created in the performance of Federal Government Contract Number F19628-00-C-0003 with Carnegie Mel- lon University for the operation of the Software Engineering Institute, a federally funded research and development center. The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose the work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the copy- right license under the clause at 252.227-7013. For information about purchasing paper copies of SEI reports, please visit the publications portion of our Web site (http://www.sei.cmu.edu/publications/pubweb.html). Table of Contents Preface .......................................................................................................... ix Acknowledgements.............................................................................................. xiii Abstract ......................................................................................................... xv 1 Introduction ..................................................................................................... 1 1.1 Definition of a CSIRT ............................................................................... 1 1.2 Definition of Incident Management........................................................... 2 1.3 Who Performs Incident Management ....................................................... 5 1.4 A Process Model for Incident Management .............................................. 8 1.5 Purpose of this Report ............................................................................. 9 1.6 Scope of this Report .............................................................................. 10 1.7 Intended Audience ................................................................................. 11 1.8 Use of this Report .................................................................................. 12 1.9 Structure of the Report........................................................................... 13 1.10 Reading and Navigating this Report....................................................... 14 2 Incident Management Concepts and Processes......................................... 15 2.1 Incident Management Requirements...................................................... 15 2.2 Overview of Incident Management Processes........................................ 16 2.3 Why We Chose These Processes.......................................................... 19 2.4 Incident Management Versus Security Management............................. 23 2.5 Applying These Incident Management Concepts and Processes ........... 27 2.6 Getting Started....................................................................................... 34 2.7 Detailed Workflow Diagrams and Descriptions....................................... 35 3 Overview of Process Mapping...................................................................... 37 3.1 What is Process Mapping?..................................................................... 37 3.2 Applying Process Mapping to Incident Management.............................. 38 3.3 Our Process Mapping Methodology ....................................................... 39 3.3.1 Additional Uses for the Workflow Model ..................................... 41 CMU/SEI-2004-TR-015 i 3.4 Guide to Reading the Incident Management Process Maps....................42 3.4.1 Workflow Diagrams.....................................................................42 3.4.2 Workflow Descriptions.................................................................46 4 Incident Management Process Workflows and Descriptions ....................49 4.1 Overview ................................................................................................49 4.2 Incident Management .............................................................................50 4.2.1 PC: Prepare/Sustain/Improve Process (Prepare) ........................54 4.2.1.1 PC: Prepare/Sustain/Improve Workflow Diagram .........56 4.2.1.2 PC: Prepare/Sustain/Improve Workflow Description.....58 4.2.1.3 Handoff from Any Activity Inside or Outside CSIRT Process to PC: Prepare/Sustain/Improve .....................68 4.2.1.4 Handoff from PC: Prepare/Sustain/Improve to PI: Protect Infrastructure ................................................................72 4.2.2 PI: Protect Infrastructure Process (Protect) .................................76 4.2.2.1 PI: Protect Infrastructure Workflow Diagram.................80 4.2.2.2 PI: Protect Infrastructure Workflow Description.............82 4.2.2.3 Handoff from Any Activity Inside or Outside CSIRT Process to PI: Protect Infrastructure .............................86 4.2.2.4 Handoff from PI: Protect Infrastructure to D: Detect Events ..........................................................................90 4.2.3 D: Detect Events Process ...........................................................94 4.2.3.1 Reactive Detection .......................................................94 4.2.3.2 Proactive Detection ......................................................94 4.2.3.3 Detect Events Details ...................................................95 4.2.3.4 D: Detect Events Workflow Diagram.............................98 4.2.3.5 D: Detect Events Workflow Description ......................100 4.2.3.6 Handoff from Any Activity Inside or Outside of the Organization to D: Detect Events................................104 4.2.3.7 Handoff from D: Detect Events to T: Triage Events ....108 4.2.4 T: Triage Events (Triage) Process .............................................112 4.2.4.1 T: Triage Events Workflow Diagram ...........................116 4.2.4.2 T: Triage Events Workflow Description.......................118 4.2.4.3 Handoff from T: Triage Events to R: Respond ............122 4.2.5 R: Respond Process .................................................................128 4.2.5.1 Technical Response...................................................128 4.2.5.2 Management Response .............................................129 4.2.5.3 Legal Response .........................................................129 4.2.5.4 Coordination of Response Activities ...........................129 4.2.5.5 R: Respond Workflow Diagram ..................................132 4.2.5.6 R: Respond Workflow Description ..............................134 4.2.5.7 Handoff from R: Respond to PC: Prepare/Sustain/Improve............................................140 ii CMU/SEI-2004-TR-015 4.2.5.8 R1: Respond to Technical Issues Workflow Diagram...................................................... 144 4.2.5.9 R2: Respond to Management Issues Workflow Diagram...................................................... 148 4.2.5.10 R3: Respond to Legal Issues Workflow Diagram ....... 152 5 Future Work................................................................................................. 157 Bibliography ....................................................................................................... 161 Appendix A: Context for Each of the Process Workflows........................ A-1 Appendix B: Acronyms................................................................................ B-1 Appendix C: Glossary.................................................................................