




版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency2
CONTENTS
Introduction 3
Overview 3
Scope 3
Audience 4
IncidentResponsePlaybook 5
IncidentResponseProcess 5
PreparationPhase 6
Detection&Analysis 10
Containment 14
Eradication&Recovery 15
Post-IncidentActivities 16
Coordination 17
VulnerabilityResponsePlaybook 21
Preparation 21
VulnerabilityResponseProcess 22
Identification 22
Evaluation 23
Remediation 24
ReportingandNotification 24
AppendixA:KeyTerms 25
AppendixB:IncidentResponseChecklist 27
AppendixC:IncidentResponsePreparationChecklist 35
AppendixE:VulnerabilityandIncidentCategories 38
AppendixF:SourceText 39
AppendixG:Whole-of-GovernmentRolesandResponsibilities 41
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency3
INTRODUCTION
TheCybersecurityandInfrastructureSecurityAgency(CISA)iscommittedtoleadingtheresponsetocybersecurityincidentsandvulnerabilitiestosafeguardthenation'scriticalassets.Section6ofExecutiveOrder14028directedDHS,viaCISA,to“developastandardsetofoperationalprocedures(playbook)tobeusedinplanningandconductingcybersecurityvulnerabilityandincidentresponseactivityrespectingFederalCivilianExecutiveBranch(FCEB)InformationSystems.”
1
Overview
Thisdocumentpresentstwoplaybooks:oneforincidentresponseandoneforvulnerabilityresponse.TheseplaybooksprovideFCEBagencieswithastandardsetofprocedurestoidentify,coordinate,remediate,recover,andtracksuccessfulmitigationsfromincidentsandvulnerabilitiesaffectingFCEBsystems,data,andnetworks.Inaddition,futureiterationsoftheseplaybooksmaybeusefulfororganizationsoutsideoftheFCEBtostandardizeincidentresponsepractices.Workingtogetheracrossallfederalgovernmentorganizationshasproventobeaneffectivemodelforaddressingvulnerabilitiesandincidents.Buildingonlessonslearnedfrompreviousincidentsandincorporatingindustrybestpractices,CISAintendsfortheseplaybookstoevolvethefederalgovernment’spracticesforcybersecurityresponsethroughstandardizingsharedpracticesthatbringtogetherthebestpeopleandprocessestodrivecoordinatedactions.
Thestandardizedprocessesandproceduresdescribedintheseplaybooks:
?Facilitatebettercoordinationandeffectiveresponseamongaffectedorganizations,
?Enabletrackingofcross-organizationalsuccessfulactions,
?Allowforcatalogingofincidentstobettermanagefutureevents,and
?Guideanalysisanddiscovery.
Agenciesshouldusetheseplaybookstohelpshapeoveralldefensivecyberoperationstoensureconsistentandeffectiveresponseandcoordinatedcommunicationofresponseactivities
Scope
TheseplaybooksareforFCEBentitiestofocusoncriteriaforresponseandthresholdsforcoordinationandreporting.TheyincludecommunicationsbetweenFCEBentitiesandCISA;theconnectivecoordinationbetweenincidentandvulnerabilityresponseactivities;andcommondefinitionsforkeycybersecuritytermsandaspectsoftheresponseprocess.Responseactivitiesinscopeofthisplaybookincludethose:
?InitiatedbyanFCEBagency(e.g.,alocaldetectionofmaliciousactivityordiscoveryofavulnerability)
?InitiatedbyCISA(e.g.,aCISAalertordirective)orotherthirdparties,includinglawenforcement,intelligenceagencies,orcommercialorganizations,contractors,andserviceproviders
TheIncidentResponsePlaybookappliestoincidentsthatinvolveconfirmedmaliciouscyberactivityandforwhichamajorincident(asdefinedbytheOfficeofManagementandBudget[OMB]in
1
ExecutiveOrder(EO)14028:ImprovingtheNation'sCybersecurity
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency4
MemorandumM-20-04
2
orsuccessormemorandum)hasbeendeclaredornotyetbeenreasonablyruledout.TheVulnerabilityResponsePlaybookappliestovulnerabilitiesbeingactivelyexploitedinthewild.AsrequiredbyEO14028,theDirectorofOMBwillissueguidanceonFCEBagencyuseoftheseplaybooks.
Note:theseplaybooksdonotcoverresponseactivitiesthatinvolvethreatstoclassifiedinformationorNationalSecuritySystems(NSS)asdefinedby44U.S.C.3552(b)(6).SeeCNSSI1010
3
forcoordination/reportingguidanceforincidentsspecifictoNSSorsystemsthatprocessclassifiedinformation.
Audience
TheseplaybooksapplytoallFCEBagencies,informationsystemsusedoroperatedbyanagency,acontractorofanagency,oranotherorganizationonbehalfofanagency.Itisthepolicyofthefederalgovernmentthatinformationandcommunicationstechnology(ICT)serviceproviderswhohavecontractedwithFCEBagenciesmustpromptlyreportincidentstosuchagenciesandtoCISA.
4
2
OfficeofManagementandBudget(OMB)MemorandumM-20-04:FiscalYear2019-2020GuidanceonFederalInformation
SecurityandPrivacyManagementRequirements
3
CommitteeonNationalSecuritySystems
4
EO14028,Sec.2.RemovingBarrierstoSharingThreatInformation
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency5
INCIDENTRESPONSEPLAYBOOK
Whentousethisplaybook
Usethisplaybookforincidentsthatinvolveconfirmedmaliciouscyberactivityforwhichamajorincidenthasbeendeclaredornotyetbeenreasonablyruledout.
Forexample:
?Incidentsinvolvinglateralmovement,credentialaccess,exfiltrationofdata
?Networkintrusionsinvolvingmorethanoneuserorsystem
?Compromisedadministratoraccounts
Thisplaybookdoesnotapplytoactivitythatdoesnotappeartohavesuchmajorincidentpotential,suchas:
?“Spills”ofclassifiedinformationorotherincidentsthatarebelievedtoresultfromunintentionalbehavioronly
?Usersclickingonphishingemailswhennocompromiseresults
?Commoditymalwareonasinglemachineorlosthardwarethat,ineithercase,isnotlikelytoresultindemonstrableharmtothenationalsecurityinterests,foreignrelations,oreconomyoftheUnitedStatesortothepublicconfidence,civilliberties,orpublichealthandsafetyoftheAmericanpeople.
Thisplaybookprovidesastandardizedresponse
processforcybersecurityincidentsanddescribes
theprocessandcompletionthroughtheincident
responsephasesasdefinedinNationalInstituteof
StandardsandTechnology(NIST)Special
Publication(SP)800-61Rev.2,
5
including
preparation,detectionandanalysis,containment,
eradicationandrecovery,andpost-incident
activities.Thisplaybookdescribestheprocess
FCEBagenciesshouldfollowforconfirmed
maliciouscyberactivityforwhichamajorincident
hasbeendeclaredornotyetbeenreasonablyruled
out.
?Incidentresponsecanbeinitiatedbyseveraltypesofevents,includingbutnotlimitedto:
?Automateddetectionsystemsorsensoralerts
?Agencyuserreport
?Contractororthird-partyICTserviceproviderreport
?Internalorexternalorganizationalcomponentincidentreportorsituationalawarenessupdate
?Third-partyreportingofnetworkactivitytoknowncompromisedinfrastructure,detectionofmaliciouscode,lossofservices,etc.
?Analyticsorhuntteamsthatidentifypotentiallymaliciousorotherwiseunauthorizedactivity
IncidentResponseProcess
Theincidentresponseprocessstartswiththedeclarationoftheincident,asshowninFigure1.Inthiscontext,“declaration”referstotheidentificationofanincidentandcommunicationtoCISAandagencynetworkdefendersratherthanformaldeclarationofamajorincidentasdefinedinapplicablelawandpolicy.Succeedingsections,whichareorganizedbyphasesoftheIRlifecycle,describeeachstepinmoredetail.Manyactivitiesareiterativeandmaycontinuouslyoccurandevolveuntiltheincidentisclosedout.Figure1illustratesincidentresponseactivitiesintermsofthesephases,andAppendixBprovidesacompanionchecklisttotrackactivitiestocompletion.
5
NISTSpecialPublication(SP)800-61Rev.2:ComputerSecurityIncidentHandlingGuide
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency6
Figure1:IncidentResponseProcess
PreparationPhase
Prepareformajorincidentsbeforetheyoccurtomitigateanyimpactontheorganization.Preparationactivitiesinclude:
?Documentingandunderstandingpoliciesandproceduresforincidentresponse
?Instrumentingtheenvironmenttodetectsuspiciousandmaliciousactivity
?Establishingstaffingplans
?Educatingusersoncyberthreatsandnotificationprocedures
?Leveragingcyberthreatintelligence(CTI)toproactivelyidentifypotentialmaliciousactivity
Definebaselinesystemsandnetworksbeforeanincidentoccurstounderstandthebasicsof“normal”activity.Establishingbaselinesenablesdefenderstoidentifydeviations.Preparationalsoincludes
?Havinginfrastructureinplacetohandlecomplexincidents,includingclassifiedandout-of-bandcommunications
?Developingandtestingcoursesofaction(COAs)forcontainmentanderadication
?Establishingmeansforcollectingdigitalforensicsandotherdataorevidence
Thegoaloftheseitemsistoensureresilientarchitecturesandsystemstomaintaincriticaloperationsinacompromisedstate.Activedefensemeasuresthatemploymethodssuchasredirectionandmonitoringofadversaryactivitiesmayalsoplayaroleindevelopingarobustincidentresponse.
6
6Forexample,“Deception:Mislead,confuse,hidecriticalassetsfrom,orexposecovertlytaintedassetstotheadversary,”asdefinedin
NISTSP800-160Vol.2:DevelopingCyberResilientSystems:ASystemsSecurityEngineeringApproach
.
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency7
PreparationActivities
PoliciesandProcedures
Documentincidentresponseplans,includingprocessesandproceduresfordesignatingacoordinationlead(incidentmanager).Putpoliciesandproceduresinplacetoescalateandreportmajorincidentsandthosewithimpactontheagency’smission.Documentcontingencyplansforadditionalresourcingand“surgesupport”withassignedrolesandresponsibilities.Policiesandplansshouldaddressnotification,interaction,andevidencesharingwithlawenforcement.
Instrumentation
Developandmaintainanaccuratepictureofinfrastructure(systems,networks,cloudplatforms,andcontractor-hostednetworks)bywidelyimplementingtelemetrytosupportsystemandsensor-baseddetectionandmonitoringcapabilitiessuchasantivirus(AV)software;endpointdetectionandresponse(EDR)solutions;
7
datalossprevention(DLP)capabilities;intrusiondetectionandpreventionsystems(IDPS);authorization,host,applicationandcloudlogs;
8
networkflows,packetcapture(PCAP);andsecurityinformationandeventmanagement(SIEM)systems.MonitorforalertsgeneratedbyCISA'sEINSTEINintrusiondetectionsystemandContinuousDiagnosticsandMitigation(CDM)programtodetectchangesincyberposture.Implementadditionalrequirementsforlogging,logretention,andlogmanagementbasedonExecutiveOrder14028,Sec.8.ImprovingtheFederalGovernment'sInvestigativeandRemediationCapabilities,
9
andensurethoselogsarecollectedcentrally.
TrainedResponsePersonnel
Ensurepersonnelaretrained,exercised,andreadytorespondtocybersecurityincidents.Train
allstaffingresourcesthatmaydrawfromin-housecapabilities,availablecapabilitiesataparentagency/department,third-partyorganization,oracombinationthereof.Conductregularrecoveryexercisestotestfullorganizationalcontinuityofoperationsplan(COOP)andfailover/backup/recoverysystemstobesuretheseworkasplanned.
CyberThreatIntelligence
Activelymonitorintelligencefeedsforthreatorvulnerabilityadvisoriesfromgovernment,trustedpartners,opensources,andcommercialentities.Cyberthreatintelligencecanincludethreatlandscapereporting,threatactorprofilesandintents,organizationaltargetsandcampaigns,aswellasmorespecificthreatindicatorsandcoursesofaction.IngestcyberthreatindicatorsandintegratedthreatfeedsintoaSIEM,anduseotherdefensivecapabilitiestoidentifyandblockknownmaliciousbehavior.Threatindicatorscaninclude:
?Atomicindicators,suchasdomainsandIPaddresses,thatcandetectadversaryinfrastructureandtools
?Computedindicators,suchasYararulesandregularexpressions,thatdetectknownmaliciousartifactsorsignsofactivity
?Patternsandbehaviors,suchasanalyticsthatdetectadversarytactics,techniques,andprocedures(TTPs)
Atomicindicatorscaninitiallybevaluabletodetectsignsofaknowncampaign.However,becauseadversariesoftenchangetheirinfrastructure(e.g.,wateringholes,botnets,C2servers)betweencampaigns,the“shelf-life”ofatomicindicatorstodetectnewadversaryactivityislimited.Inaddition,advancedthreatactors
7
EO14028,Sec.7.ImprovingDetectionofCybersecurityVulnerabilitiesandIncidentsonFederalGovernmentNetworks
8
NISTSP800-92:GuidetoComputerSecurityLogManagement
9
E014028,Sec.8.ImprovingtheFederalGovernment'sInvestigativeandRemediationCapabilities
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency8
mightleveragedifferentinfrastructureagainstdifferenttargetsorswitchtonewinfrastructureduringacampaignwhentheiractivitiesaredetected.Finally,adversariesoftenhideintheirtargetedenvironments,usingnativeoperatingsystemutilitiesandotherresourcestoachievetheirgoals.Forthesereasons,agenciesshouldusepatternsandbehaviors,oradversaryTTPs,toidentifymaliciousactivitywhenpossible.Althoughmoredifficulttoapplydetectionmethodsandverifyapplication,TTPsprovidemoreusefulandsustainablecontextaboutthreatactors,theirintentions,andtheirmethodsthanatomicindicatorsalone.
TheMITREATT&CK?
framework
documentsandexplainsadversaryTTPsindetailmakingitavaluableresourcefornetworkdefenders.
10
Sharingcyberthreatintelligenceisacriticalelementofpreparation.FCEBagenciesarestronglyencouragedtocontinuouslysharecyberthreatintelligence—includingadversaryindicators,TTPs,andassociateddefensivemeasures(alsoknownas“countermeasures”)—withCISAandotherpartners.Theprimarymethodforsharingcyberthreatinformation,indicators,andassociateddefensivemeasureswithCISAisviatheAutomatedIndicatorSharing(AIS)program.
11
FCEBagenciesshouldbeenrolledinAIS.IftheagencyisnotenrolledinAIS,contactCISAformoreinformation.
12
AgenciesshouldusetheCyberThreatIndicatorandDefensiveMeasuresSubmissionSystem—asecure,web-enabledmethod—tosharewithCISAcyberthreatindicatorsanddefensivemeasuresthatarenotapplicableorappropriatetoshareviaAIS.
13
10See
BestPracticesforMITREATT&CK?Mapping
FrameworkforguidanceonusingATT&CKtoanalyzeandreportoncybersecuritythreats.
11
CISAAutomatedIndicatorSharing
12
CISAAutomatedIndicatorSharing
ActiveDefense
FCEBagencieswithadvanceddefensivecapabilitiesandstaffmightestablishactivedefensecapabilities—suchastheabilitytoredirectanadversarytoasandboxorhoneynetsystemforadditionalstudy,or“darknets”—todelaytheabilityofanadversarytodiscovertheagency’slegitimateinfrastructure.Networkdefenderscanimplementhoneytokens(fictitiousdataobjects)andfakeaccountstoactascanariesformaliciousactivity.Thesecapabilitiesenabledefenderstostudytheadversary’sbehaviorandTTPsandtherebybuildafullpictureofadversarycapabilities.
CommunicationsandLogistics
Establishlocalandcross-agencycommunicationproceduresandmechanismsforcoordinatingmajorincidentswithCISAandothersharingpartnersanddeterminetheinformationsharingprotocolstouse(i.e.,agreed-uponstandards).Definemethodsforhandlingclassifiedinformationanddata,ifrequired.Establishcommunicationchannels(chatrooms,phonebridges)andmethodforout-of-bandcoordination.
14
OperationalSecurity(OPSEC)
TakestepstoensurethatIRanddefensivesystemsandprocesseswillbeoperationalduringanattack,particularlyintheeventofpervasivecompromises—suchasaransomwareattackoroneinvolvinganaggressiveattackerthatmayattempttounderminedefensivemeasuresanddistractormisleaddefenders.Thesemeasuresinclude:
?SegmentingandmanagingSOCsystemsseparatelyfromthebroaderenterpriseITsystems,
13
DHSCISACyberThreatIndicatorandDefensiveMeasure
SubmissionSystem
14
NISTSP800-47Rev.1:ManagingtheSecurityof
InformationExchanges
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency9
?Managingsensorsandsecuritydevicesviaout-of-bandmeans,
?Notifyingusersofcompromisedsystemsviaphoneratherthanemail,
?Usinghardenedworkstationstoconductmonitoringandresponseactivities,and
?Ensuringthatdefensivesystemshaverobustbackupandrecoveryprocesses.
Avoid“tippingoff”anattackerbyhavingprocessesandsystemstoreducethelikelihoodofdetectionofIRactivities(e.g.,donotsubmitmalwaresamplestoapublicanalysisserviceornotifyusersofpotentiallycomprisedmachinesviaemail).
TechnicalInfrastructure
Implementcapabilitiestocontain,replicate,analyze,reconstitute,anddocumentcompromisedhosts;implementthecapabilitytocollectdigitalforensicsandotherdata.Establishsecurestorage(i.e.,onlyaccessiblebyincidentresponders)forincidentdataandreporting.Providemeansforcollectingforensicevidence,suchasdiskandactivememoryimaging,andmeansforsafelyhandlingmalware.Obtain
analysistoolsandsandboxsoftwareforanalyzingmalware.Implementaticketingorcasemanagementsystemthatcapturespertinentdetailsof:
?Anomalousorsuspiciousactivity,suchasaffectedsystems,applications,andusers;
?Activitytype;
?Specificthreatgroup(s);
?Adversarytactics,techniques,andprocedures(TTPs)employed;and
?Impact.
DetectActivity
Leveragethreatintelligencetocreaterulesandsignaturestoidentifytheactivityassociatedwiththeincidentandtoscopeitsreach.Configuretoolsandanalyzelogsandalerts.Lookforsignsofincidentactivityandpotentiallyrelatedinformationtodeterminethetypeofincident,e.g.,malwareattack,systemcompromise,sessionhijack,datacorruption,dataexfiltration,etc.
SeeAppendixCforachecklistforpreparationactivities.
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency10
Detection&Analysis
Themostchallengingaspectoftheincidentresponseprocessisoftenaccuratelydetectingandassessingcybersecurityincidents:determiningwhetheranincidenthasoccurredand,ifso,thetype,extent,andmagnitudeofthecompromisewithincloud,operationaltechnology(OT),hybrid,host,andnetworksystems.Todetectandanalyzeevents,implementdefinedprocesses,appropriatetechnology,and
sufficientbaselineinformationtomonitor,detect,andalertonanomalousandsuspiciousactivity.Ensurethereareprocedurestodeconflictpotentialincidentswithauthorizedactivity(e.g.,confirmthatasuspectedincidentisnotsimplyanetworkadministratorusingremoteadmintoolstoperformsoftwareupdates).AstheU.S.government’sleadforassetresponse,CISAwillpartnerwithaffectedagenciesinallaspectsofthedetectionandanalysisprocess.
Detection&AnalysisActivities
DeclareIncident
DeclareanincidentbyreportingittoCISAat
/
andalertingagencyITleadershiptotheneedforinvestigationandresponse.CISAcanassistindeterminingtheseverityoftheincidentandwhetheritshouldbedeclaredamajorincident.Note:FCEBagenciesmustpromptlyreportallcybersecurityincidents,regardlessofseverity,toCISA
DetermineInvestigationScope
Useavailabledatatoidentifythetypeofaccess,theextenttowhichassetshavebeenaffected,thelevelofprivilegeattainedbytheadversary,andtheoperationalorinformationalimpact.Discoverassociatedmaliciousactivitybyfollowingthetrailofnetworkdata;discoverassociatedhost-basedartifactsbyexamininghost,firewall,andproxylogsalongwithothernetworkdata,suchasroutertraffic.Initialscopingofanincidenttodetermineadversarialactivitymayincludeanalyzingresultsfrom:
?Anautomateddetectionsystemorsensor;
?Areportfromauser,contractor,orthird-partyinformationandcommunicationtechnologies(ICT)serviceprovider;or
?Anincidentreportorsituationalawarenessupdatefromotherinternalorexternalorganizationalcomponents.
15
NISTSP800-61Rev.2:ComputerSecurityIncident
HandlingGuide
CollectandPreserveData
Collectandpreservedataforincidentverification,categorization,prioritization,mitigation,reporting,andattribution.Whennecessaryandpossible,suchinformationshouldbepreservedandsafeguardedasbestevidenceforuseinanypotentiallawenforcementinvestigation.Collectdatafromtheperimeter,theinternalnetwork,andtheendpoint(serverandhost).Collectaudit,transaction,intrusion,connection,systemperformance,anduseractivitylogs.Whenanendpointrequiresforensicanalysis,captureamemoryanddiskimageforevidencepreservation.Collectevidence,includingforensicdata,accordingtoproceduresthatmeetallapplicablepoliciesandstandardsandaccountforitinadetailedlogthatiskeptforallevidence.Formoreinformation,seeNISTComputerSecurityIncidentHandlingGuide,SP800-61r2.
15
Extractallrelevantthreatinformation(atomic,computed,andbehavioralindicatorsandcountermeasures)tosharewithIRteamsandwithCISA.
PerformTechnicalAnalysis
Developatechnicalandcontextualunderstandingoftheincident.Correlateinformation,assessanomalousactivityagainstaknownbaselinetodeterminerootcause,anddocumentadversaryTTPstoenableprioritizationofthesubsequent
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency11
responseactivities.Thegoalofthisanalysisistoexaminethebreadthofdatasourcesthroughouttheenvironmenttodiscoveratleastsomepartofanattackchain,ifnotallofit.Asinformationevolvesandtheinvestigationprogresses,updatethescopetoincorporatenewinformation.
CorrelateEventsandDocumentTimeline
Acquire,store,andanalyzelogstocorrelateadversarialactivity.Table1presentsanexampleoflogsandeventdatathatarecommonlyemployedtodetectandanalyzeattackeractivities.
16
,
17
Asimpleknowledgebaseshouldbeestablishedforreferenceduringresponsetotheincident.Thoroughlydocumenteverysteptakenduringthisandsubsequentphases.Createatimelineofallrelevantfindings.Thetimelinewillallowtheteamtoaccountforalladversaryactivityonthenetworkandwillassistincreatingthefindingsreportattheconclusionoftheresponse.
IdentifyAnomalousActivity
Assessandprofileaffectedsystemsandnetworksforsubtleactivitythatmightbeadversarybehavior.Adversarieswilloftenuselegitimate,nativeoperatingsystemutilitiesandscriptinglanguagesoncetheygainafootholdinanenvironmenttoavoiddetection.Thisprocesswillenabletheteamtoidentifydeviationsfromtheestablishedbaselineactivityandcanbeparticularlyimportantinidentifyingactivitiessuchasattemptstoleveragelegitimatecredentialsandnativecapabilitiesintheenvironment.
IdentifyRootCauseandEnablingConditions
Attempttoidentifytherootcauseoftheincidentandcollectthreatinformationthatcanbeusedinfurthersearchesandtoinformsubsequentresponseefforts.Identifytheconditionsthatenabledtheadversarytoaccessandoperate
16Derivedfromthe
MITREATT&CK?
Framework.Note:thistableisarepresentativesamplingofcommontactics,techniques,andrelatedlogs,andisnotintendedtobecomplete.
withintheenvironment.Theseconditionswillinformtriageandpost-incidentactivity.Assessnetworksandsystemsforchangesthatmayhavebeenmadetoeitherevadedefensesorfacilitatepersistentaccess.
GatherIncidentIndicators
Identifyanddocumentindicatorsthatcanbeusedforcorrelativeanalysisonthenetwork.Indicatorscanprovideinsightintotheadversary’scapabilitiesandinfrastructure.Indicatorsasstandaloneartifactsarevaluableintheearlystagesofincidentresponse.
AnalyzeforCommonAdversaryTTPs
CompareTTPstoadversaryTTPsdocumentedinATT&CKandanalyzehowtheTTPsfitintotheattacklifecycle.TTPsdescribe“why,”“what,”and“how.”Tacticsdescribethetechnicalobjectiveanadversaryistryingtoachieve(“why”),techniquesaredifferentmechanismstheyusetoachieveit(“what”),andproceduresareexactlyhowtheadversaryachievesaspecificresult(“how”).RespondingtoTTPsenablesdefendersto
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- Unit 1 Meeting new people Lesson 5(教學設計)-2024-2025學年人教PEP版(2024)英語三年級下冊
- 2《學會溝通交流》 第一課時(教學設計)2024-2025學年統(tǒng)編版道德與法治五年級上冊
- 13 貓 教學設計-2023-2024學年統(tǒng)編版語文四年級下冊
- 鐵嶺物流行業(yè)研究報告
- 任務認識客戶關系管理項目五客戶關系管理課件
- 施工組織設計與概預算人李洪梅95課件
- 施工組織設計與概預算人李慧英課件
- 任務六電子巡航控制系統(tǒng)故障診斷課件
- Module 11 photos unit 3英文版教學設計 2024-2025學年外研版九年級英語上冊
- Unit 2 Topic3 Section B 教學設計 2024-2025學年仁愛科普版八年級英語上冊
- 高考數(shù)學你真的掌握了嗎(最新)
- 亞里士多德哲學課件
- DB32-T 4357-2022《建筑工程施工機械安裝質量檢驗規(guī)程》
- 春泥(庾澄慶)原版五線譜鋼琴譜正譜樂譜
- 發(fā)成果轉化項目可行性研究報告(定稿)
- (新版教材)粵教粵科版六年級下冊科學全冊教案(教學設計)
- 公路瀝青路面設計規(guī)范算例(較早的算例 采用的參數(shù)跟規(guī)范條文可能有不一致 僅參考分析過程)
- 個人分期還款協(xié)議書模板(5篇)
- 儀表電氣專業(yè)安全檢查表
- 航空煤油MSDS安全技術說明書
- 信息系統(tǒng)項目管理教學大綱
評論
0/150
提交評論