版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency2
CONTENTS
Introduction 3
Overview 3
Scope 3
Audience 4
IncidentResponsePlaybook 5
IncidentResponseProcess 5
PreparationPhase 6
Detection&Analysis 10
Containment 14
Eradication&Recovery 15
Post-IncidentActivities 16
Coordination 17
VulnerabilityResponsePlaybook 21
Preparation 21
VulnerabilityResponseProcess 22
Identification 22
Evaluation 23
Remediation 24
ReportingandNotification 24
AppendixA:KeyTerms 25
AppendixB:IncidentResponseChecklist 27
AppendixC:IncidentResponsePreparationChecklist 35
AppendixE:VulnerabilityandIncidentCategories 38
AppendixF:SourceText 39
AppendixG:Whole-of-GovernmentRolesandResponsibilities 41
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency3
INTRODUCTION
TheCybersecurityandInfrastructureSecurityAgency(CISA)iscommittedtoleadingtheresponsetocybersecurityincidentsandvulnerabilitiestosafeguardthenation'scriticalassets.Section6ofExecutiveOrder14028directedDHS,viaCISA,to“developastandardsetofoperationalprocedures(playbook)tobeusedinplanningandconductingcybersecurityvulnerabilityandincidentresponseactivityrespectingFederalCivilianExecutiveBranch(FCEB)InformationSystems.”
1
Overview
Thisdocumentpresentstwoplaybooks:oneforincidentresponseandoneforvulnerabilityresponse.TheseplaybooksprovideFCEBagencieswithastandardsetofprocedurestoidentify,coordinate,remediate,recover,andtracksuccessfulmitigationsfromincidentsandvulnerabilitiesaffectingFCEBsystems,data,andnetworks.Inaddition,futureiterationsoftheseplaybooksmaybeusefulfororganizationsoutsideoftheFCEBtostandardizeincidentresponsepractices.Workingtogetheracrossallfederalgovernmentorganizationshasproventobeaneffectivemodelforaddressingvulnerabilitiesandincidents.Buildingonlessonslearnedfrompreviousincidentsandincorporatingindustrybestpractices,CISAintendsfortheseplaybookstoevolvethefederalgovernment’spracticesforcybersecurityresponsethroughstandardizingsharedpracticesthatbringtogetherthebestpeopleandprocessestodrivecoordinatedactions.
Thestandardizedprocessesandproceduresdescribedintheseplaybooks:
•Facilitatebettercoordinationandeffectiveresponseamongaffectedorganizations,
•Enabletrackingofcross-organizationalsuccessfulactions,
•Allowforcatalogingofincidentstobettermanagefutureevents,and
•Guideanalysisanddiscovery.
Agenciesshouldusetheseplaybookstohelpshapeoveralldefensivecyberoperationstoensureconsistentandeffectiveresponseandcoordinatedcommunicationofresponseactivities
Scope
TheseplaybooksareforFCEBentitiestofocusoncriteriaforresponseandthresholdsforcoordinationandreporting.TheyincludecommunicationsbetweenFCEBentitiesandCISA;theconnectivecoordinationbetweenincidentandvulnerabilityresponseactivities;andcommondefinitionsforkeycybersecuritytermsandaspectsoftheresponseprocess.Responseactivitiesinscopeofthisplaybookincludethose:
•InitiatedbyanFCEBagency(e.g.,alocaldetectionofmaliciousactivityordiscoveryofavulnerability)
•InitiatedbyCISA(e.g.,aCISAalertordirective)orotherthirdparties,includinglawenforcement,intelligenceagencies,orcommercialorganizations,contractors,andserviceproviders
TheIncidentResponsePlaybookappliestoincidentsthatinvolveconfirmedmaliciouscyberactivityandforwhichamajorincident(asdefinedbytheOfficeofManagementandBudget[OMB]in
1
ExecutiveOrder(EO)14028:ImprovingtheNation'sCybersecurity
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency4
MemorandumM-20-04
2
orsuccessormemorandum)hasbeendeclaredornotyetbeenreasonablyruledout.TheVulnerabilityResponsePlaybookappliestovulnerabilitiesbeingactivelyexploitedinthewild.AsrequiredbyEO14028,theDirectorofOMBwillissueguidanceonFCEBagencyuseoftheseplaybooks.
Note:theseplaybooksdonotcoverresponseactivitiesthatinvolvethreatstoclassifiedinformationorNationalSecuritySystems(NSS)asdefinedby44U.S.C.3552(b)(6).SeeCNSSI1010
3
forcoordination/reportingguidanceforincidentsspecifictoNSSorsystemsthatprocessclassifiedinformation.
Audience
TheseplaybooksapplytoallFCEBagencies,informationsystemsusedoroperatedbyanagency,acontractorofanagency,oranotherorganizationonbehalfofanagency.Itisthepolicyofthefederalgovernmentthatinformationandcommunicationstechnology(ICT)serviceproviderswhohavecontractedwithFCEBagenciesmustpromptlyreportincidentstosuchagenciesandtoCISA.
4
2
OfficeofManagementandBudget(OMB)MemorandumM-20-04:FiscalYear2019-2020GuidanceonFederalInformation
SecurityandPrivacyManagementRequirements
3
CommitteeonNationalSecuritySystems
4
EO14028,Sec.2.RemovingBarrierstoSharingThreatInformation
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency5
INCIDENTRESPONSEPLAYBOOK
Whentousethisplaybook
Usethisplaybookforincidentsthatinvolveconfirmedmaliciouscyberactivityforwhichamajorincidenthasbeendeclaredornotyetbeenreasonablyruledout.
Forexample:
•Incidentsinvolvinglateralmovement,credentialaccess,exfiltrationofdata
•Networkintrusionsinvolvingmorethanoneuserorsystem
•Compromisedadministratoraccounts
Thisplaybookdoesnotapplytoactivitythatdoesnotappeartohavesuchmajorincidentpotential,suchas:
•“Spills”ofclassifiedinformationorotherincidentsthatarebelievedtoresultfromunintentionalbehavioronly
•Usersclickingonphishingemailswhennocompromiseresults
•Commoditymalwareonasinglemachineorlosthardwarethat,ineithercase,isnotlikelytoresultindemonstrableharmtothenationalsecurityinterests,foreignrelations,oreconomyoftheUnitedStatesortothepublicconfidence,civilliberties,orpublichealthandsafetyoftheAmericanpeople.
Thisplaybookprovidesastandardizedresponse
processforcybersecurityincidentsanddescribes
theprocessandcompletionthroughtheincident
responsephasesasdefinedinNationalInstituteof
StandardsandTechnology(NIST)Special
Publication(SP)800-61Rev.2,
5
including
preparation,detectionandanalysis,containment,
eradicationandrecovery,andpost-incident
activities.Thisplaybookdescribestheprocess
FCEBagenciesshouldfollowforconfirmed
maliciouscyberactivityforwhichamajorincident
hasbeendeclaredornotyetbeenreasonablyruled
out.
•Incidentresponsecanbeinitiatedbyseveraltypesofevents,includingbutnotlimitedto:
•Automateddetectionsystemsorsensoralerts
•Agencyuserreport
•Contractororthird-partyICTserviceproviderreport
•Internalorexternalorganizationalcomponentincidentreportorsituationalawarenessupdate
•Third-partyreportingofnetworkactivitytoknowncompromisedinfrastructure,detectionofmaliciouscode,lossofservices,etc.
•Analyticsorhuntteamsthatidentifypotentiallymaliciousorotherwiseunauthorizedactivity
IncidentResponseProcess
Theincidentresponseprocessstartswiththedeclarationoftheincident,asshowninFigure1.Inthiscontext,“declaration”referstotheidentificationofanincidentandcommunicationtoCISAandagencynetworkdefendersratherthanformaldeclarationofamajorincidentasdefinedinapplicablelawandpolicy.Succeedingsections,whichareorganizedbyphasesoftheIRlifecycle,describeeachstepinmoredetail.Manyactivitiesareiterativeandmaycontinuouslyoccurandevolveuntiltheincidentisclosedout.Figure1illustratesincidentresponseactivitiesintermsofthesephases,andAppendixBprovidesacompanionchecklisttotrackactivitiestocompletion.
5
NISTSpecialPublication(SP)800-61Rev.2:ComputerSecurityIncidentHandlingGuide
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency6
Figure1:IncidentResponseProcess
PreparationPhase
Prepareformajorincidentsbeforetheyoccurtomitigateanyimpactontheorganization.Preparationactivitiesinclude:
•Documentingandunderstandingpoliciesandproceduresforincidentresponse
•Instrumentingtheenvironmenttodetectsuspiciousandmaliciousactivity
•Establishingstaffingplans
•Educatingusersoncyberthreatsandnotificationprocedures
•Leveragingcyberthreatintelligence(CTI)toproactivelyidentifypotentialmaliciousactivity
Definebaselinesystemsandnetworksbeforeanincidentoccurstounderstandthebasicsof“normal”activity.Establishingbaselinesenablesdefenderstoidentifydeviations.Preparationalsoincludes
•Havinginfrastructureinplacetohandlecomplexincidents,includingclassifiedandout-of-bandcommunications
•Developingandtestingcoursesofaction(COAs)forcontainmentanderadication
•Establishingmeansforcollectingdigitalforensicsandotherdataorevidence
Thegoaloftheseitemsistoensureresilientarchitecturesandsystemstomaintaincriticaloperationsinacompromisedstate.Activedefensemeasuresthatemploymethodssuchasredirectionandmonitoringofadversaryactivitiesmayalsoplayaroleindevelopingarobustincidentresponse.
6
6Forexample,“Deception:Mislead,confuse,hidecriticalassetsfrom,orexposecovertlytaintedassetstotheadversary,”asdefinedin
NISTSP800-160Vol.2:DevelopingCyberResilientSystems:ASystemsSecurityEngineeringApproach
.
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency7
PreparationActivities
PoliciesandProcedures
Documentincidentresponseplans,includingprocessesandproceduresfordesignatingacoordinationlead(incidentmanager).Putpoliciesandproceduresinplacetoescalateandreportmajorincidentsandthosewithimpactontheagency’smission.Documentcontingencyplansforadditionalresourcingand“surgesupport”withassignedrolesandresponsibilities.Policiesandplansshouldaddressnotification,interaction,andevidencesharingwithlawenforcement.
Instrumentation
Developandmaintainanaccuratepictureofinfrastructure(systems,networks,cloudplatforms,andcontractor-hostednetworks)bywidelyimplementingtelemetrytosupportsystemandsensor-baseddetectionandmonitoringcapabilitiessuchasantivirus(AV)software;endpointdetectionandresponse(EDR)solutions;
7
datalossprevention(DLP)capabilities;intrusiondetectionandpreventionsystems(IDPS);authorization,host,applicationandcloudlogs;
8
networkflows,packetcapture(PCAP);andsecurityinformationandeventmanagement(SIEM)systems.MonitorforalertsgeneratedbyCISA'sEINSTEINintrusiondetectionsystemandContinuousDiagnosticsandMitigation(CDM)programtodetectchangesincyberposture.Implementadditionalrequirementsforlogging,logretention,andlogmanagementbasedonExecutiveOrder14028,Sec.8.ImprovingtheFederalGovernment'sInvestigativeandRemediationCapabilities,
9
andensurethoselogsarecollectedcentrally.
TrainedResponsePersonnel
Ensurepersonnelaretrained,exercised,andreadytorespondtocybersecurityincidents.Train
allstaffingresourcesthatmaydrawfromin-housecapabilities,availablecapabilitiesataparentagency/department,third-partyorganization,oracombinationthereof.Conductregularrecoveryexercisestotestfullorganizationalcontinuityofoperationsplan(COOP)andfailover/backup/recoverysystemstobesuretheseworkasplanned.
CyberThreatIntelligence
Activelymonitorintelligencefeedsforthreatorvulnerabilityadvisoriesfromgovernment,trustedpartners,opensources,andcommercialentities.Cyberthreatintelligencecanincludethreatlandscapereporting,threatactorprofilesandintents,organizationaltargetsandcampaigns,aswellasmorespecificthreatindicatorsandcoursesofaction.IngestcyberthreatindicatorsandintegratedthreatfeedsintoaSIEM,anduseotherdefensivecapabilitiestoidentifyandblockknownmaliciousbehavior.Threatindicatorscaninclude:
•Atomicindicators,suchasdomainsandIPaddresses,thatcandetectadversaryinfrastructureandtools
•Computedindicators,suchasYararulesandregularexpressions,thatdetectknownmaliciousartifactsorsignsofactivity
•Patternsandbehaviors,suchasanalyticsthatdetectadversarytactics,techniques,andprocedures(TTPs)
Atomicindicatorscaninitiallybevaluabletodetectsignsofaknowncampaign.However,becauseadversariesoftenchangetheirinfrastructure(e.g.,wateringholes,botnets,C2servers)betweencampaigns,the“shelf-life”ofatomicindicatorstodetectnewadversaryactivityislimited.Inaddition,advancedthreatactors
7
EO14028,Sec.7.ImprovingDetectionofCybersecurityVulnerabilitiesandIncidentsonFederalGovernmentNetworks
8
NISTSP800-92:GuidetoComputerSecurityLogManagement
9
E014028,Sec.8.ImprovingtheFederalGovernment'sInvestigativeandRemediationCapabilities
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency8
mightleveragedifferentinfrastructureagainstdifferenttargetsorswitchtonewinfrastructureduringacampaignwhentheiractivitiesaredetected.Finally,adversariesoftenhideintheirtargetedenvironments,usingnativeoperatingsystemutilitiesandotherresourcestoachievetheirgoals.Forthesereasons,agenciesshouldusepatternsandbehaviors,oradversaryTTPs,toidentifymaliciousactivitywhenpossible.Althoughmoredifficulttoapplydetectionmethodsandverifyapplication,TTPsprovidemoreusefulandsustainablecontextaboutthreatactors,theirintentions,andtheirmethodsthanatomicindicatorsalone.
TheMITREATT&CK®
framework
documentsandexplainsadversaryTTPsindetailmakingitavaluableresourcefornetworkdefenders.
10
Sharingcyberthreatintelligenceisacriticalelementofpreparation.FCEBagenciesarestronglyencouragedtocontinuouslysharecyberthreatintelligence—includingadversaryindicators,TTPs,andassociateddefensivemeasures(alsoknownas“countermeasures”)—withCISAandotherpartners.Theprimarymethodforsharingcyberthreatinformation,indicators,andassociateddefensivemeasureswithCISAisviatheAutomatedIndicatorSharing(AIS)program.
11
FCEBagenciesshouldbeenrolledinAIS.IftheagencyisnotenrolledinAIS,contactCISAformoreinformation.
12
AgenciesshouldusetheCyberThreatIndicatorandDefensiveMeasuresSubmissionSystem—asecure,web-enabledmethod—tosharewithCISAcyberthreatindicatorsanddefensivemeasuresthatarenotapplicableorappropriatetoshareviaAIS.
13
10See
BestPracticesforMITREATT&CK®Mapping
FrameworkforguidanceonusingATT&CKtoanalyzeandreportoncybersecuritythreats.
11
CISAAutomatedIndicatorSharing
12
CISAAutomatedIndicatorSharing
ActiveDefense
FCEBagencieswithadvanceddefensivecapabilitiesandstaffmightestablishactivedefensecapabilities—suchastheabilitytoredirectanadversarytoasandboxorhoneynetsystemforadditionalstudy,or“darknets”—todelaytheabilityofanadversarytodiscovertheagency’slegitimateinfrastructure.Networkdefenderscanimplementhoneytokens(fictitiousdataobjects)andfakeaccountstoactascanariesformaliciousactivity.Thesecapabilitiesenabledefenderstostudytheadversary’sbehaviorandTTPsandtherebybuildafullpictureofadversarycapabilities.
CommunicationsandLogistics
Establishlocalandcross-agencycommunicationproceduresandmechanismsforcoordinatingmajorincidentswithCISAandothersharingpartnersanddeterminetheinformationsharingprotocolstouse(i.e.,agreed-uponstandards).Definemethodsforhandlingclassifiedinformationanddata,ifrequired.Establishcommunicationchannels(chatrooms,phonebridges)andmethodforout-of-bandcoordination.
14
OperationalSecurity(OPSEC)
TakestepstoensurethatIRanddefensivesystemsandprocesseswillbeoperationalduringanattack,particularlyintheeventofpervasivecompromises—suchasaransomwareattackoroneinvolvinganaggressiveattackerthatmayattempttounderminedefensivemeasuresanddistractormisleaddefenders.Thesemeasuresinclude:
•SegmentingandmanagingSOCsystemsseparatelyfromthebroaderenterpriseITsystems,
13
DHSCISACyberThreatIndicatorandDefensiveMeasure
SubmissionSystem
14
NISTSP800-47Rev.1:ManagingtheSecurityof
InformationExchanges
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency9
•Managingsensorsandsecuritydevicesviaout-of-bandmeans,
•Notifyingusersofcompromisedsystemsviaphoneratherthanemail,
•Usinghardenedworkstationstoconductmonitoringandresponseactivities,and
•Ensuringthatdefensivesystemshaverobustbackupandrecoveryprocesses.
Avoid“tippingoff”anattackerbyhavingprocessesandsystemstoreducethelikelihoodofdetectionofIRactivities(e.g.,donotsubmitmalwaresamplestoapublicanalysisserviceornotifyusersofpotentiallycomprisedmachinesviaemail).
TechnicalInfrastructure
Implementcapabilitiestocontain,replicate,analyze,reconstitute,anddocumentcompromisedhosts;implementthecapabilitytocollectdigitalforensicsandotherdata.Establishsecurestorage(i.e.,onlyaccessiblebyincidentresponders)forincidentdataandreporting.Providemeansforcollectingforensicevidence,suchasdiskandactivememoryimaging,andmeansforsafelyhandlingmalware.Obtain
analysistoolsandsandboxsoftwareforanalyzingmalware.Implementaticketingorcasemanagementsystemthatcapturespertinentdetailsof:
•Anomalousorsuspiciousactivity,suchasaffectedsystems,applications,andusers;
•Activitytype;
•Specificthreatgroup(s);
•Adversarytactics,techniques,andprocedures(TTPs)employed;and
•Impact.
DetectActivity
Leveragethreatintelligencetocreaterulesandsignaturestoidentifytheactivityassociatedwiththeincidentandtoscopeitsreach.Configuretoolsandanalyzelogsandalerts.Lookforsignsofincidentactivityandpotentiallyrelatedinformationtodeterminethetypeofincident,e.g.,malwareattack,systemcompromise,sessionhijack,datacorruption,dataexfiltration,etc.
SeeAppendixCforachecklistforpreparationactivities.
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency10
Detection&Analysis
Themostchallengingaspectoftheincidentresponseprocessisoftenaccuratelydetectingandassessingcybersecurityincidents:determiningwhetheranincidenthasoccurredand,ifso,thetype,extent,andmagnitudeofthecompromisewithincloud,operationaltechnology(OT),hybrid,host,andnetworksystems.Todetectandanalyzeevents,implementdefinedprocesses,appropriatetechnology,and
sufficientbaselineinformationtomonitor,detect,andalertonanomalousandsuspiciousactivity.Ensurethereareprocedurestodeconflictpotentialincidentswithauthorizedactivity(e.g.,confirmthatasuspectedincidentisnotsimplyanetworkadministratorusingremoteadmintoolstoperformsoftwareupdates).AstheU.S.government’sleadforassetresponse,CISAwillpartnerwithaffectedagenciesinallaspectsofthedetectionandanalysisprocess.
Detection&AnalysisActivities
DeclareIncident
DeclareanincidentbyreportingittoCISAat
/
andalertingagencyITleadershiptotheneedforinvestigationandresponse.CISAcanassistindeterminingtheseverityoftheincidentandwhetheritshouldbedeclaredamajorincident.Note:FCEBagenciesmustpromptlyreportallcybersecurityincidents,regardlessofseverity,toCISA
DetermineInvestigationScope
Useavailabledatatoidentifythetypeofaccess,theextenttowhichassetshavebeenaffected,thelevelofprivilegeattainedbytheadversary,andtheoperationalorinformationalimpact.Discoverassociatedmaliciousactivitybyfollowingthetrailofnetworkdata;discoverassociatedhost-basedartifactsbyexamininghost,firewall,andproxylogsalongwithothernetworkdata,suchasroutertraffic.Initialscopingofanincidenttodetermineadversarialactivitymayincludeanalyzingresultsfrom:
•Anautomateddetectionsystemorsensor;
•Areportfromauser,contractor,orthird-partyinformationandcommunicationtechnologies(ICT)serviceprovider;or
•Anincidentreportorsituationalawarenessupdatefromotherinternalorexternalorganizationalcomponents.
15
NISTSP800-61Rev.2:ComputerSecurityIncident
HandlingGuide
CollectandPreserveData
Collectandpreservedataforincidentverification,categorization,prioritization,mitigation,reporting,andattribution.Whennecessaryandpossible,suchinformationshouldbepreservedandsafeguardedasbestevidenceforuseinanypotentiallawenforcementinvestigation.Collectdatafromtheperimeter,theinternalnetwork,andtheendpoint(serverandhost).Collectaudit,transaction,intrusion,connection,systemperformance,anduseractivitylogs.Whenanendpointrequiresforensicanalysis,captureamemoryanddiskimageforevidencepreservation.Collectevidence,includingforensicdata,accordingtoproceduresthatmeetallapplicablepoliciesandstandardsandaccountforitinadetailedlogthatiskeptforallevidence.Formoreinformation,seeNISTComputerSecurityIncidentHandlingGuide,SP800-61r2.
15
Extractallrelevantthreatinformation(atomic,computed,andbehavioralindicatorsandcountermeasures)tosharewithIRteamsandwithCISA.
PerformTechnicalAnalysis
Developatechnicalandcontextualunderstandingoftheincident.Correlateinformation,assessanomalousactivityagainstaknownbaselinetodeterminerootcause,anddocumentadversaryTTPstoenableprioritizationofthesubsequent
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency11
responseactivities.Thegoalofthisanalysisistoexaminethebreadthofdatasourcesthroughouttheenvironmenttodiscoveratleastsomepartofanattackchain,ifnotallofit.Asinformationevolvesandtheinvestigationprogresses,updatethescopetoincorporatenewinformation.
CorrelateEventsandDocumentTimeline
Acquire,store,andanalyzelogstocorrelateadversarialactivity.Table1presentsanexampleoflogsandeventdatathatarecommonlyemployedtodetectandanalyzeattackeractivities.
16
,
17
Asimpleknowledgebaseshouldbeestablishedforreferenceduringresponsetotheincident.Thoroughlydocumenteverysteptakenduringthisandsubsequentphases.Createatimelineofallrelevantfindings.Thetimelinewillallowtheteamtoaccountforalladversaryactivityonthenetworkandwillassistincreatingthefindingsreportattheconclusionoftheresponse.
IdentifyAnomalousActivity
Assessandprofileaffectedsystemsandnetworksforsubtleactivitythatmightbeadversarybehavior.Adversarieswilloftenuselegitimate,nativeoperatingsystemutilitiesandscriptinglanguagesoncetheygainafootholdinanenvironmenttoavoiddetection.Thisprocesswillenabletheteamtoidentifydeviationsfromtheestablishedbaselineactivityandcanbeparticularlyimportantinidentifyingactivitiessuchasattemptstoleveragelegitimatecredentialsandnativecapabilitiesintheenvironment.
IdentifyRootCauseandEnablingConditions
Attempttoidentifytherootcauseoftheincidentandcollectthreatinformationthatcanbeusedinfurthersearchesandtoinformsubsequentresponseefforts.Identifytheconditionsthatenabledtheadversarytoaccessandoperate
16Derivedfromthe
MITREATT&CK®
Framework.Note:thistableisarepresentativesamplingofcommontactics,techniques,andrelatedlogs,andisnotintendedtobecomplete.
withintheenvironment.Theseconditionswillinformtriageandpost-incidentactivity.Assessnetworksandsystemsforchangesthatmayhavebeenmadetoeitherevadedefensesorfacilitatepersistentaccess.
GatherIncidentIndicators
Identifyanddocumentindicatorsthatcanbeusedforcorrelativeanalysisonthenetwork.Indicatorscanprovideinsightintotheadversary’scapabilitiesandinfrastructure.Indicatorsasstandaloneartifactsarevaluableintheearlystagesofincidentresponse.
AnalyzeforCommonAdversaryTTPs
CompareTTPstoadversaryTTPsdocumentedinATT&CKandanalyzehowtheTTPsfitintotheattacklifecycle.TTPsdescribe“why,”“what,”and“how.”Tacticsdescribethetechnicalobjectiveanadversaryistryingtoachieve(“why”),techniquesaredifferentmechanismstheyusetoachieveit(“what”),andproceduresareexactlyhowtheadversaryachievesaspecificresult(“how”).RespondingtoTTPsenablesdefendersto
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 中级人民法院招考报名表
- 农村房屋买卖合同(2篇)
- 第1单元 古代亚非文明(A卷·知识通关练)(解析版)
- 2024-2025学年广东省深圳市宝安区七年级(上)期末语文试卷
- 2025年环格蓬酯项目可行性研究报告
- 2021-2026年中国航空航天行业市场深度分析及“十四五”规划战略分析报告
- (二模)2025年新疆普通高考适应性检测分学科第二次模拟考试 地理试卷(含答案详解)
- 2024年度天津市公共营养师之三级营养师模拟试题(含答案)
- 2024年度四川省公共营养师之三级营养师题库检测试卷A卷附答案
- 2024年度四川省公共营养师之二级营养师考试题库
- 夏天奔跑的声音(2022年浙江杭州中考语文试卷记叙文阅读题及答案)
- 人力资源许可证制度(服务流程、服务协议、收费标准、信息发布审查和投诉处理)
- 延期留用岗位协议书模板
- 借条的正规模板(2024版)
- 人教PEP版小学英语六年级上册Unit1-6单元单元检测试卷(含听力材料)
- 销售合同编号规则(2024版)
- 2024至2030年中国生活权益卡券行业发展监测及投资战略研究报告
- 大学美育-美育赏湖南智慧树知到期末考试答案章节答案2024年湖南高速铁路职业技术学院
- 数据结构期末考试题及答案
- 2024-2025学年度第一学期小学一年级语文教学计划及进度表
- 中国脑卒中防治指导规范(2021 年版)
评论
0/150
提交评论