CCCU

Week-10 Incident Response and Cybersecuity Readiness

Course Code: P19133

Course Name: Cybersecurity Fundamental 

Credits: 20

Module Leader: Ali Jaddoa
CSF-19133
CCCU

Cyber Security/Digital Forensics Triad

  • Each function operates independently, but all three groups draw from one another in a large-scale investigation.

  • Combining these groups into a team, reducne the need for external providers for these tasks.

CSF-19133
CCCU

Today’s Focus:

  • How incident response works
    • Achieve the ultimate goal: a secure, resilient system.

    • I.e., Cybersecurity Readiness: respond quickly and effectively.

CSF-19133
CCCU

Incident Response: Recognising and responding to incidents

  • Event: an occurrence that takes place during a given time

    • suspicious email/software flagged by firewall
    • Positive or negative
  • Incident: An event that has a negative outcome

    • Affects CIA
    • May or may not be malicious or deliberate
    • e.g., malware infects a server, encrypting critical business files.
CSF-19133
CCCU

Incident types

width:1OO% center

  • Phishing: Deceptive attempts to steal sensitive information.
  • Ransomware: Malware that locks data and demands a ransom.
  • Insider Threats: Malicious or careless actions from within the organisation.
  • Zero-Day Exploit: Attacks on unknown vulnerabilities before they're patched.
  • Social Engineering (Next'Week): Manipulating people to disclose confidential info.
CSF-19133
CCCU
Category Example Incident
Malicious Code Executing malicious code on a system
Availability Impairment Impaired or disrupted availability of systems or equipment
Resource Interaction Malicious or damaging interaction with computing or production resources
Unauthorised Configuration Changes Unauthorised changes to system configurations or software programs
Physical Security Breach Unauthorised access to a building or restricted area of a building
Logical Access Breach Unauthorised access to computer systems
Software/Data Misuse Unauthorised use or abuse of software or data
Unauthorised Modifications Unauthorised changes to systems, software, or data
Data Theft or Loss Loss or theft of equipment storing sensitive data
Denial of Service Distributed Denial of Service (DDoS) attacks
Operational Interference Interference with the proper operation of systems or resources
Authentication Abuse Excessive failed login attempts
CSF-19133
CCCU

What's incident response (IR)?

  • A process to prepare for and handle cybersecurity incidents
  • Involves managing the consequences and fallout of incidents effectively.

Goals of an IR Program

  1. Minimise Impact: Reduce damage to systems, data, and operations.
  2. Efficient Recovery: Shorten recovery time and control costs.
  3. Protect Reputation: Limit collateral damage to the organisation’s brand and trust.
CSF-19133
CCCU

Incident Response: Actions Depend on Key Factors

Factor Examples
Type of Incident Document loss, Malware, etc.
Scope of Damage Ransomware encryption, Data integrity corruption
Legal Obligations DPA 2018 [1], GDPR [2] CMA [3]
Contractual Obligations Cloud service provider agreements, Data Processing Agreements (DPAs)
Why might many incident go unreported? Lack of Awareness, no clear plan

Reporting Requirement
-

1, 2, 3, 4, 5

CSF-19133
CCCU

Importance of an IR Plan

  • Defines what constitutes an "incident" for the organisation.
  • Provides clear, guided procedures for responding to incidents.
  • Prepares organisations for Operational Technology (OT) and cybersecurity challenges.

Incident Response Processes

There are two distinct aspects to incident response:

  1. Incident response preparation
  2. Incident response handling
CSF-19133
CCCU

1. Incident response preparation:

  • Occurs periodically, without any identified incident.
  • Focus: Prepare teams to handle incidents efficiently and effectively.
    width:1OO% center
CSF-19133
CCCU

1. Incident response preparation: Cont'

  • Inputs:
    • OT security policies, processes, and procedures.
    • Asset inventory.
    • Completed incident response forms.
  • Outputs:
    • Updated IR policy, processes, and procedures.
    • Recommendations summary document.
CSF-19133
CCCU

2. Incident Handling

  • Provide a framework for systematic and efficient incident response.

  • Minimise chaos by predefining roles and responsibilities.

  • Inputs:

    • Blank incident response form, pre-prepared team, etc.
  • Outputs:

    • Completed incident response form.
    • Restored system operations.
    • Communicated closed status.
CSF-19133
CCCU

width:1OO% center

CSF-19133
CCCU

Incident response procedures: SANS

width:1OO% center

CSF-19133
CCCU

Others models:

  1. Incident Response process

  2. ISO/IEC Incident Response Standard: Not incident response model, but it includes guidance on incident management

1, 2, 3

CSF-19133
CCCU

SANS: Step 1 - Preparation

Objective:

  • Ensure the organisation is ready to handle incidents effectively.

Key Actions:

  1. Develop and maintain incident response policies and procedures.
  2. Assemble and train the incident response team.
  3. Gather tools and resources, such as monitoring systems and forensics tools.
  4. Conduct regular incident response drills.
CSF-19133
CCCU

SANS: Step 2 - Identification

Objective:

  • Detect and confirm the occurrence of an incident.

Key Actions:

  1. Monitor systems for anomalies and suspicious activities.
  2. Analyse logs, alerts, and other data sources.
  3. Classify incidents based on type and severity.
  4. Notify the incident response team of confirmed incidents.
CSF-19133
CCCU

SANS: Step 3 - Containment

Objective:

  • Prevent further damage and limit the impact of the incident.

Key Actions:

  1. Implement short-term containment measures (e.g., isolating affected systems).
  2. Develop long-term containment strategies for ongoing incidents.
  3. Preserve evidence for forensic analysis.

Goal:

  • Stabilise the environment while maintaining the integrity of evidence.
CSF-19133
CCCU

SANS: Step 4 - Eradication

Objective:

  • Eliminate the cause of the incident.

Key Actions:

  1. Identify and remove malware, unauthorised access, or compromised accounts.
  2. Patch vulnerabilities exploited during the incident.
  3. Conduct thorough scans(e.g., pentest)to ensure the threat has been eradicated.
CSF-19133
CCCU

SANS: Step 5 - Recovery

Objective:

  • Restore systems and operations to normal.

Key Actions:

  1. Rebuild or restore affected systems from backups.
  2. Verify systems are secure and fully operational.
  3. Monitor for lingering threats or vulnerabilities.

Goal:

  • Safely return to normal business operations.
CSF-19133
CCCU

SANS: Step 6 - Lessons Learned

Objective:

  • Analyse the incident to improve future responses.

Key Actions:

  1. Conduct a post-incident review with all stakeholders.
  2. Identify gaps in the incident response process.
  3. Update policies, procedures, and training based on findings.

Outcome:

  • Build a more resilient incident response program.
CSF-19133
CCCU

Summary of the SANS Process

  1. Preparation: Get ready for incidents before they happen.
  2. Identification: Detect and confirm incidents quickly.
  3. Containment: Limit the spread of the threat.
  4. Eradication: Remove the root cause of the incident.
  5. Recovery: Return systems to normal operation.
  6. Lessons Learned: Improve based on the incident experience.
CSF-19133
CCCU

Incident report form

width:1OO% center

You can download from here

CSF-19133
CCCU

Red, Blue, and Purple Teaming in Incident Response

  • In cybersecurity, effective incident response requires a holistic approach that combines both offensive and defensive tactics.

  • Red, Blue, and Purple Teaming are essential components in testing, defending, and enhancing an organisation's security posture.

width:1OO% center

CSF-19133
CCCU

1. Red Teaming

The Red Team acts as an adversary, simulating real-world cyberattacks to identify vulnerabilities in an organisation's security infrastructure.

  1. Test vulnerabilities by simulating advanced persistent threats (APTs) or common attack vectors (e.g., phishing, exploitation).
  2. Evaluate detection and response capabilities of the Blue Team during and after an attack.
CSF-19133
CCCU

How Red Teaming Supports Incident Response:

  • Identifies weaknesses that could lead to security incidents.
  • Improves the detection process by testing Blue Team’s ability to spot threats in real-time.
  • Simulates actual cyberattacks to validate incident response plans.
CSF-19133
CCCU

2. Blue Teaming in Incident Response

The Blue Team is responsible for defending the organisation against cyberattacks, detecting intrusions, and ensuring a quick recovery from security incidents.

Goals:

  1. Monitor systems for suspicious activities and anomalies.
  2. Respond to and mitigate attacks to minimise damage and data loss.
CSF-19133
CCCU

How Blue Teaming Supports Incident Response:

  • Ensures immediate containment and response during an incident.
  • Protects critical assets and mitigates the effects of an ongoing attack.
  • Tests response procedures through simulations and real-world attacks.
CSF-19133
CCCU

3. Purple Teaming in Incident Response

The Purple Team is a collaborative team that integrates Red and Blue Teams, enabling them to work together to enhance incident response capabilities.

Goals:

  1. Facilitate collaboration between Red and Blue Teams.
  2. Ensure that offensive tactics (Red Team) align with defensive strategies (Blue Team) to improve detection and response times.
CSF-19133
CCCU

How Purple Teaming Supports Incident Response:

  • Shares knowledge between teams to identify attack patterns and improve defences.
  • Helps the Blue Team better understand offensive tactics and improves their ability to detect real-world threats.
  • Uses feedback loops from both Red and Blue Teams to develop more effective incident response plans.
CSF-19133
CCCU

How Red, Blue, and Purple Teams Contribute to Incident Response

Team Focus Contribution to Incident Response
Red Team Offensive (Simulating Attacks) Identifies vulnerabilities and tests detection capabilities
Blue Team Defensive (Responding to Attacks) Detects, responds, and mitigates ongoing attacks, ensuring business continuity
Purple Team Collaboration (Red + Blue) Ensures Red and Blue teams work together, improving overall security posture and response strategies
CSF-19133
CCCU

Why They Matter:

  • Combining these teams enhances an organisation's ability to respond effectively to real-world cyber incidents.
  • Regular simulations and collaboration ensure that both detection and response capabilities are constantly evolving.
CSF-19133
CCCU

Lab

  1. See the lab for IR here
CSF-19133