Antes de testar seu plano de resposta a incidentes, você precisa definir seus objetivos e escopo. O que você está tentando alcançar com o teste? Quais cenários você vai simular? Quem participará e quais papéis desempenharão? Como você vai medir e avaliar os resultados? Ter objetivos claros e realistas irá ajudá-lo a projetar e executar um teste significativo e relevante.
-
I suggest to businesses that they work back from where the sensitive data is and build scenarios that can simulate a real-world attack. Incorporate more than IT and technical resources; you will need leaders in the business to contribute during a real breach, so that should also be the case during incident response planning and testing. The objectives should be based on real risks to the business, I suggest looking at your business risk register and using something that would keep the leadership up at night. This also gets the buy-in from leadership when investments are needed and helps them understand how important the investment in cyber security and compliance is. Make sure that the results can be quantified to business impact.
-
Setting up predetermined goals and parameters is vital to ensure a comprehensive assessment of your incident response plan. What specific results are you targeting to achieve through the testing phase? Which scenarios do you intend to simulate? Equally important is the identification of participants and their respective roles. Furthermore, defining the metrics and criteria for measuring and evaluating the outcomes is crucial. Setting clear and achievable objectives will enhance your ability to design and execute a meaningful and relevant test that serves its intended purpose.
-
Most of what the readiness of SOC analysts is measured against should be established at the breach [threat] modeling stage. At the beach modeling stage, you make cyber threat-intelligence -driven selection of attack chain types you are concerned about. Then you use MITRE ATT&CK Navigator to pick techniques relevant to APTs and to technologies in your environment. From cybersecurity perspective you should be testing the ability of your security analysts to respond to those techniques. However, back to our dichotomy: NIST 800-61, compliance and legal aspects do make sense for potential sensitive data exposure or even data theft. I suggest having your legal rep to be at your tabletop and other exercises and review| comment on all records.
-
The essential components highlighted in the Incident Response (IR) plan lay the groundwork for a robust security strategy. In my opinion, setting the incident declaration thresholds judiciously is one of the most critical aspects. This balance ensures that the organization doesn't overburden its operational cycles or take on undue risk. To add, a cross-team collaboration involving security, legal, risk, and business stakeholders is vital. It's not just about responding to incidents but orchestrating a coherent and efficient plan that aligns with the organization's overall objectives and business functions.
-
Our cyber team is made up of six different departments. When we started the program, we started in the center with the most critical team, then have expanded outward adding additional teams and (therefore) additional objectives. When identifying the objectives, I always ID primary objectives - which are measured and communicated (after the exercise), but I also like to ID secondary objectives with are more subjective and only share those with the oversight group.
O teste do seu plano de resposta a incidentes pode vir de diferentes formas, dependendo dos seus objetivos, recursos e nível de maturidade. Os exercícios de mesa são uma maneira de baixo custo e baixo impacto para validar seu plano, identificar lacunas e aumentar a conscientização. Passo a passo são testes mais detalhados e interativos que envolvem percorrer as etapas do seu plano e executar algumas ações. As simulações são testes de alto custo e alto impacto que envolvem a criação de cenários realistas e complexos e a execução do seu plano em um ambiente ao vivo; Isso é útil para avaliar capacidades, testar resiliência e melhorar o desempenho.
-
It depends on our main objective, we can create excellent cybersecurity incident response plans, but the main objectives need to be defined and also the roles and responsibilities need to be written and disclosed. We can do a tabletop exercise involving the executive board, we can make plans focused on the blue team, we can create a plan based on risk and risk acceptance, but the most important thing is to understand what is most important for your organization, remembering that for each one it can be different, but for all it needs to be well established and with a defined objective.
-
If we are talking about verifying and validating our ability to respond to cyber breach, we should employ everything within out budget and resource allocation starting from easy to more advanced methods. When you are ready for hands-on exercise, I'd recommend employing an external purple team (can be a red team, if they agree to a purple exercise scenario). Ideally, you should deploy BAS like AttackIQ for continuous assessment. It is also important to test legal and communication side of things which is what IR plan mostly about. Comms with stakeholders, clients, partners. Let's connect cybersecurity breaches and data theft together. Breaches lead to data theft, but breach itself isn't a data theft unless it's successful.
Depois de escolher um método de teste, é hora de se preparar e realizar o teste. Certifique-se de comunicar o plano de teste e as expectativas aos membros da sua equipe e partes interessadas, para que eles entendam suas funções e responsabilidades, bem como as regras e limites do teste. Em seguida, execute o teste de acordo com os cenários e objetivos predefinidos. Monitore e documente as ações, decisões e resultados do teste, certificando-se de usar cenários realistas e desafiadores que reflitam suas ameaças e riscos atuais. Finalmente, colete feedback e dados dos participantes e observadores por meio de pesquisas, entrevistas ou sessões de debriefing para reunir suas opiniões, insights e sugestões.
-
Why not consider running mini-tests to see how your team deals with a real-world incident? This is no different to a common practice today where businesses run phishing tests to see if employees have understood their training.
-
After selecting a testing method, getting ready and carrying out the test is essential. Please ensure the test plan and expectations are communicated to your team members and stakeholders. This will help them understand their roles, responsibilities, as well as the parameters and limitations of the test. Subsequently, proceed with executing the test based on predefined scenarios and objectives. Monitor and meticulously document the test's actions, decisions, and outcomes, ensuring realistic and challenging designs that accurately reflect the existing threats and risks. Lastly, gather feedback and data from participants and observers by conducting surveys, interviews, or debriefing sessions.
-
Include leadership from across the organization. Legal, Finance, HR, and Customer Support or Success to name a few. Depending on the scope of the incident most will have roles to play. It also helps demystify what is happening during an incident to maintain responders focus with reducing Q&A during an actual incident.
-
The more tests we conduct the more familiar we become with the players. Because we conduct shorter (90 - 120) min exercises on a quarterly basis I cannot allow the exercise to get too bogged down into minutia or rabbit holes. Before each exercise I remind the players that my job is to keep the exercise flow moving and therefore I might need to interrupt the conversation or inject something to get it back on track. I always try my best to "guess" what the conversation will be like on a certain slide - when my best guess is off - that is when I need to get things back on track. Of course, there are occasions when a side conversation leads to a great finding too - it is a delicate dance to lead!
Quando o teste estiver concluído, você deve revisar e atualizar seu plano de resposta a incidentes com base nos comentários e dados coletados. Analise os resultados do teste para identificar pontos fortes e fracos, compare os resultados reais com os resultados esperados e avalie seu desempenho. Depois, faça as alterações e melhorias necessárias em seu plano, resolvendo quaisquer lacunas, problemas ou erros descobertos durante o teste. Incorpore quaisquer novas informações, práticas recomendadas ou lições aprendidas. Por fim, comunique o plano atualizado aos membros da equipe e partes interessadas, fornecendo-lhes treinamento e documentação atualizados para garantir que estejam cientes das mudanças e suas implicações.
-
It is crucial to thoroughly review and revise your incident response plan at least every six months by considering the feedback and data gathered after the test. Analyze the test results to identify areas of strength and weakness, compare the actual outcomes with the expected ones, and assess your overall performance. Implement any necessary adjustments and enhancements to the plan, addressing any identified gaps, issues, or errors uncovered during the test. This process should involve integrating new information, incorporating best practices, and applying lessons learned. Finally, you can communicate the updated plan to team members and stakeholders.
-
This is possibly the most important part. There's no point doing tests unless the results will be thoroughly studied for insights on how to refine the organisation's incident response strategies. Organisations must continually iterate their incident response plan as well as their information security processes, using feedback they generate from these tests.
Testar e atualizar seu plano de resposta a incidentes é um processo contínuo que deve ser repetido regularmente para garantir sua eficácia. A necessidade de um teste ou atualização pode ser desencadeada por alterações na estrutura, políticas ou processos da sua organização; mudanças em seu ambiente de TI; mudanças no cenário de ameaças; ou revisões programadas, auditorias ou exercícios. Manter seu plano atualizado é essencial para responder de forma eficaz a incidentes.
-
The plan must be known, executable, realistic and involve the right people. It must be repeated with different periodicities depending on the size and type of company/industry, it must be adjusted whenever necessary and versioned for auditing purposes, and it must always be communicated to the entire company and especially to the actors who participate in it, whether in the elaboration or execution.
-
Next month I will be facilitating our 25th cyber exercise. We do quarterly exercises. From my experience - it is easy to say, conduct multiple tests a year, but if there is little value in the exercises - you will lose your audience/stakeholder support fast.
-
A realistic plan is the only way to know what to do in case of attacks, the idea of the plan is not to avoid an attack, for that we have the tools, controls, processes and technology, but the plan is made so that everyone knows what your role. Besides being important for a quick recovery.
-
The need for effective cybersecurity incident response practices cannot be overstated. It is vital for organizations and individuals to regularly review and update their incident response plans, remain proactive in detecting and responding to incidents, and allocate sufficient resources and support.
-
Share schedule of tabletops, results, and action plan with the board of directors. If willing include one board member, head of audit committee preferably as interaction with the internal and external auditors and regulators will likely follow.
-
Incident response testing is one of the key differentiators between mature organizations interested in mitigating actual risk and immature organizations just checking a box on a compliance report. Your organization will eventually test its plan, one way or another. However, it’s better to test it in controlled conditions on your terms rather than the chaos of an actual incident.
Classificar este artigo
Leitura mais relevante
-
Serviços de InternetComo você avalia a eficácia de sua equipe de resposta a incidentes?
-
Resposta a incidentesComo equilibrar as prioridades em uma equipe de resposta a incidentes?
-
Segurança da informaçãoComo você pode garantir que seu comandante de incidentes seja eficaz?
-
Segurança da informaçãoComo você escolhe os melhores membros da equipe para seu plano de resposta a incidentes?