Computer security incident management
In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events. Computer security incident management is a specialized form of incident management, the primary purpose of which is the development of a well understood and predictable response to damaging events and computer intrusions.
Incident management requires a process and a response team which follows this process. In the United States, This definition of computer security incident management follows the standards and definitions described in the National Incident Management System. The incident coordinator manages the response to an emergency security incident. In a Natural Disaster or other event requiring response from Emergency services, the incident coordinator would act as a liaison to the emergency services incident manager.
Incident response plans
An incident response plan is a group of policies that dictate an organizations reaction to a cyber attack. Once a security breach has been identified, for example by network intrusion detection system or host-based intrusion detection system , the plan is initiated. It is important to note that there can be legal implications to a data breach. Knowing local and federal laws is critical. Every plan is unique to the needs of the organization, and it can involve skill sets that are not part of an IT team. For example, a lawyer may be included in the response plan to help navigate legal implications to a data breach.As mentioned above every plan is unique but most plans will include the following:
Preparation
Good preparation includes the development of an incident response team. Skills need to be used by this team would be, penetration testing, computer forensics, network security, etc. This team should also keep track of trends in cybersecurity and modern attack strategies. A training program for end users is important as well as most modern attack strategies target users on the network.As part of the preparation phase in incident response plan should be developed and address the following:
- Roles and Responsibilities
- Lists the incident response team members and their duties
- Communication protocols
- Training and awareness
- Logging policies and configurations
- Event status definitions and thresholds
- Playbooks and runbooks for common incident types
- Legal and compliance considerations
Identification