🌙
 

Subscribe to the Taegis™ XDR Documentation RSS Feed at .

Learn more about RSS readers or RSS browser extensions.

Cybersecurity Emergency Guidance

Introduction

Should a cybersecurity emergency occur, Secureworks Incident Response is available to support your organization. It is always best to have a response plan in place and tested before a cybersecurity emergency occurs to enable effective and efficient response. Response plans provide perspective of all the moving technical and non-technical components of incident response processes and articulates roles, responsibilities, and the urgency in which activities need to be completed.

The recommendations below can help guide you as you establish incident response plans or seek assistance from Secureworks.

Cybersecurity Emergency Symptoms and Indications

Cyber Incidents come in many different forms and there are certain signs that a cybersecurity emergency is underway or has taken place. Although no single indicator conclusively shows that a cybersecurity emergency has occurred or is taking place, observing one or more indicators prompts the observer to investigate events more closely.

While addressing what initially appears to be an operational issue, it is possible that a cybersecurity emergency could be uncovered. For this reason, it is important to watch for the presence of these indicators and escalate issues or events that display them to incident response and analysis resources to determine appropriate next steps.

Potential cyber threat indicator sources include:

At the highest level, the concerns surrounding Cyber Incidents all relate back to ensuring the confidentiality, integrity, and availability of systems and information. Below are exemplar indicators for each of these properties. It is not intended to be a comprehensive list, but to provide guidance with some indicators that additional investigation could be warranted.

Cyber threat indicators or symptoms of compromise include:

Response Team Recommendations

When a cybersecurity emergency occurs, all participants should:

Secureworks will provide a chain of custody document for any digital media images that need to be physically collected for digital forensic analysis efforts during the course of an engagement.

Secureworks can provide options for the transport of any digital media images, such as media sanitization, returning, and/or transfers to a preferred third party, such as legal counsel or archiving services.

Preparing for a Secureworks Scoping Call

Cyber Incidents may be reported at various stages, including when complete information or facts are not available. Gathering as much information as possible will help expedite assistance to your organization. When a cybersecurity emergency is suspected, answers to the following questions will help determine the appropriate course of action to receive assistance from Secureworks.

  1. Indications or symptoms of cyber intrusion activity (i.e., "What brought this to your attention? What was your first indicator? Who discovered the issue and when?").
  2. Sources of the indications or symptoms of cyber intrusion activity (e.g., "This was reported to us by the Secureworks SOC. Our anti-virus solution alerted to the presence of malware.").
  3. Current status (choose one):
    • Critical: business outage, confirmed data exfiltration, or compromise of critical infrastructure
    • High: business hindrance, suspected data exfiltration, or suspected compromise of critical infrastructure
    • Medium: previous cyber intrusion that may not be mitigated
    • Low: due diligence analysis or analysis of a previous cyber intrusion that has been mitigated
  4. Type of affected assets (e.g., systems, networks, data) with operating system and application information
  5. Response actions that have already been performed
  6. Network and data flow topology to include:
    • Logical location of affected systems (e.g., ICS/SCADA, ITAR, PCI, or critical infrastructure enclaves)
    • Accessibility to/from other network assets (e.g., internet, data centers, ICS/SCADA zones, or other critical assets, protocols allowed to and from the affected asset(s))
  7. Affected site location(s) with city/state/country Information

Lessons Learned Process

The lessons learned phase of the incident response life cycle is often one of the most neglected and potentially important aspects of responding to an incident. Capturing and actioning lessons learned is critical to avoiding or limiting the impact of future incidents and should be clearly codified within the incident response plan.

The incident response plan should define temporal requirements (i.e., how quickly lessons learned should be conducted), the responsible party for performing lessons learned, and, if needed, an update process for the incident response plan.

If requested and as a part of Secureworks’ Proactive services, Secureworks can perform the lessons learned process for the organization, which may be beneficial to provide an independent perspective.

During the lessons learned process, notes and other documentation from the incident are essential; ergo, it is important for the organization to capture notes and other documentation throughout the incident.

Should the organization conduct their own lessons learned process, common questions to ask include:

Source: NIST SP 800-61R2: Computer Security Incident Handling Guide

 

On this page: