UFSIT Blue Team

follow the blue rabbit

View on GitHub

šŸ““šŸ” NIST 800-61 NOTES (for CyberForce) šŸ”šŸ““

Why are we reviewing an incident response framework?

A: Because the minute we get network access, we are responding to an incident. Although thereā€™s no live attack going on until Nov. 5th for CyberForce, thereā€™s already been a breach in our system.

See attack scenario for more info.

Some general pointers:

SECTION 1: STRUCTURE

Sections in the NIST 800-61:

  1. Organizing a Computer Security Incident Response Capability
  2. Handling an Incident
  3. Coordination and Information Sharing

SECTION 2: Organizing a Computer Security Incident Response Capability

SECTION 3: HANDLING AN INCIDENT

The incident response cycle

  1. Preparation
  2. Detection and Analysis
  3. Containment and Recovery
  4. Post-incident activity (securing the network, writing our report)

Steps 2 and 3 cycle back between each other, e.g. you may find a host infected by malware and fix it/contain it, but you have to detect and analyze potential effects on other systems from the malware.

Section 3.1: Preparation

Section 3.2: Detection and analysis

Incidents can occur in countless ways, so it is infeasible to make step-by-step instructions on how to handle every incident. We have to be prepared to handle any incident using a general approach that involves a lot of constant communication and meticulous notekeeping.

Nevertheless, there are a few common methods of attack that we should always be prepared for:

  1. External/removable media
    • e.g. malicious code spreading onto a system through a USB drive
  2. Attrition
    • An attack that employs brute-force methods to compromise/degrade/destroy systems or networks
    • e.g. DDoS, live password brute forcing, live authentication brute forcing
  3. Web
    • Attack executed from a website or on a web-based application
    • e.g. XSS (Cross-Site Scripting), malicious redirect, SSRF (Server-Side Request Forgery)ā€¦
  4. Email
    • e.g. exploit code disguised as an attached document, malicious website in the body of an email
  5. Impersonation
    • An attack where something benign (innocent) is replaced with something malicious
    • e.g. spoofing on the network, MitM (Man in the Middle) attacks, rogue wireless access points, SQLi (SQL injection)ā€¦
  6. Improper usage
    • Any incident resulting from a violation of an organizationā€™s acceptable use policies
    • e.g. user installs a file-sharing software that could potentially lead to loss of sensitive data, illegal activities being being performed on the system (e.g. torrenting pirated software)
  7. Loss or theft
    • Loss of a computing device or media used by the organization
    • e.g. losing cell smartphone, laptop, authentication tokenā€¦

3.2.2 Signs of an incident

Often, the most challenging part is accurately detecting that an incident happened in the first place. Not only that, but it can also be hard to identify the type of incident, the extent, and the magnitude of the problem.

What makes this so challenging is a combination of three factors:

  1. Incidents may be detected through many different means, with varying levels of detail and correctness
    • Automated detection capabilities include network-based and host-based IDS (Intrusion Detection Systems) and IPS (Intrusion Prevention Systems) software, antiviruses, and log analyzers
    • Some incidents have obvious signs that let us detect them, others may be impossible to.
  2. The volume of incidents is typically high
    • e.g. It is not uncommon for an organization to receive thousands or even millions of intrusion detection alerts per day
    • Hopefully it wonā€™t be that many for CyberForce lul
  3. Deep, specialized, technical knowledge and experience is often necessary for proper and efficient analysis of incident data
    • Sometimes, we have to get creative and do what we can

Examples of precursors:

Exampels of indicators:

3.2.3 Sources of precursors and indicators

To see more detailed explanations for each of the terms in the list below, check page 27 of the NIST 800-61 specification. Without going into too much detail, here is a list of common sources that intrusion signs (precursors and indicators) can be obtained from:

ALERT SOURCES:

LOG SOURCES:

PUBLICLY AVAILABLE SOURCES:

PEOPLE SOURCES:

Note for CyberForce: See if these types of sources are in your network during competition. If not, think critically about which ones you should implement. Generally speaking, youā€™re gonna wanna have antivirus software for most hosts (check the UF 2019 report for concrete examples of this for both Windows and Linux hosts). Research potential software that provides these capabilities.

3.2.4 Incident Analysis

Incident detection and analysis would be easy if precursors/indicators were guaranteed to be accurate ā€“ this is not the case.

When the team believes an incident has occured:

  1. Determine the scope (e.g. which networks, systems, or applications have been affected)
  2. Determine who or what originated the incident
  3. Determine how the incident is occuring (e.g. what tools or attack methods are being used, what vulnerabilities are being exploited)o

Performing initial analysis is challenging. The following are some recommendations for making analysis easier and more efficient:

3.2.5 Incident Documentation

Here are some things the issue tracking system should contain info about:

Important: Make sure you safeguard incident data and restrict access to it because this often contains sensitive info, e.g. data on exploited vulnerabilities, recent security breaches, users that may have performed inappropriate actions. Only authorized personnel should have access to the incident database.

3.2.6 Incident Prioritization

Incidents should not be handled on a first come, first serve basis because we have limited resources. Instead, try to prioritized incidents based on the following:

Definition ā€“ Business impact: - The business impact is the combination of the functional impact and the informational impact of an incident.

Functional Impact Categories:

Information Impact Categories:

Recoverability Effort Categories:

3.2.7 Incident notification

I am ommitting notes for this section with the assumption that CyberForce will be specifying their own information for notifying about incidents.

Section 3.3: Containment, Eradication, Recovery

3.3.1 Choosing a containment strategy

Containment strategy can vary a lot, e.g. containment strategy for email-borne malware is very different from a network DDoS attack.

Criteria for determining an appropriate containment strategy include:

3.3.2 Evidence Gathering

A detailed evidence log should be kept (remember, this evidence log forms a part of the issue tracking system) which includes the following:

Summary of Reccomendations for Incident Handling