Section Introduction, Containment, Eradication, & Recovery Flashcards

1
Q

Introduction

A

This section of the Incident Response domain will cover how to contain an incident to prevent it from affecting additional assets, collecting digital evidence, removing any malicious artifacts such as backdoors, addressing any issues that led to the incident occurring, as well as fixing damage that occurred during the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Learning Objectives

A

By the end of this section you will have achieved the following objectives:

Understand different containment measures and when they are appropriate.
Understand how digital forensics plays a part in incident response, regarding taking forensic copies of affected systems for later analysis and evidence collection.
Removing malicious artifacts such as backdoors, scripts, malware and files generated by the attacker.
Identifying the root cause of the incident and recovering any affected systems, and ensuring the incident shouldn’t occur again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Incident Containment

A

Depending on the type of incident, there are several responses we can take to contain the incident, preventing it from spreading to additional systems and potentially causing more damage. This lesson will cover actions that can be taken, along with any negative consequences that could occur. By definition, Incident containment is a function that assists to limit and prevent further damage from happening along with ensuring that there is no destruction of forensic evidence that may be needed for legal actions against the attackers later.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Containment?

A

Usually, organizations think that containment is a process step that we need to follow during Incident Response. But in our opinion, Incident containment should be a Strategy. Once a containment strategy is defined, the respective tools & technologies can be selected to participate in the fulfillment of the strategy. Process pieces will eventually follow. Containment strategies can be defined based on the focus area in the IT Infrastructure. It can be at the perimeter, extended perimeter, internal tier, or at the endpoint, or it can also be a combination of any of the above. Mostly, the strategy is dependent on understanding your IT infrastructure and making the best use of the infrastructure. That is why it is not the same for every organization and rightly so. We would like to list a few examples of such containment strategies below.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Short-Term Containment

A

Typically short-term containment is break-fix or quick heal. The objective of the short-term containment is to prevent the asset or the user from causing further damage to the organization. Depending on the tools being used by the organization, there are different methods to contain an incident, but these will vary dramatically based on what activity is actually happening. Let’s go through a few examples:

If an Active Directory account is compromised and is trying to log into every system it possible can (security incident), and is successfully accessing some systems, then the account can be disabled in AD and the attacker can no longer use this user account (containment).
If an employee has accidentally downloaded malware to their corporate laptop (security incident), then we can use security tools to isolate the device and prevent any inbound or outbound connections, preventing it from connecting to other systems, exfiltrating data, or allowing the attacker to take remote control (containment).
If periodic connections are found from internal servers to a known command-and-control server IP address (security incident), the remote IP can be blocked on upstream firewalls to prevent any further communications going outbound or coming inbound from the C2 IP (containment).
If web attacks are being observed against the company’s website (security incident), and all traffic shares a commonality (such as source IP or IP range, user-agent, headers), it can be blocked using a WAF on a device prior to the website server (containment).

However, it is important to note that this does not fix the real reason an incident happens. It also does not stop an incident from recurring on a different asset in the organization. This is where long-term containment comes into play.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Long-Term Containment

A

Long-term containment is an enterprise-wide fix that is a step short of complete remediation of an incident. At this stage of the remediation process, the organization has identified the cause of the incident and is working to address it, so that similar incidents don’t occur in the future (or at least we try to reduce the likelihood and impact of them). Some examples of long-term containment steps can include changing how internal networks are structured so that systems are better segmented from each other to prevent lateral movement and allow for better containment and isolation strategies with less impact on other systems. Other examples include

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Containment Measures

A

Perimeter Containment

Block inbound traffic and outbound traffic.
IDS/IPS Filters to identify further malicious traffic and take automated actions, such as blocking active connections.
Web Application Firewall policies, to detect and take action against web attacks.
Null route DNS, to prevent DNS resolutions so internal hosts cannot find the IP address of a given domain name and establish a connection.

Network Containment

Switch-based VLAN isolation, to restrict network access.
Router-based segment isolation, to restrict network access.
Port blocking, to prevent connections on specific ports.
IP or MAC Address blocking, to restrict network access.
Access Control Lists (ACLs), to provide rules that restrict what hosts on the network can and cannot do.

Endpoint Containment

Disconnecting the infected system from any network connections (turning WiFi off, pulling ethernet cable).
Powering off the infected system.
Blocking rules in the local firewall.
Host intrusion prevention system (HIPS) actions, such as device isolation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Has it Been Effective?

A

Now that you have a validated Incident Containment strategy, the next step is to ensure that your strategy was effective against the Attack Vector. This is where monitoring of the Attack Vector, Targeted Victims, Outbound Traffic from the victims, etc. become important measures of effectiveness. One way to achieve this would be to implement containment actions to prevent a compromised system from connecting outbound to the internet. We could create a rule in the SIEM that looks for any connections from the compromised system to any non-internal system. This rule could generate alerts named “On-going Incident 5537, Containment Verification, Immediate Escalation”, and SOC analysts can be informed to immediately contact the incident response team if an alert is generated because this should be impossible due to the containment measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly