WK4 Phases of incident response playbooks Flashcards

1
Q

Playbook

A

A playbook is a manual that provides details about any operational action. Playbooks also clarify what tools should be used in response to a security incident.

In the security field, playbooks are essential.

Urgency, efficiency, and accuracy are necessary to quickly identify and mitigate a security threat to reduce potential risk. Playbooks ensure that people follow a consistent list of actions in a prescribed way, regardless of who is working on the case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Common used playbook

Incident response playbook

A

Incident response is an organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach. An incident response playbook is a guide with six phases used to help mitigate and manage security incidents from beginning to end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Preparation
A

Organizations must prepare to mitigate the likelihood, risk, and impact of a security incident by documenting procedures, establishing staffing plans, and educating users. Preparation sets the foundation for successful incident response. For example, organizations can create incident response plans and procedures that outline the roles and responsibilities of each security team member.

Before incidents occur, mitigate potential impacts on the organization by documenting, establishing staffing plans, and educating users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Detection and Analysis
A

The objective of this phase is to detect and analyze events using defined processes and technology. Using appropriate tools and strategies during this phase helps security analysts determine whether a breach has occurred and analyze its possible magnitude.

Detect and analyze events by implementing defined processes and appropriate technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Containment
A

The goal of containment is to prevent further damage and reduce the immediate impact of a security incident. During this phase, security professionals take actions to contain an incident and minimize damage. Containment is a high priority for organizations because it helps prevent ongoing risks to critical assets and data.

Prevent further damage and reduce immediate impact of incidents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Eradication and Recovery
A

his phase involves the complete removal of an incident’s artifacts so that an organization can return to normal operations. During this phase, security professionals eliminate artifacts of the incident by removing malicious code and mitigating vulnerabilities. Once they’ve exercised due diligence, they can begin to restore the affected environment to a secure state. This is also known as IT restoration.

Completely remove artifacts of the incident so that an organization can return to normal operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Post-incident activity
A

This phase includes documenting the incident, informing organizational leadership, and applying lessons learned to ensure that an organization is better prepared to handle future incidents. Depending on the severity of the incident, organizations can conduct a full-scale incident analysis to determine the root cause of the incident and implement various updates or improvements to enhance its overall security posture.

Document the incident, inform organizational leadership, and apply lessons learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Coordination
A

Coordination involves reporting incidents and sharing information, throughout the incident response process, based on the organization’s established standards. Coordination is important for many reasons. It ensures that organizations meet compliance requirements and it allows for coordinated response and resolution.

Report incidents and share information throughout the response process, based on established standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly