3 Must Haves in Your Cybersecurity Incident Response
3 Must Haves in Your Cybersecurity Incident Response
3 Must Haves in Your Cybersecurity Incident Response
3 Must-Haves in Your
Cybersecurity Incident Response
Planning End-to-End Incident Response — Before It’s Needed
3 Must-Haves in Your Cybersecurity Incident Response
2
3 Must-Haves in Your Cybersecurity Incident Response
01
Build an incident
response plan
02
Develop detailed
response playbooks
03
Conduct regular
tabletop exercises
A general plan for responding Detailed guides for handling Routine tests to practice
to cyberincidents specific incident scenarios incident response plans
Source: IBM Cost of a Data Breach Report, 2021 Source: Ransomware attackers downshift to “Mid-Game” Source: Q2 Ransom Payment Amounts Decline as Ransomware
hunting in Q3 2021, Coveware, October 2021 Becomes a National Security Priority, Coveware, July 2021
3
3 Must-Haves in Your Cybersecurity Incident Response
01
Build an incident
response plan
02
Develop detailed
response playbooks
03
Conduct regular
tabletop exercises
A general plan for responding Detailed guides for handling Routine tests to practice
to cyberincidents specific incident scenarios incident response plans
4
Excerpt from
3 Must-Haves in Your Cybersecurity Gartner
Incident Toolkit:
Response
Cybersecurity Incident Response Plan
Detect
D1 N
Incident?
Y
D2 Register D3 D4 D5 D6
Conduct Assign Assign Severity?
S1
Incident Initial Triage Classification Severity
Y S2 - S3 - S4
D12 Data Breach
D15 D14 Process
D11 D10 D9 D8 D7
Y Notification Reassess Pers. Data Collect Mobilize Resolve using
Potentially Impacted Determine Scope
Required Incident D13 Security Incident Data CSIRT BAU Process
N Process N
D16 Determine C1 C2 C3 C4 C5
Notification Communicate to Develop Execute Contained? Y Update
Comms. Stakeholders Containment Plan Containment Plan Ticket
N
D17 E1 E2 E3 E4 E5
Notify Relevant Communicate to Develop Execute Eradication? Y Update
Parties Stakeholders Eradication Plan Eradication Plan Ticket
N
C1 C2 C3 E4 C5 C6
Communicate to Develop Execute Recovery? Y Update Communicate to
Detect Stakeholders Recovery Plan Recovery Plan Ticket Stakeholders
Contain N
Eradicate
P1 P2 P2 P4 P5 P1
Conduct Document Assign Action Update Controls Demobilize Close Ticket END
RCA Finding Owners and Policies CSIRT
Recover
5
Excerpt from
3 Must-Haves in Your Cybersecurity Gartner
Incident Toolkit:
Response
Cybersecurity Incident Response Plan
04 Cyber Crisis Severe Injuries/Death Significant Impact Fines: $Z+ Loss: $Z+ Global Media Top Secret Catastrophic Outage
03 High Serious Injuries Moderate Impact Fines: $Y – $Z Loss: $Y – $Z National Media Secret Major Outage
02 Medium First Aid Low Impact Fines: $X – $Y Loss: $X – $Y Local Media Internal Minor Outage
6
Excerpt from
3 Must-Haves in Your Cybersecurity Gartner
Incident Toolkit:
Response
Cybersecurity Incident Response Plan
Register incident AR CI I
Assign classification I I AR C C
Assign severity I I AR C C
7
3 Must-Haves in Your Cybersecurity Incident Response
01
Build an incident
response plan
02
Develop detailed
response playbooks
03
Conduct regular
tabletop exercises
A general plan for responding Detailed guides for handling Routine tests to practice
to cyberincidents specific incident scenarios incident response plans
8
Excerpt from
3 Must-Haves in Your Cybersecurity Gartner
Incident Toolkit:
Response
Creating a Ransomware Playbook
Contents
How to Use This Toolkit............................................................................................................................................................................................................ 1
Prerequisites............................................................................................................................................................................................................................ 1
Minimum Requirements in IRP..................................................................................................................................................................................................... 1
Scope........................................................................................................................................................................................................................................ 1
Initial Notification..................................................................................................................................................................................................................... 2
Four Phases of Ransomware Response.................................................................................................................................................................................... 2
Containment................................................................................................................................................................................................................................. 2
Analysis......................................................................................................................................................................................................................................... 3
Remediation.................................................................................................................................................................................................................................. 3
Recovery....................................................................................................................................................................................................................................... 3
Four Phases of Ransomware Response Workflow Diagram........................................................................................................................................................ 4
Containment............................................................................................................................................................................................................................. 5
Identify Affected Hosts................................................................................................................................................................................................................. 5
Isolate Affected Hosts.................................................................................................................................................................................................................. 5
Reset Impacted User/Host Credentials....................................................................................................................................................................................... 5
Analysis..................................................................................................................................................................................................................................... 5
Preserve Evidence........................................................................................................................................................................................................................ 5
Identify Ransomware Strain......................................................................................................................................................................................................... 6
Establish Infection Vector............................................................................................................................................................................................................ 6
9
Excerpt from
3 Must-Haves in Your Cybersecurity Gartner
Incident Toolkit:
Response
Creating a Ransomware Playbook
Enable Cyberincident
Notify Executive Notify Legal
Response Team
Ramsomware Confirmed
Initial Activities
Reset Impacted
Containment Identify Affected Hosts Isolate Affected Hosts Analysis
User/Host Credentials
Identify Ransomware
Preserve Evidence Establish Infection Vector Contract Law Enforcement
Strain
User Cyber
Analysis Insurance?
NO YES
10
Excerpt from
3 Must-Haves in Your Cybersecurity Gartner
Incident Toolkit:
Response
Creating a Ransomware Playbook
Do NOT power off machines without guidance from forensic investigators — doing so may destroy valuable forensic data residing in memory or executing on disk.
Isolate Affected 1. Disconnect the infected computers, laptops or tablets from all network connections, whether wired, wireless or CSIRT
Hosts mobile phone based.
2. Consider whether turning off your Wi-Fi, disabling any core network connections (including switches), and CSIRT
disconnecting the entire network from the internet will be necessary.
11
3 Must-Haves in Your Cybersecurity Incident Response
01
Build an incident
response plan
02
Develop detailed
response playbooks
03
Conduct regular
tabletop exercises
A general plan for responding Detailed guides for handling Routine tests to practice
to cyberincidents specific incident scenarios incident response plans
12
Excerpt from
3 Must-Haves in Your Cybersecurity Gartner
Incident Toolkit:
Response
Tabletop Exercise for Cyberattack Preparation and Response
13
Excerpt from
3 Must-Haves in Your Cybersecurity Gartner
Incident Toolkit:
Response
Tabletop Exercise for Cyberattack Preparation and Response
14
3 Must-Haves in Your Cybersecurity Incident Response
Example: Ransomware
In a tabletop exercise, you can challenge participants to react to a ransom demand from an attacker.
Things to consider
15
3 Must-Haves in Your Cybersecurity Incident Response
*Some Gartner subscriptions allow clients to submit their cybersecurity incident response plans for review by Gartner experts
or pose interim questions on their evolving plans.
16
Actionable, objective insight
Position your organization for success. Explore these additional complimentary
resources and tools for security and risk leaders:
Already a client?
Get access to even more resources in your client portal. Log In
17
Connect With Us
Get actionable, objective insight to deliver on your most critical
priorities. Our expert guidance and tools enable faster, smarter
decisions and stronger performance. Contact us to become a client:
U.S.: 1 855 811 7593
International: +44 (0) 3330 607 044
Become a Client