Module 5
Module 5
Module 5
– Questions to address
• When did the event happen?
• How was it discovered?
• Who discovered it?
• Have any other areas been impacted?
• What is the scope of the compromise?
• Does it affect operations?
• Has the source (point of entry) of the event been discovered?
Incident Response
3. Containment
– When a breach is first discovered, your initial instinct may
be to securely delete everything so you can just get rid of it.
– However, that will likely hurt you in the long run since you’ll
be destroying valuable evidence that you need to
determine where the breach started and devise a plan to
prevent it from happening again..
– Instead, contain the breach so it doesn’t spread and cause
further damage to your business.
– If you can, disconnect affected devices from the Internet.
Have short-term and long-term containment strategies
ready.
– It’s also good to have a redundant system back-up to help
Incident Response
3. Containment
– Questions to address
• What’s been done to contain the breach short term?
• What’s been done to contain the breach long term?
• Has any discovered malware been quarantined from the rest of
the environment?
• What sort of backups are in place?
• Does your remote access require true multi-factor authentication?
• Have all access credentials been reviewed for legitimacy, hardened
and changed?
• Have you applied all recent security patches and updates?
Incident Response
4. Eradication
– Once you’ve contained the issue, you need to find and
eliminate the root cause of the breach.
– This means all malware should be securely removed, systems
should again be hardened and patched, and updates should
be applied.