Given the multitude of ways incidents can arise, crafting comprehensive, step-by-step instructions for each scenario is impractical. Instead, organisations should maintain a general readiness to address any incident, with particular emphasis on preparing for those leveraging common attack vectors. Tailored response strategies are warranted for various incident types.
Accurately identifying and evaluating potential incidents is often the most daunting aspect of the incident response process. The stage of identification and analysis of incidents is defined by NIST to broadly align to 4 areas:
1.Signs of an Incident: Detection of precursors and indicators of an incident can come from many sources via alerts from solutions, such as SIEMs (Security Information & Event Management) or IPS (Intrusion Prevention Systems) tools, network or operational logs or employees themselves. Building an appropriate picture of an incident and analysing its severity and impact is dependent on the preparation and readiness of the organisation.
2.Incident Analysis and Documentation: Not all alerts of precursor or incidents are genuine and their proliferation across your estate can be varied. The incident response team should work swiftly to analyse and validate each incident, following a predefined process and documenting each step taken. When the team believes that an incident has occurred, they should rapidly perform an initial analysis to determine the incident’s scope, such as which networks, systems, or applications are affected; who or what originated the incident; and how the incident is occurring (e.g., what tools or attack methods are being used, what vulnerabilities are being exploited). The initial analysis should provide enough information for the team to prioritise subsequent activities, such as containment of the incident and a deeper analysis of the effects of the incident.
3.Incident Prioritisation: Incidents should not be handled on a first come first served basis, but instead be prioritised based on relevant factors such as operational impact, informational impact, and recovery capability.
4.Incident Notification: The incident response team must inform the relevant individuals to ensure everyone plays their part effectively. Incident response policies should incorporate guidelines on incident reporting, specifying the essential information to be reported, the recipients, and the timing of reports (e.g., initial notification, regular updates). Typically, this involves notification to internal teams, system owners, users, and public affairs.