Initial Response


Identification of Threat
  • Where is the attack coming from?
    • Internal or External?
    • Automated or Manual?
  • What exactly is this attack doing?
  • How is this impacting the victim?
  • How far has this attack spread?
  • Does it come from a single source or multiple?

Triage – “Stop the Bleeding”
  • Modify Firewall Rules
  • Modify Intrusion Detection Ruleset
  • Modify Access Control Lists 
    • Servers (Active Directory, LDAP, Novell, etc)
    • Remote Connections (VPN, Radius, etc)
    • Physical Connections (Router, Switch, etc)
  • Contact Up-stream provider
  • Physically Disconnect Network (*)
Evidence Identification
  • Ongoing malicious Activities
    • Packet Captures
    • Log Captures
  • Historic Evidence
    • Log Identification
      • Server
      • Appliance
      • Infrastructure
      • Volatile and Non-Volatile Memory
  • Determination of Network Topology
Evidence Preservation
  • Historic Evidence
    • Log Preservation
    • Volatile Memory Preservation
    • Non-Volatile Memory Preservation
    • Log Requests from other sources (Up-stream provider, Out-sourced services, etc)
Prevention of Future Compromises
  • Removal of unauthorized accounts
  • Modification of Firewall Logs
  • Modification of Intrusion Detection Rules
  • Patching of Systems
  • Modification of Public Facing Applications
  • Update of Virus Definition Files
  • Installation of Early Detection Devices