SSCP Book Chapter03 (Incident Response and Recovery) Notes
SSCP Book Chapter03 (Incident Response and Recovery) Notes
4.1 Management.
5. IR Team Provider: A third party that helps the IR team with resources they may not be
able to get ahold of. E.g. Forensics capabilities.
8.1 IDS/IPS.
8.2 Firewalls.
22. A balance between business needs and security objectives is the goal.
24.1 Preparation.
25.1 Segmentation: Divide networks into logical systems by types of users or systems.
Creates a separate VLAN on the network and puts all infected systems in that quarantined
network.
25.2 Isolation: Moves affected systems to a completely different network disconnected from
the rest of the network.
25.3 Removal: Completely disconnects any affected systems from any network.
26. Eradication: Remove any traces of the incident from your systems and networks.
29. Rebuild Affected Systems: After an incident response containment strategy has been
successfully applied and executed make sure to reset and rebuild affected systems, apply
patches to the security components of the system and make sure to rebuild the system with
the vulnerability in mind that the attacker used to breach the system’s security defenses.
31.3 Destroying: Completely obliterates the media through shredding, pulverization, melting
or burning.
32.4 Verify that systems are logging and communicating security information to the SIEM.
33. Validate that you have successfully restored all capabilities and services.
35. Lessons Learned: Provides incident responders with the opportunity to reflect on the
incident response efforts and offer feedback that will improve the organization’s response to
future incidents.
39.2 Walk-Throughs: Gather the team together, also known as tabletop exercises. Give the
team the opportunity to discuss the plan together instead of just reading the plan and making
changes by themselves (Read-Throughs).
39.3 Simulations: Use a specific scenario to test incident response. This exercise also
requires that the team be assembled together.
53.3 Parol Evidence Rule: Written contracts are assumed to be the entire agreement.
55.1 Direct Evidence: Witness provides evidence upon his or her own observation.
55.2 Expert Opinion: Expert draws conclusions based upon other evidence.
56. Digital Forensics: Investigative techniques that collect, preserve, analyze and interperet
digital evidence.
59.4 Files.
59.5 Logs.
63.1 Screenshots.
64. EXAM TIP: NEVER TRY TO PERFORM FORENSICS YOURSELF UNLESS YOU’VE
RECEIVED APPROPRIATE TRAINING!
67.2 Timestamp.
67.3 Amount of data transferred.
68. Routers and firewalls capture flow data using NetFlow, sFlow and IPFIX.
70.1 Intellectual Property: Software forensics may be used to resolve intellectual property
disputes between two parties.
70.2 Malware Origins: Software forensics may be used to identify the author of malicious
software found on a system.
71. Embedded Devices: Special-purpose computers found inside smart devices found in
homes, businesses and industrial settings.
72. Chain of Custody: Provides a paper trail of evidence(each time someone handles a
piece of evidence).
73.2 Transfer.
73.3 Storage.
73.4 Opening and releasing the evidence container.
74.3 Purpose.
78. Legal Holds: Require the preservation of relevant electronic and paper records.
79. System administrators must suspend the automated deletion of relevant logs.
81. Business continuity Planning(BCP): The set of controls designed to keep a business
running in the face of adversity, whether natural or man-made.
86. Single Point Of Failure Analysis: Identifies and removes single points of failure(SPOFs).
87. SPOF analysis continues until the cost of addressing risks outweighs the benefits.
90. The two key technical concepts that improve the availability of systems:
90.1 High Availability(HA): Uses multiple systems to protect against service failure.
90.2 Fault Tolerance: Making a single system resilient against technical failures.
91. Load Balancing: Spreads the burden of providing a service across multiple systems.
98. Disaster Recovery: Disaster recovery capabilities are designed to restore a business to
its normal operations as quickly as possible.
99. Initial response after a disaster recovery has been activated is:
101. Disaster recovery metrics used to help an organization plan their disaster
recovery efforts:
101.1 Recovery Time Objective (RTO): The maximum amount of time that it should take to
recover a service after a disaster.
101.2 Recovery Point Objective (RPO): The maximum time period for which data may be
lost in the wake of a disaster.
101.3 Recovery Service Level (RSL): The percentage of a service that must be available
during a disaster.
102. DR efforts only end when the business is operating normally in its primary environment.
103. Team members should receive regular training on their disaster recovery
responsibilities.
108.1 Hot site: Fully operational data centers stocked with equipment and data available at a
moments notice but they are very expensive.
108.2 Cold site: They are empty data centers stocked with core equipment, network and
environment tool but they don’t have the servers or data required to restore business and they
are relatively inexpensive. The downside is the time required to activate a cold site may take
weeks or even months.
108.3 Warm site: Stocked with all necessary equipment and data but are not maintained in a
parallel fashion. They are similar in expense to hot sites but only take hours to days to
activate.
109.3 Manual transfer or site replication through SAN(Storage Area Network) or VM.
109.4 Online(expensive) or offline(less expensive) backups.
111.1 Read-Through: Asks each member to review their role in the disaster recovery process
and provide feedback.
111.2 Walk-Through: Gather the team together for a formal review of the disaster recovery
plan.
111.3 Simulation: Use a practice scenario to test out the disaster recovery plan.
111.4 Parallel Tests: Activate the disaster recovery environment (activates the DR plan) but
do not switch operations here.
111.5 Full-Interruption Test: Switch the primary operations to the alternate environment and
can be very disruptive to business.
112. After Action Reports (AAR): Creates a formal record of the Disaster Recovery (DR)
and Business Continuity (BC) event.
113. Always conduct an AAR after every BC or DR event even the successful ones.
114. After Action Reports (AAR) should contain the following major sections:
114.1 Brief executive summary: Capture the basics of the event and major findings in a few
paragraphs.
114.2 Background Information: Allows the reader to understand the context of incident and
leading up to the incident.
114.3 Answer Key Factual Questions: Answer the key factual questions around the event.
The who, what, where, when, how, why.
114.4 Lessons Learned: Include the lessons learned during the incident and in the post-
event analysis.
114.5 Next Steps: Include the next steps the organization must take based upon the lessons
learned.
115. Business continuity and disaster recovery efforts should be part of a broader emergency
response plan.
117. Crisis management teams (they guide the organizations response) should work closely
with cybersecurity and IT staff to address technical risks.
118. EXAM TIP: THE PROTECTION OF HUMAN LIFE IS ALWAYS THE HIGHEST
PRIORITY.