Curriculum
Course: Cyber Security
Login

Curriculum

Cyber Security

Text lesson

Containment

Containment aims to stop attackers immediately and prevent further damage to the organization. The IRT should prioritize creating backups and imaging to preserve evidence, which includes securing:

  • Copies of hard drives for file forensics
  • Memory copies of involved systems for memory forensics

Various actions can be taken during containment, depending on the specific incident, such as:

  • Blocking the attackers via the firewall
  • Disconnecting compromised systems from the network
  • Taking affected systems offline
  • Changing passwords
  • Collaborating with ISPs or partners to assist in halting the attack

These containment measures are crucial for quickly neutralizing the threat, allowing the IRT to proceed to the eradication phase.

Eradication

Once containment is successfully executed, the IRT can proceed to the eradication phase, also known as the remediation phase, where the objective is to eliminate the attackers’ artifacts.

Quick options for eradication include:

  • Restoring from a known good backup
  • Rebuilding the affected service

It’s essential to remember that restoring or rebuilding may reverse any changes made during containment, necessitating those adjustments to be reapplied. In some cases, the IRT may need to manually remove the artifacts left by the attackers.

Recovery

The goal for the IRT is to restore normal operations, which may require acceptance testing from business units. Ideally, monitoring solutions should be implemented to track the incident, helping to detect any return of attackers due to artifacts that were not fully removed during eradication.

Lessons Learned

The final phase focuses on extracting lessons from the incident, which may include questions like:

  • Did the IRT possess the necessary knowledge, tools, and access for efficient operations?
  • Were there any missing logs that could have facilitated the IRT’s efforts?
  • Are there processes that could be improved to prevent similar incidents in the future?

This lessons-learned phase usually culminates in a report that provides an executive summary and an overview of the incident.