版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency2
CONTENTS
Introduction 3
Overview 3
Scope 3
Audience 4
IncidentResponsePlaybook 5
IncidentResponseProcess 5
PreparationPhase 6
Detection&Analysis 10
Containment 14
Eradication&Recovery 15
Post-IncidentActivities 16
Coordination 17
VulnerabilityResponsePlaybook 21
Preparation 21
VulnerabilityResponseProcess 22
Identification 22
Evaluation 23
Remediation 24
ReportingandNotification 24
AppendixA:KeyTerms 25
AppendixB:IncidentResponseChecklist 27
AppendixC:IncidentResponsePreparationChecklist 35
AppendixE:VulnerabilityandIncidentCategories 38
AppendixF:SourceText 39
AppendixG:Whole-of-GovernmentRolesandResponsibilities 41
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency3
INTRODUCTION
TheCybersecurityandInfrastructureSecurityAgency(CISA)iscommittedtoleadingtheresponsetocybersecurityincidentsandvulnerabilitiestosafeguardthenation'scriticalassets.Section6ofExecutiveOrder14028directedDHS,viaCISA,to“developastandardsetofoperationalprocedures(playbook)tobeusedinplanningandconductingcybersecurityvulnerabilityandincidentresponseactivityrespectingFederalCivilianExecutiveBranch(FCEB)InformationSystems.”
1
Overview
Thisdocumentpresentstwoplaybooks:oneforincidentresponseandoneforvulnerabilityresponse.TheseplaybooksprovideFCEBagencieswithastandardsetofprocedurestoidentify,coordinate,remediate,recover,andtracksuccessfulmitigationsfromincidentsandvulnerabilitiesaffectingFCEBsystems,data,andnetworks.Inaddition,futureiterationsoftheseplaybooksmaybeusefulfororganizationsoutsideoftheFCEBtostandardizeincidentresponsepractices.Workingtogetheracrossallfederalgovernmentorganizationshasproventobeaneffectivemodelforaddressingvulnerabilitiesandincidents.Buildingonlessonslearnedfrompreviousincidentsandincorporatingindustrybestpractices,CISAintendsfortheseplaybookstoevolvethefederalgovernment’spracticesforcybersecurityresponsethroughstandardizingsharedpracticesthatbringtogetherthebestpeopleandprocessestodrivecoordinatedactions.
Thestandardizedprocessesandproceduresdescribedintheseplaybooks:
?Facilitatebettercoordinationandeffectiveresponseamongaffectedorganizations,
?Enabletrackingofcross-organizationalsuccessfulactions,
?Allowforcatalogingofincidentstobettermanagefutureevents,and
?Guideanalysisanddiscovery.
Agenciesshouldusetheseplaybookstohelpshapeoveralldefensivecyberoperationstoensureconsistentandeffectiveresponseandcoordinatedcommunicationofresponseactivities
Scope
TheseplaybooksareforFCEBentitiestofocusoncriteriaforresponseandthresholdsforcoordinationandreporting.TheyincludecommunicationsbetweenFCEBentitiesandCISA;theconnectivecoordinationbetweenincidentandvulnerabilityresponseactivities;andcommondefinitionsforkeycybersecuritytermsandaspectsoftheresponseprocess.Responseactivitiesinscopeofthisplaybookincludethose:
?InitiatedbyanFCEBagency(e.g.,alocaldetectionofmaliciousactivityordiscoveryofavulnerability)
?InitiatedbyCISA(e.g.,aCISAalertordirective)orotherthirdparties,includinglawenforcement,intelligenceagencies,orcommercialorganizations,contractors,andserviceproviders
TheIncidentResponsePlaybookappliestoincidentsthatinvolveconfirmedmaliciouscyberactivityandforwhichamajorincident(asdefinedbytheOfficeofManagementandBudget[OMB]in
1
ExecutiveOrder(EO)14028:ImprovingtheNation'sCybersecurity
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency4
MemorandumM-20-04
2
orsuccessormemorandum)hasbeendeclaredornotyetbeenreasonablyruledout.TheVulnerabilityResponsePlaybookappliestovulnerabilitiesbeingactivelyexploitedinthewild.AsrequiredbyEO14028,theDirectorofOMBwillissueguidanceonFCEBagencyuseoftheseplaybooks.
Note:theseplaybooksdonotcoverresponseactivitiesthatinvolvethreatstoclassifiedinformationorNationalSecuritySystems(NSS)asdefinedby44U.S.C.3552(b)(6).SeeCNSSI1010
3
forcoordination/reportingguidanceforincidentsspecifictoNSSorsystemsthatprocessclassifiedinformation.
Audience
TheseplaybooksapplytoallFCEBagencies,informationsystemsusedoroperatedbyanagency,acontractorofanagency,oranotherorganizationonbehalfofanagency.Itisthepolicyofthefederalgovernmentthatinformationandcommunicationstechnology(ICT)serviceproviderswhohavecontractedwithFCEBagenciesmustpromptlyreportincidentstosuchagenciesandtoCISA.
4
2
OfficeofManagementandBudget(OMB)MemorandumM-20-04:FiscalYear2019-2020GuidanceonFederalInformation
SecurityandPrivacyManagementRequirements
3
CommitteeonNationalSecuritySystems
4
EO14028,Sec.2.RemovingBarrierstoSharingThreatInformation
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency5
INCIDENTRESPONSEPLAYBOOK
Whentousethisplaybook
Usethisplaybookforincidentsthatinvolveconfirmedmaliciouscyberactivityforwhichamajorincidenthasbeendeclaredornotyetbeenreasonablyruledout.
Forexample:
?Incidentsinvolvinglateralmovement,credentialaccess,exfiltrationofdata
?Networkintrusionsinvolvingmorethanoneuserorsystem
?Compromisedadministratoraccounts
Thisplaybookdoesnotapplytoactivitythatdoesnotappeartohavesuchmajorincidentpotential,suchas:
?“Spills”ofclassifiedinformationorotherincidentsthatarebelievedtoresultfromunintentionalbehavioronly
?Usersclickingonphishingemailswhennocompromiseresults
?Commoditymalwareonasinglemachineorlosthardwarethat,ineithercase,isnotlikelytoresultindemonstrableharmtothenationalsecurityinterests,foreignrelations,oreconomyoftheUnitedStatesortothepublicconfidence,civilliberties,orpublichealthandsafetyoftheAmericanpeople.
Thisplaybookprovidesastandardizedresponse
processforcybersecurityincidentsanddescribes
theprocessandcompletionthroughtheincident
responsephasesasdefinedinNationalInstituteof
StandardsandTechnology(NIST)Special
Publication(SP)800-61Rev.2,
5
including
preparation,detectionandanalysis,containment,
eradicationandrecovery,andpost-incident
activities.Thisplaybookdescribestheprocess
FCEBagenciesshouldfollowforconfirmed
maliciouscyberactivityforwhichamajorincident
hasbeendeclaredornotyetbeenreasonablyruled
out.
?Incidentresponsecanbeinitiatedbyseveraltypesofevents,includingbutnotlimitedto:
?Automateddetectionsystemsorsensoralerts
?Agencyuserreport
?Contractororthird-partyICTserviceproviderreport
?Internalorexternalorganizationalcomponentincidentreportorsituationalawarenessupdate
?Third-partyreportingofnetworkactivitytoknowncompromisedinfrastructure,detectionofmaliciouscode,lossofservices,etc.
?Analyticsorhuntteamsthatidentifypotentiallymaliciousorotherwiseunauthorizedactivity
IncidentResponseProcess
Theincidentresponseprocessstartswiththedeclarationoftheincident,asshowninFigure1.Inthiscontext,“declaration”referstotheidentificationofanincidentandcommunicationtoCISAandagencynetworkdefendersratherthanformaldeclarationofamajorincidentasdefinedinapplicablelawandpolicy.Succeedingsections,whichareorganizedbyphasesoftheIRlifecycle,describeeachstepinmoredetail.Manyactivitiesareiterativeandmaycontinuouslyoccurandevolveuntiltheincidentisclosedout.Figure1illustratesincidentresponseactivitiesintermsofthesephases,andAppendixBprovidesacompanionchecklisttotrackactivitiestocompletion.
5
NISTSpecialPublication(SP)800-61Rev.2:ComputerSecurityIncidentHandlingGuide
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency6
Figure1:IncidentResponseProcess
PreparationPhase
Prepareformajorincidentsbeforetheyoccurtomitigateanyimpactontheorganization.Preparationactivitiesinclude:
?Documentingandunderstandingpoliciesandproceduresforincidentresponse
?Instrumentingtheenvironmenttodetectsuspiciousandmaliciousactivity
?Establishingstaffingplans
?Educatingusersoncyberthreatsandnotificationprocedures
?Leveragingcyberthreatintelligence(CTI)toproactivelyidentifypotentialmaliciousactivity
Definebaselinesystemsandnetworksbeforeanincidentoccurstounderstandthebasicsof“normal”activity.Establishingbaselinesenablesdefenderstoidentifydeviations.Preparationalsoincludes
?Havinginfrastructureinplacetohandlecomplexincidents,includingclassifiedandout-of-bandcommunications
?Developingandtestingcoursesofaction(COAs)forcontainmentanderadication
?Establishingmeansforcollectingdigitalforensicsandotherdataorevidence
Thegoaloftheseitemsistoensureresilientarchitecturesandsystemstomaintaincriticaloperationsinacompromisedstate.Activedefensemeasuresthatemploymethodssuchasredirectionandmonitoringofadversaryactivitiesmayalsoplayaroleindevelopingarobustincidentresponse.
6
6Forexample,“Deception:Mislead,confuse,hidecriticalassetsfrom,orexposecovertlytaintedassetstotheadversary,”asdefinedin
NISTSP800-160Vol.2:DevelopingCyberResilientSystems:ASystemsSecurityEngineeringApproach
.
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency7
PreparationActivities
PoliciesandProcedures
Documentincidentresponseplans,includingprocessesandproceduresfordesignatingacoordinationlead(incidentmanager).Putpoliciesandproceduresinplacetoescalateandreportmajorincidentsandthosewithimpactontheagency’smission.Documentcontingencyplansforadditionalresourcingand“surgesupport”withassignedrolesandresponsibilities.Policiesandplansshouldaddressnotification,interaction,andevidencesharingwithlawenforcement.
Instrumentation
Developandmaintainanaccuratepictureofinfrastructure(systems,networks,cloudplatforms,andcontractor-hostednetworks)bywidelyimplementingtelemetrytosupportsystemandsensor-baseddetectionandmonitoringcapabilitiessuchasantivirus(AV)software;endpointdetectionandresponse(EDR)solutions;
7
datalossprevention(DLP)capabilities;intrusiondetectionandpreventionsystems(IDPS);authorization,host,applicationandcloudlogs;
8
networkflows,packetcapture(PCAP);andsecurityinformationandeventmanagement(SIEM)systems.MonitorforalertsgeneratedbyCISA'sEINSTEINintrusiondetectionsystemandContinuousDiagnosticsandMitigation(CDM)programtodetectchangesincyberposture.Implementadditionalrequirementsforlogging,logretention,andlogmanagementbasedonExecutiveOrder14028,Sec.8.ImprovingtheFederalGovernment'sInvestigativeandRemediationCapabilities,
9
andensurethoselogsarecollectedcentrally.
TrainedResponsePersonnel
Ensurepersonnelaretrained,exercised,andreadytorespondtocybersecurityincidents.Train
allstaffingresourcesthatmaydrawfromin-housecapabilities,availablecapabilitiesataparentagency/department,third-partyorganization,oracombinationthereof.Conductregularrecoveryexercisestotestfullorganizationalcontinuityofoperationsplan(COOP)andfailover/backup/recoverysystemstobesuretheseworkasplanned.
CyberThreatIntelligence
Activelymonitorintelligencefeedsforthreatorvulnerabilityadvisoriesfromgovernment,trustedpartners,opensources,andcommercialentities.Cyberthreatintelligencecanincludethreatlandscapereporting,threatactorprofilesandintents,organizationaltargetsandcampaigns,aswellasmorespecificthreatindicatorsandcoursesofaction.IngestcyberthreatindicatorsandintegratedthreatfeedsintoaSIEM,anduseotherdefensivecapabilitiestoidentifyandblockknownmaliciousbehavior.Threatindicatorscaninclude:
?Atomicindicators,suchasdomainsandIPaddresses,thatcandetectadversaryinfrastructureandtools
?Computedindicators,suchasYararulesandregularexpressions,thatdetectknownmaliciousartifactsorsignsofactivity
?Patternsandbehaviors,suchasanalyticsthatdetectadversarytactics,techniques,andprocedures(TTPs)
Atomicindicatorscaninitiallybevaluabletodetectsignsofaknowncampaign.However,becauseadversariesoftenchangetheirinfrastructure(e.g.,wateringholes,botnets,C2servers)betweencampaigns,the“shelf-life”ofatomicindicatorstodetectnewadversaryactivityislimited.Inaddition,advancedthreatactors
7
EO14028,Sec.7.ImprovingDetectionofCybersecurityVulnerabilitiesandIncidentsonFederalGovernmentNetworks
8
NISTSP800-92:GuidetoComputerSecurityLogManagement
9
E014028,Sec.8.ImprovingtheFederalGovernment'sInvestigativeandRemediationCapabilities
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency8
mightleveragedifferentinfrastructureagainstdifferenttargetsorswitchtonewinfrastructureduringacampaignwhentheiractivitiesaredetected.Finally,adversariesoftenhideintheirtargetedenvironments,usingnativeoperatingsystemutilitiesandotherresourcestoachievetheirgoals.Forthesereasons,agenciesshouldusepatternsandbehaviors,oradversaryTTPs,toidentifymaliciousactivitywhenpossible.Althoughmoredifficulttoapplydetectionmethodsandverifyapplication,TTPsprovidemoreusefulandsustainablecontextaboutthreatactors,theirintentions,andtheirmethodsthanatomicindicatorsalone.
TheMITREATT&CK?
framework
documentsandexplainsadversaryTTPsindetailmakingitavaluableresourcefornetworkdefenders.
10
Sharingcyberthreatintelligenceisacriticalelementofpreparation.FCEBagenciesarestronglyencouragedtocontinuouslysharecyberthreatintelligence—includingadversaryindicators,TTPs,andassociateddefensivemeasures(alsoknownas“countermeasures”)—withCISAandotherpartners.Theprimarymethodforsharingcyberthreatinformation,indicators,andassociateddefensivemeasureswithCISAisviatheAutomatedIndicatorSharing(AIS)program.
11
FCEBagenciesshouldbeenrolledinAIS.IftheagencyisnotenrolledinAIS,contactCISAformoreinformation.
12
AgenciesshouldusetheCyberThreatIndicatorandDefensiveMeasuresSubmissionSystem—asecure,web-enabledmethod—tosharewithCISAcyberthreatindicatorsanddefensivemeasuresthatarenotapplicableorappropriatetoshareviaAIS.
13
10See
BestPracticesforMITREATT&CK?Mapping
FrameworkforguidanceonusingATT&CKtoanalyzeandreportoncybersecuritythreats.
11
CISAAutomatedIndicatorSharing
12
CISAAutomatedIndicatorSharing
ActiveDefense
FCEBagencieswithadvanceddefensivecapabilitiesandstaffmightestablishactivedefensecapabilities—suchastheabilitytoredirectanadversarytoasandboxorhoneynetsystemforadditionalstudy,or“darknets”—todelaytheabilityofanadversarytodiscovertheagency’slegitimateinfrastructure.Networkdefenderscanimplementhoneytokens(fictitiousdataobjects)andfakeaccountstoactascanariesformaliciousactivity.Thesecapabilitiesenabledefenderstostudytheadversary’sbehaviorandTTPsandtherebybuildafullpictureofadversarycapabilities.
CommunicationsandLogistics
Establishlocalandcross-agencycommunicationproceduresandmechanismsforcoordinatingmajorincidentswithCISAandothersharingpartnersanddeterminetheinformationsharingprotocolstouse(i.e.,agreed-uponstandards).Definemethodsforhandlingclassifiedinformationanddata,ifrequired.Establishcommunicationchannels(chatrooms,phonebridges)andmethodforout-of-bandcoordination.
14
OperationalSecurity(OPSEC)
TakestepstoensurethatIRanddefensivesystemsandprocesseswillbeoperationalduringanattack,particularlyintheeventofpervasivecompromises—suchasaransomwareattackoroneinvolvinganaggressiveattackerthatmayattempttounderminedefensivemeasuresanddistractormisleaddefenders.Thesemeasuresinclude:
?SegmentingandmanagingSOCsystemsseparatelyfromthebroaderenterpriseITsystems,
13
DHSCISACyberThreatIndicatorandDefensiveMeasure
SubmissionSystem
14
NISTSP800-47Rev.1:ManagingtheSecurityof
InformationExchanges
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency9
?Managingsensorsandsecuritydevicesviaout-of-bandmeans,
?Notifyingusersofcompromisedsystemsviaphoneratherthanemail,
?Usinghardenedworkstationstoconductmonitoringandresponseactivities,and
?Ensuringthatdefensivesystemshaverobustbackupandrecoveryprocesses.
Avoid“tippingoff”anattackerbyhavingprocessesandsystemstoreducethelikelihoodofdetectionofIRactivities(e.g.,donotsubmitmalwaresamplestoapublicanalysisserviceornotifyusersofpotentiallycomprisedmachinesviaemail).
TechnicalInfrastructure
Implementcapabilitiestocontain,replicate,analyze,reconstitute,anddocumentcompromisedhosts;implementthecapabilitytocollectdigitalforensicsandotherdata.Establishsecurestorage(i.e.,onlyaccessiblebyincidentresponders)forincidentdataandreporting.Providemeansforcollectingforensicevidence,suchasdiskandactivememoryimaging,andmeansforsafelyhandlingmalware.Obtain
analysistoolsandsandboxsoftwareforanalyzingmalware.Implementaticketingorcasemanagementsystemthatcapturespertinentdetailsof:
?Anomalousorsuspiciousactivity,suchasaffectedsystems,applications,andusers;
?Activitytype;
?Specificthreatgroup(s);
?Adversarytactics,techniques,andprocedures(TTPs)employed;and
?Impact.
DetectActivity
Leveragethreatintelligencetocreaterulesandsignaturestoidentifytheactivityassociatedwiththeincidentandtoscopeitsreach.Configuretoolsandanalyzelogsandalerts.Lookforsignsofincidentactivityandpotentiallyrelatedinformationtodeterminethetypeofincident,e.g.,malwareattack,systemcompromise,sessionhijack,datacorruption,dataexfiltration,etc.
SeeAppendixCforachecklistforpreparationactivities.
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency10
Detection&Analysis
Themostchallengingaspectoftheincidentresponseprocessisoftenaccuratelydetectingandassessingcybersecurityincidents:determiningwhetheranincidenthasoccurredand,ifso,thetype,extent,andmagnitudeofthecompromisewithincloud,operationaltechnology(OT),hybrid,host,andnetworksystems.Todetectandanalyzeevents,implementdefinedprocesses,appropriatetechnology,and
sufficientbaselineinformationtomonitor,detect,andalertonanomalousandsuspiciousactivity.Ensurethereareprocedurestodeconflictpotentialincidentswithauthorizedactivity(e.g.,confirmthatasuspectedincidentisnotsimplyanetworkadministratorusingremoteadmintoolstoperformsoftwareupdates).AstheU.S.government’sleadforassetresponse,CISAwillpartnerwithaffectedagenciesinallaspectsofthedetectionandanalysisprocess.
Detection&AnalysisActivities
DeclareIncident
DeclareanincidentbyreportingittoCISAat
/
andalertingagencyITleadershiptotheneedforinvestigationandresponse.CISAcanassistindeterminingtheseverityoftheincidentandwhetheritshouldbedeclaredamajorincident.Note:FCEBagenciesmustpromptlyreportallcybersecurityincidents,regardlessofseverity,toCISA
DetermineInvestigationScope
Useavailabledatatoidentifythetypeofaccess,theextenttowhichassetshavebeenaffected,thelevelofprivilegeattainedbytheadversary,andtheoperationalorinformationalimpact.Discoverassociatedmaliciousactivitybyfollowingthetrailofnetworkdata;discoverassociatedhost-basedartifactsbyexamininghost,firewall,andproxylogsalongwithothernetworkdata,suchasroutertraffic.Initialscopingofanincidenttodetermineadversarialactivitymayincludeanalyzingresultsfrom:
?Anautomateddetectionsystemorsensor;
?Areportfromauser,contractor,orthird-partyinformationandcommunicationtechnologies(ICT)serviceprovider;or
?Anincidentreportorsituationalawarenessupdatefromotherinternalorexternalorganizationalcomponents.
15
NISTSP800-61Rev.2:ComputerSecurityIncident
HandlingGuide
CollectandPreserveData
Collectandpreservedataforincidentverification,categorization,prioritization,mitigation,reporting,andattribution.Whennecessaryandpossible,suchinformationshouldbepreservedandsafeguardedasbestevidenceforuseinanypotentiallawenforcementinvestigation.Collectdatafromtheperimeter,theinternalnetwork,andtheendpoint(serverandhost).Collectaudit,transaction,intrusion,connection,systemperformance,anduseractivitylogs.Whenanendpointrequiresforensicanalysis,captureamemoryanddiskimageforevidencepreservation.Collectevidence,includingforensicdata,accordingtoproceduresthatmeetallapplicablepoliciesandstandardsandaccountforitinadetailedlogthatiskeptforallevidence.Formoreinformation,seeNISTComputerSecurityIncidentHandlingGuide,SP800-61r2.
15
Extractallrelevantthreatinformation(atomic,computed,andbehavioralindicatorsandcountermeasures)tosharewithIRteamsandwithCISA.
PerformTechnicalAnalysis
Developatechnicalandcontextualunderstandingoftheincident.Correlateinformation,assessanomalousactivityagainstaknownbaselinetodeterminerootcause,anddocumentadversaryTTPstoenableprioritizationofthesubsequent
TLP:WHITE
TLP:WHITE
CISA|CybersecurityandInfrastructureSecurityAgency11
responseactivities.Thegoalofthisanalysisistoexaminethebreadthofdatasourcesthroughouttheenvironmenttodiscoveratleastsomepartofanattackchain,ifnotallofit.Asinformationevolvesandtheinvestigationprogresses,updatethescopetoincorporatenewinformation.
CorrelateEventsandDocumentTimeline
Acquire,store,andanalyzelogstocorrelateadversarialactivity.Table1presentsanexampleoflogsandeventdatathatarecommonlyemployedtodetectandanalyzeattackeractivities.
16
,
17
Asimpleknowledgebaseshouldbeestablishedforreferenceduringresponsetotheincident.Thoroughlydocumenteverysteptakenduringthisandsubsequentphases.Createatimelineofallrelevantfindings.Thetimelinewillallowtheteamtoaccountforalladversaryactivityonthenetworkandwillassistincreatingthefindingsreportattheconclusionoftheresponse.
IdentifyAnomalousActivity
Assessandprofileaffectedsystemsandnetworksforsubtleactivitythatmightbeadversarybehavior.Adversarieswilloftenuselegitimate,nativeoperatingsystemutilitiesandscriptinglanguagesoncetheygainafootholdinanenvironmenttoavoiddetection.Thisprocesswillenabletheteamtoidentifydeviationsfromtheestablishedbaselineactivityandcanbeparticularlyimportantinidentifyingactivitiessuchasattemptstoleveragelegitimatecredentialsandnativecapabilitiesintheenvironment.
IdentifyRootCauseandEnablingConditions
Attempttoidentifytherootcauseoftheincidentandcollectthreatinformationthatcanbeusedinfurthersearchesandtoinformsubsequentresponseefforts.Identifytheconditionsthatenabledtheadversarytoaccessandoperate
16Derivedfromthe
MITREATT&CK?
Framework.Note:thistableisarepresentativesamplingofcommontactics,techniques,andrelatedlogs,andisnotintendedtobecomplete.
withintheenvironment.Theseconditionswillinformtriageandpost-incidentactivity.Assessnetworksandsystemsforchangesthatmayhavebeenmadetoeitherevadedefensesorfacilitatepersistentaccess.
GatherIncidentIndicators
Identifyanddocumentindicatorsthatcanbeusedforcorrelativeanalysisonthenetwork.Indicatorscanprovideinsightintotheadversary’scapabilitiesandinfrastructure.Indicatorsasstandaloneartifactsarevaluableintheearlystagesofincidentresponse.
AnalyzeforCommonAdversaryTTPs
CompareTTPstoadversaryTTPsdocumentedinATT&CKandanalyzehowtheTTPsfitintotheattacklifecycle.TTPsdescribe“why,”“what,”and“how.”Tacticsdescribethetechnicalobjectiveanadversaryistryingtoachieve(“why”),techniquesaredifferentmechanismstheyusetoachieveit(“what”),andproceduresareexactlyhowtheadversaryachievesaspecificresult(“how”).RespondingtoTTPsenablesdefendersto
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年磨邊鑲嵌彩色玻璃項(xiàng)目可行性研究報(bào)告
- 2021-2026年中國(guó)多巴胺注射液行業(yè)全景評(píng)估及投資規(guī)劃建議報(bào)告
- 2025年綠色環(huán)保項(xiàng)目評(píng)估報(bào)告
- 霧在哪里微課程設(shè)計(jì)反思
- 2025年中國(guó)摩托車(chē)變速器行業(yè)發(fā)展監(jiān)測(cè)及行業(yè)市場(chǎng)深度研究報(bào)告
- 2025年中國(guó)視頻光端機(jī)行業(yè)市場(chǎng)前瞻與投資戰(zhàn)略規(guī)劃分析報(bào)告
- 2025年中國(guó)數(shù)控銑床行業(yè)市場(chǎng)全景監(jiān)測(cè)及投資戰(zhàn)略咨詢(xún)報(bào)告
- 魚(yú)罐頭加工課程設(shè)計(jì)
- 2025年中國(guó)宜賓市軌道交通行業(yè)市場(chǎng)深度分析及未來(lái)發(fā)展趨勢(shì)預(yù)測(cè)報(bào)告
- 2019-2025年中國(guó)維生素E行業(yè)發(fā)展前景預(yù)測(cè)及投資戰(zhàn)略研究報(bào)告
- COCA20000詞匯音標(biāo)版表格
- 滬教版七年級(jí)數(shù)學(xué)上冊(cè)專(zhuān)題06圖形的運(yùn)動(dòng)(原卷版+解析)
- JTG-T-F20-2015公路路面基層施工技術(shù)細(xì)則
- 光伏發(fā)電站集中監(jiān)控系統(tǒng)通信及數(shù)據(jù)標(biāo)準(zhǔn)
- 建筑垃圾減排及資源化處置措施
- 2024年遼寧石化職業(yè)技術(shù)學(xué)院?jiǎn)握新殬I(yè)適應(yīng)性測(cè)試題庫(kù)附答案
- 中西方校服文化差異研究
- 2024年一級(jí)建造師考試思維導(dǎo)圖-市政
- 高壓架空輸電線(xiàn)路反事故措施培訓(xùn)課件
- 隱私計(jì)算技術(shù)與數(shù)據(jù)安全保護(hù)
- 人教版小學(xué)數(shù)學(xué)五年級(jí)上冊(cè)口算題卡
評(píng)論
0/150
提交評(píng)論