The incident response process is necessarily a reactive one. You can only respond to an incident once it has been detected.
This makes it difficult to predict or optimize incident response outcomes. If an organization has never experienced a ransomware attack, how will it know when it’s ready to face one?
Incident response frameworks enable organizations to address this problem by creating standardized response plans. These frameworks are developed by reputable cybersecurity leaders and informed by industry expertise.
With an incident response framework in place, your organization can develop a set of incident response playbooks. These playbooks provide a structured, step-by-step response to certain threats. Having a comprehensive set of playbooks ensures your organization can reliably protect itself from a wide range of threats.
Nothing stops a security team from building their own set of incident response playbooks without adhering to any specific framework. Many organizations do not adhere fully to any specific framework, and some only adhere partially.
However, this approach can generate problems:
Building incident response playbooks around a consistent framework enables your security team to respond quickly and decisively to unauthorized activity.
Incident response frameworks provide significant benefits to organizations that adopt them. Building a set of response plans on a uniform foundation allows them to complement one another in ways that considerably improve operational security.
Some of the benefits to building incident response workflows around an established framework include:
Adopting a framework doesn’t always mean building it yourself. Many security leaders standardize their incident response processes by collaborating with managed detection and response vendors that already adhere to a well-known framework.
Many different organizations have published incident response frameworks, but two stand out in the cybersecurity community: NIST and SANS.
The NIST incident response life cycle has four stages:
NIST points out that the quality of security preparation deeply impacts security event outcomes. The first phase of the event lifecycle is about identifying the assets and resources incident responders need to successfully carry out their mission.
Some of the activities security teams carry out at this stage include:
Once your organization can reliably detect security events, it can start analyzing indicators of compromise across its network and identifying incidents.
This phase involves configuring security tools and monitoring systems, which can vary between organizations. Depending on the tools you equipped your security team with, this might include:
When your team confirms a security incident has taken place, it must contain the damage and regain control of impacted systems. That means identifying compromised systems and eliminating threats from the environment.
NIST recommends producing detailed containment strategies in advance. These will be part of your incident response plans, showing how your team can respond to security threats based on their type — malware threats, distributed denial-of-service (DDoS) attacks, credential-based attacks, and more.
Every second counts in an active cyberattack scenario. You may need to remove malware, quarantine infected systems, and recover compromised devices from an earlier backup. Having a robust set of procedures to follow makes this process much faster and simpler.
This phase is about providing clear, actionable insight on how to improve incident response processes moving forward. Professional incident response teams use after-action reports to recommend improvements and ensure better security incident outcomes over time.
Some of the questions security leaders and team members may ask at this point include:
The SANS Institute has published a separate set of guidelines that emphasize the technical requirements of effective incident response. These fall into six categories:
Preparation is about reviewing and codifying security policies. Performing risk assessments and identifying sensitive assets are some of the tasks performed at this step.
It also includes researching potential security threats that may impact the organization and categorizing them based on their severity. This will help the team prioritize security tasks in complex threat scenarios that impact more than one asset or application, or those that involve multiple threat actors.
This step involves configuring detection rules that tell SOC analysts when network users or assets start acting abnormally. It provides structure to conducting event investigations, providing guidance on when and how to escalate an event to an incident.
The framework also provides methods for collecting additional evidence when investigating security events. The goal is to establish the type and severity of security breaches and document every detail associated with unauthorized activity before taking action.
The SANS framework recommends completing short-term containment before focusing on long-term containment. Short-term containment might include isolating the network segment that a compromised endpoint device belongs to, or disconnecting compromised devices from the network.
At that point the incident response team can focus on long-term containment. This might involve deploying patches and updates that allow impacted systems to continue functioning, or rebuilding compromised systems to ensure safe performance.
Eradication means removing malware from impacted systems and identifying the root cause behind the breach. It also involves terminating malicious executions and blocking unauthorized processes throughout the network.
This step can’t be completed if the first three steps were not carried out effectively. If the incident response team doesn't have enough visibility into the organization’s IT infrastructure, it might overlook a compromised credential or device and fail to fully remove threat actors from the network.
This is when the incident response team brings impacted production systems back online. The SANS framework recommends doing this in gradual, distinct phases. This reduces the risk of making the incident worse by bringing compromised or misconfigured systems online directly.
The recovery process includes testing affected systems to make sure they are operating normally. It offers guidance on the technical metrics security teams should use when analyzing post-incident system behavior.
No more than two weeks after the incident, the team should compile all the information about that incident into an after-action report. It should provide complete documentation about the incident, including the steps that led to the original breach and recommendations for improving operational security.
The best after-action reports include comparison benchmarks with metrics derived from past incidents faced by the same team. Team members, stakeholders, and users may have valuable suggestions for preventing similar breaches in the future.
NIST and SANS are the most popular incident response frameworks in the United States, but they are not the only ones. Your organization may decide to structure its response procedures on other frameworks, or mix and match requirement criteria from multiple frameworks.
Other incident response frameworks you should be familiar with include:
Regardless of the specific incident response framework you choose, standardizing your approach to security operations is an excellent way to ensure positive outcomes consistently. The structure provided by these frameworks allows security practitioners to work faster and more confidently in uncertain scenarios where every second counts.
Implementing a well-documented incident response strategy reduces uncertainty and mitigates the risk associated with known and unknown threats. Building incident response playbooks around an industry-standard framework empowers security teams to safeguard network assets and prevent catastrophic breaches effectively.
Discover how Lumifi’s people, processes, and technology can help you scale your incident response capabilities to meet the demands of a challenging threat landscape. Talk to an expert about enhancing your security capabilities today.
We’ve expanded our MDR capabilities with enhanced incident response and security services to better protect against evolving cyber threats.