Skip to content

Latest commit

 

History

History
215 lines (188 loc) · 14.3 KB

File metadata and controls

215 lines (188 loc) · 14.3 KB

The Identify phase is the first critical step in the Incident Response (IR) process. The main purpose of this phase is to recognize that an incident has occurred, to define its nature and scope, and to initiate the incident response process.

Although time is of the esssence, it is critical that before we Declare an incident, we identify the severity and impact of a security event. This section describes the best practices for building an effective Cyber Defense team, to ensure you are correctly monitoring the correct things in your environment to quickly detect events as they occur in your environment.

In the Identify phase, organizations look for anomalies or suspicious activity that could indicate a security incident. This could include alerts from security systems, reports from users, unexpected system behavior, or results from regular security audits or checks. Being able to fully understand the scope of a security incident, we need evidence to review. When did this happen? How long ago? How many systems are impacted? Was anything exfiltrated/destroyed? Who did this?. All of these can be answered with an Awesome Logging strategy. The following is a good starting point of systems that should be logged, and logs should be located on a separate system and retained for at least 90 days.

A successful Identify phase involves the following steps:

Detection: This involves recognizing potential security events. Detection can happen in several ways, such as through alerts from security systems (like intrusion detection systems or firewalls), abnormal system behavior (like a sudden increase in network traffic), or reports from users or third parties.

Reporting: Any suspected incidents should be promptly reported. The reporting mechanism can vary from one organization to another but often involves sending an alert or report to the IT department or the incident response team.

Assessment: After a potential incident has been detected and reported, it needs to be assessed to confirm whether it's a real security incident. This may involve analyzing system logs, network traffic, or other evidence.

To do the Identify phase well, organizations should:

Have detection mechanisms in place: This might include security systems like intrusion detection systems, antivirus software, and firewalls, but also measures to monitor system behavior and network traffic.

Train staff to recognize and report incidents: All staff members, not just those in IT, should be trained to recognize potential security incidents and to report them promptly.

Implement regular security checks and audits: Regular security checks and audits can help identify potential security incidents that might not be detected through other means.

Have a clear reporting process: It should be clear to all staff how to report potential security incidents, and there should be clear channels for doing so.

Assess potential incidents promptly and thoroughly: When potential incidents are reported, they should be assessed quickly and thoroughly to determine if they're actual security incidents. This might involve analyzing system logs, network traffic, or other available evidence.

https://github.com/stuhli/awesome-event-ids

Authentication (Active Directory, Identity Providers, Application, CASB, etc.)

If a user logs into it, you should have that log. Luckily for us, most of the authentication systems do a pretty good job of this. But at a minimum, you should be able to answer these questions:

  • Tell me every system that USERX has logged into over XXX Timeframe
  • Where did USERX login from?

Firewalls

Proxy / Webfiltering Solutions (DNS)

Security Tools (IDS/IPS, DLP, Zeek, etc.)

VPN Connections

Anti-Malware / EDR

Endpoint Command Line (Often overlooked, but is a GOLDMINE for Awesome Incident Response)

DHCP

Email Filtering / Spam Filtering

Webservers / Application servers

Servers (Cloud and On-prem)

From: Top 5 Log Sources You Should Be Ingesting but Probably Arn't

The prioritization of which often-overlooked log sources to ingest depends on many factors, so we’ve listed the below items alphabetically, rather than ranking in order of importance. As a leading IT security provider, ReliaQuest works with enterprise organizations to develop and prioritize these and other processes to ensure consistent security, recognizing there is no effective one-size-fits-all approach.

  1. CLOUD PLATFORM LOGS More and more enterprises are turning to cloud providers such as Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP), or cloud services provided by Salesforce, Dropbox or Office 365 to house their data and applications. Unfortunately, many of these cloud platforms do not have consistent logging formats and require different parsers or methods of logging the events from the various applications contained on the platform. Building these parsers to scale to the number of events is a challenge for most security and analytics teams — but much like web applications, effectively pre-filtering the data before ingesting will prevent overwhelming your SIEM or logging tool by only handling the actionable events. While typically not an all-encompassing enterprise platform, Cloud Application Security Broker (CASB) solutions provide granular auditing capabilities at the application or service level and need to have the same logging and monitoring considerations as the full cloud platforms. CASB solutions are essential for incident response and forensic investigations since monitoring and alerting on unauthorized access to cloud services is often critical to detecting potential insider threats. Important items to watch to ensure visibility for cloud services and platforms are: • Administrative log ins to console portals • Remote user access and actions to sensitive data folders or storage buckets • Underlying cloud infrastructure changes such as instance creation/deletion or routing/access changes • Platform user or role permission changes • Unauthorized cloud application usage, i.e. Dropbox or file-sharing sites • Office 365 users emailing attachments to external email providers • Cloud-based DLP application alerts for sensitive content or files containing personally identifiable information (PII) CASB solutions are essential for incident response and forensic investigations since monitoring and alerting on unauthorized access to cloud services is often critical to detecting potential insider threats. whose program was not developed in house, it may be difficult to have third-party developers change the format or add additional fields to the log message because it may not be included in the statement of work or could incur additional development costs.
  2. DATABASE LOGS Database auditing and logging poses a challenge for most enterprises, as database administrators often avoid enabling any feature that could potentially affect server performance—rightfully so—and enabled auditing typically results in adverse performance. Auditing individual databases and tables is also very difficult given the large number of database servers present in a normal enterprise environment. Security teams may also struggle to gain access and visibility into operations occurring in databases created by third parties that may have placed restrictions on viewing the data or table structures. For sufficient visibility into these databases without enabling auditing functions on the database tables, consider one of the following options:
  3. If Database Activity Monitoring (DAM) is present, ingest and correlate built-in rules and alerts into the SIEM, since it performs many of the same restrictive functions as a firewall or web application firewall (WAF). OR
  4. Create stored procedures that watch for specific actions. For example, build a script that watches for unencrypted PII stored in a field every 30 minutes, and write an event log with the record ID, date and time of the violating record entry to trigger an alert. These scripts are usually very low impact and can look for very specific scenarios, unlike the all-or-nothing approach for table auditing. Important scenarios to watch for with any collection method include: • System Administrator (SA) other administrative log ins • Connections from unauthorized hosts and users (servers typically are only accessed by specific service accounts and not directly by users) • Authorization failures • Built-in scripts or functions that perform or enable direct Operating System actions • Unauthorized server startup/shutdown commands • DDL, DML, or DCL schema operations • Queries returning or modifying abnormally large numbers of records • Unauthorized commands such as INSERT, UPDATE or DELETE into lookup or administrative tables
  5. DOMAIN NAME SYSTEM (DNS) LOGS Logs from DNS servers provide a wealth of information about what sites users visit and show if any malicious applications reach out to command and control sites. DNS has also been successfully used as a tunneling protocol for exfiltrating data since firewalls typically allow it out. These logs are challenging because of the volume of data, the traditionally difficult way to export them, and their multi-line format. DNS has also been successfully used as a tunneling protocol for exfiltrating data since firewalls typically allow it out. Consider using Microsoft’s new Analytical Event Logging method, which uses a more standard logging format, instead of the old method of turning on debugging and importing the flat file. The new Analytical logs have major performance gains over the debug method, and the events are stored in the common Windows Event Log format. Useful events to watch from a security standpoint include: • DNS queries made using transmission control protocol (TCP) rather than the common user datagram protocol (UDP) • Any non-standard record types such as TXT, or responses that contain large amounts of nonsense characters • DNS queries either to non-standard ports other than port 53, or requests at strange times when a typical user would not be browsing • Requests from Internal RFC 1918 IP addresses not on the company domain • Zone transfers to unauthorized DNS servers • Requests to uncommon country extensions such as .ru (Russia) or .cn (China), especially if you do not conduct business in those countries • Substantial amounts of lookup failures • Long or random hostname queries sent to the same or small set of domain addresses • Requests for unique hostnames that aren’t commonly requested (i.e. other than the Top Alexa list) or that are very young from a registration standpoint
  6. PHYSICAL SECURITY LOGS Obtaining event logs from physical security applications such as camera systems, biometric/card access readers, or alarm systems is extremely valuable for cases involving insider threat. Combining these events with other evidence correlated from servers, workstations, firewalls, VPN or remote access devices is essential to demonstrate a person’s presence at the time of violation or whether their credentials were stolen. One of the biggest challenges in obtaining these types of logs is the separation between the physical security team and IT security team. These two teams rarely work together because enterprises often outsource physical security personnel monitoring these systems, and most access control systems are on a closed legacy system. However, it’s not impossible to ingest logs from these systems and efforts should focus on the following types of events: • Remote log in with corresponding badge entries • Unauthorized physical access to remote, unmanned facilities • Audit of authorized employees accessing potentially unauthorized areas of the company • Excessive biometric or card failures • Visitor/contractor access to unauthorized areas • After-hours alarm triggers or excessive open-door time alerts One of the biggest challenges in obtaining these types of logs is the separation between the physical security team and IT security team.
  7. WEB SERVER LOGS According to vulnerability and exploit-tracking efforts such as the Verizon Data Breach Investigations Report (DBIR), the highest percentage of breaches trace back to holes in public-facing web applications — typically the log sources teams have the least visibility into. Web applications often have access to highly sensitive customer account information and should top everyone’s to-monitor list, but high visitor volume of an average e-commerce site can make dealing with these logs unwieldy. Parsing web server logs is challenging as well because they are often in a multi-line or custom format, and possibly logged in a non-standard way to a text file or database as opposed to the native web server log, such as Internet Information Services (IIS) or Apache. If using standard web server logs, be sure to enable all the relevant fields since the default World Wide Web Consortium (W3C) layout in IIS doesn’t capture some critical elements, such as page size and cookie values. By using extensive filtering before ingesting into the SIEM or logging tool, IT teams can exclude requests for static images or style content and reduce non-actionable events by up to 90 percent. Logging events from a WAF could also possibly achieve the same result without ingesting the raw server/application logs since it already watches for potentially malicious actions. Other scenarios that benefit from alerts or anomaly reporting include: • Excessive 500 or 404 request status errors • Successful 200 request status on unauthorized file extensions (.zip, .inc, .txt, etc.) or extremely low-usage files • Very long requests that could indicate buffer overflow attempts • Known injection (SQL, CSRF, etc.) patterns contained in the query string parameter • Unusually high page load times or page size • Access to administrative portals outside of regular business hours • Abnormal or blank User Agent values • Page requests by IP addresses instead of the domain name • Requests for known web shells • Base64 or other encoded data in the requested URL that could indicate an exfiltration attempt • Invalid or uncommon referrers or page request methods (POST vs. Get, TRACE, etc.