What are the goals of incident response?

LAST EDITED:
PUBLISHED:
25/1/2022

Incident response (IR) is the systematic approach to managing a cyber security incident. The primary objective of IR is to minimize the impact of a cyber attack, offer rapid recovery, and limit business interruption loss for organizations.

Incident response (IR) is the systematic approach to managing a cyber security incident. The primary objective of IR is to minimize the impact of a cyber attack, offer rapid recovery, and limit business interruption loss for organizations.

Incident response is carried out by specialists—via an in-house security operations unit or an outsourced incident response firm like Blackpanda—in the event of a cyber breach.

Experts like our incident response specialists are trained to handle various types of security incidents, cyber threats, and data breaches. The main goals of an incident response methodology are to identify, contain, eradicate, and minimize the duration and cost of a cyber breach.

What are the governing frameworks of incident response?

Thought leaders in the field of cyber security have established frameworks that serve as industry standard reference points to guide incident responders in the event of a cyber breach.

These frameworks include:

  1. The National Institute of Standards and Technology ( NIST) framework
  2. The System Admin, Audit, Network and Security (SANS) framework
  3. The Observe, Orient, Decide, Act (OODA) loop

While each framework of reference has different terminology, it serves to address the same fundamental goal of incident response—respond rapidly, limit/eradicate the threat, and minimize business interruption loss. 

First and foremost, it is important to determine whether a true breach or incident has occured, or if it was a false positive, and document it accordingly. Then it is crucial to identify the causes of the incident and minimize the impact of future incidents. Finally, the incident response team should guide the organization in applying lessons learned to improve the process.

Improving an organization’s security posture and ensuring thorough incident response planning is at the crux of all incident response frameworks. Whilst prosecuting illegal activity is never explicitly mentioned but always included in the considerations for remediation, as well as keeping management, staff and appropriate clients informed of the situation and response.

The NIST framework

The NIST Institute cyber security framework identifies five core functions of incident response:

  1. Identify: This includes identifying physical and software assets, the organization’s business environment, established cybersecurity policies, asset vulnerabilities, threats to internal and external organizational resources, and risk response activities to assess risk. 
  2. Protect: This includes implementing protections for Identity Management and Access Control, empowering staff through security awareness training including role based and privileged user training. It also involves establishing data security protection best practices and implementing processes and procedures to maintain and manage the protections of information systems and assets.
  3. Detect: Detecting potential cyber security incidents early is critical. This step has aims to ensure  anomalies and events are detected , with their potential impact understood.
  4. Respond: This step centers around the implementation and execution of the  incident response plan in a  swift manner, while managing communications with internal and external stakeholders during and after an event. Further, continuous analysis of the incident as it develops is crucial to ensure effective response and supporting recovery activities. These include forensic analysis, incident impact determination, and mitigation. 
  5. Recover: Recovery is the ultimate goal of incident response. It includes implementing improvements based on lessons learned and reviews of existing strategies, and coordinating with internal and external communications to restore business as usual.

The SANS framework

The SANS Institute delineates six phases that must be included in an incident response plan:

  1. Preparation: Training and equipping the IR team and all involved individuals to manage cybersecurity incidents when they arise. Deploying monitoring tools and drafting IR plans are examples of preparation.
  2. Identification: Determining and qualifying whether a particular event can be considered a security incident, and identifying the full scope of systems, devices, and endpoints involved.
  3. Containment: Containing the incident across all systems in scope, and limiting the damage to prevent data loss and destruction of evidence.
  4. Eradication: Identifying the root cause of the attack and mitigating the impact to the affected systems, either by removing or patching affected endpoints.
  5. Recovery: Following the removal of corrupted elements, this phase ensures that affected systems are safely brought back to the operational environment and no threat remains.
  6. Lessons Learned: The last but most critical phase includes completing all documentation requirements from all actions taken during the incident, conducting analysis and assessment of the response efforts to provide recommendations for the future.

The OODA framework

Lastly, the OODA (Observe, Orient, Decide, and Act) loop was developed by the US Air Force military strategist John Boyd. The OODA loop is often seen applied to cyber incident response in order to tackle incident handling in a real-time environment. 

  1. Observe: Continuous security monitoring helps in identifying abnormal network/system behavior. The observation goal is fulfilled through log analysis, SIEM and IDS alerts, network monitoring, vulnerability analysis, service/application performance monitoring.
  2. Orient: This focuses on the evaluation of the cyber threat landscape of the organization through incident triage, threat intelligence, awareness regarding the current situation, and security research.
  3. Decide: Based on observations and context, deciding an action plan that offers minimal downtime and fastest system recovery is a fundamental goal of rapid incident response.
  4. Act: Thanks to forensic analysis tools, system backup, data recovery tools, security awareness training tools and programs, patch management, the incident response team should carry out remediation, recovery, and document lessons learned for future use.

_ _

While no one framework is deemed better than the other, they all share the same fundamental goal of eradicating a cyber threat and restoring business operations as quickly as possible. Your incident response provider must be able to walk you through the steps of incident response prior to or simultaneous to responding to an incident. These steps are calculated and follow a strict process to ensure incidents are handled properly. 

Blackpanda responders are trained and certified to use the aforementioned methodologies to respond to cyber crises in a timely and swift manner, while providing timely updates to all parties involved.  Pre-breach playbook development is a key step to expediting response and minimizing panic in the event of an incident. Reach out to us for further information on our Incident Response services and pre-breach prevention measures.

Sign Up to Our Newsletter

Our weekly Asia Cyber Summary is a snappy, non-technical overview of regional cyber security news that helps you stay informed. Test it today, you can always unsubscribe.