Forensic Chapter 2 - Post-Incident Activities
1. Terminology
Containment | Limiting the extent of the incident and preventing it from spreading or causing further damage to the organization. It’s about isolating affected systems to ensure the incident doesn’t escalate. |
---|---|
Eradication | The process of removing the threat from the organization’s environment. This includes identifying and eliminating the root cause of the incident. |
Recovery | The process of restoring and returning affected systems and devices back to their fully operational states. It includes ensuring that no threats remain and verifying the integrity of the systems. |
2. Containment Strategy
- Potential damage
- Need for evidence preservation
- Service availability
- Time and resource
- Effectiveness of the strategy
- Duration of the solution
Sample: Honey Pot
3. Evidence Gathering
- Use Pre-defined templates
- Keep incident response system isolated form affected network and system.
- Reconcile the evidences
- Identify missteps
- Idnetify attacking hosts
4. Eradication
- Undoing Threat actors’ actions
- Restoring to known good state
- Removing Threat actors’prsence & backdoors
- Performing security testing
- Dealing with unauthorised transactions
- Revoking and renewing access credentials
5. Post-Incident Activity
Often most under-rated activity in the lifecycle
- Identify lesson learnt
- Data collection during incidents
- Evidence retention
- Incident handling checklist