<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Incident Response Checklist in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/19789#M933</link>
    <description>&lt;P&gt;A couple of good resources:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Blue Team Handbook.&amp;nbsp; Can get off Amazon.&amp;nbsp; You'll want vol1, as vol2 is about SOCs.&amp;nbsp; Website for it&amp;nbsp;&lt;A href="http://www.blueteamhandbook.com/" target="_blank" rel="noopener"&gt;http://www.blueteamhandbook.com/&amp;nbsp;&amp;nbsp;&lt;/A&gt;(hope this link works)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From NIST, the&amp;nbsp;Computer Security Incident Handling Guide, SP800-61R2, which you can find here:&amp;nbsp; &lt;A href="https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final" target="_blank" rel="noopener"&gt;https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final&amp;nbsp;&lt;/A&gt; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The BTH may be more useful.&amp;nbsp; Gives checklists and the like for the 6 steps of incident response from SANS and most other groups.&amp;nbsp; NIST basically compresses three of the steps as 1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 05 Mar 2019 19:02:50 GMT</pubDate>
    <dc:creator>emb021</dc:creator>
    <dc:date>2019-03-05T19:02:50Z</dc:date>
    <item>
      <title>Incident Response Checklist</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/19774#M931</link>
      <description>&lt;P&gt;I was wondering if anyone had a good security incident checklist they would be willing to share? I am a one person shop where I work and assistance would be greatly appreciated. Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:07:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/19774#M931</guid>
      <dc:creator>lmsaeb</dc:creator>
      <dc:date>2023-10-09T09:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: Incident Response Checklist</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/19781#M932</link>
      <description>&amp;gt; lmsaeb (Newcomer I) posted a new topic in Tech Talk on 03-05-2019 11:04 AM in&lt;BR /&gt;&lt;BR /&gt;&amp;gt; I was wondering if anyone had a good security incident checklist they would be&lt;BR /&gt;&amp;gt; willing to share? I am a one person shop where I work and assistance would be&lt;BR /&gt;&amp;gt; greatly appreciated.&lt;BR /&gt;&lt;BR /&gt;The Vancouver Chapter/Vancouver Security SIG was once asked to draw up one&lt;BR /&gt;such. We worked on it for some time before determining that we simply could not&lt;BR /&gt;cover all possible contigencies.&lt;BR /&gt;&lt;BR /&gt;(I *do* have a one-page incident response *planning* chart that I use as a&lt;BR /&gt;handout for a seminar on the subject ...)&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;When cryptography is outlawed, bayl bhgynjf jvyy unir rapelcgvba.&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;</description>
      <pubDate>Tue, 05 Mar 2019 17:42:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/19781#M932</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-03-05T17:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: Incident Response Checklist</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/19789#M933</link>
      <description>&lt;P&gt;A couple of good resources:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Blue Team Handbook.&amp;nbsp; Can get off Amazon.&amp;nbsp; You'll want vol1, as vol2 is about SOCs.&amp;nbsp; Website for it&amp;nbsp;&lt;A href="http://www.blueteamhandbook.com/" target="_blank" rel="noopener"&gt;http://www.blueteamhandbook.com/&amp;nbsp;&amp;nbsp;&lt;/A&gt;(hope this link works)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From NIST, the&amp;nbsp;Computer Security Incident Handling Guide, SP800-61R2, which you can find here:&amp;nbsp; &lt;A href="https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final" target="_blank" rel="noopener"&gt;https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final&amp;nbsp;&lt;/A&gt; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The BTH may be more useful.&amp;nbsp; Gives checklists and the like for the 6 steps of incident response from SANS and most other groups.&amp;nbsp; NIST basically compresses three of the steps as 1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2019 19:02:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/19789#M933</guid>
      <dc:creator>emb021</dc:creator>
      <dc:date>2019-03-05T19:02:50Z</dc:date>
    </item>
    <item>
      <title>Re: Incident Response Checklist</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/20249#M1006</link>
      <description>&lt;P&gt;Thank you.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 13:17:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/20249#M1006</guid>
      <dc:creator>lmsaeb</dc:creator>
      <dc:date>2019-03-19T13:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: Incident Response Checklist</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/20250#M1007</link>
      <description>&lt;P&gt;Thanks. I ordered the book.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 13:18:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/20250#M1007</guid>
      <dc:creator>lmsaeb</dc:creator>
      <dc:date>2019-03-19T13:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: Incident Response Checklist</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/35214#M2627</link>
      <description>&lt;P&gt;I created a checklist using a randomware attack vector that i can share.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2020 17:17:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/35214#M2627</guid>
      <dc:creator>DLegault</dc:creator>
      <dc:date>2020-04-30T17:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: Incident Response Checklist</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/36766#M2810</link>
      <description>&lt;P&gt;Hi DLegault,&lt;/P&gt;&lt;P&gt;Yes, I would be interested in a Ransonware attack IR checklist. Would appreciate if you can share it, if you don't mind. Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jun 2020 07:54:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/36766#M2810</guid>
      <dc:creator>Gijs</dc:creator>
      <dc:date>2020-06-26T07:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: Incident Response Checklist</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/36780#M2812</link>
      <description>&amp;gt; Gijs (Viewer III) posted a new reply in Tech Talk on 06-26-2020 03:54 AM in the&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Yes, I would be interested in a Ransonware attack IR checklist.&lt;BR /&gt;&lt;BR /&gt;Incident Response Checklist for Ransomware:&lt;BR /&gt;&lt;BR /&gt;1) Make a backup.&lt;BR /&gt;2) Make multiple types of backup.&lt;BR /&gt;3) Check your backups occasionally.&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;La madre degli imbecilli e' sempre incinta.&lt;BR /&gt;The moron's mother is always pregnant.&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413" target="_blank"&gt;https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413&lt;/A&gt;</description>
      <pubDate>Fri, 26 Jun 2020 17:09:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/36780#M2812</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2020-06-26T17:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: Incident Response Checklist</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/36795#M2815</link>
      <description>&lt;P&gt;Over a year ago Lisa&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1642177997"&gt;@lmsaeb&lt;/a&gt;&amp;nbsp;asked, "&lt;SPAN&gt;I was wondering if anyone had a good security incident checklist they would be willing to share? I am a one person shop where I work and assistance would be greatly appreciated. Thanks."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I apologize for being late to the party, but reviewing the responses I saw a very important resource missing.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;Be sure to mine the resources of both SANS&amp;nbsp;&lt;A href="https://www.sans.org/" target="_blank"&gt;https://www.sans.org/&lt;/A&gt;&amp;nbsp; and the SANS Technology Institute&amp;nbsp;&lt;A href="https://www.sans.edu/" target="_blank"&gt;https://www.sans.edu/&lt;/A&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Search the following resources for "incident response."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.sans.org/reading-room/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;SANS Reading Room&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.sans.org/information-security-policy/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;SANS Security Policy Templates&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.sans.edu/cyber-research/white-papers" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;SANS Technology Institute Cybersecurity Research Papers&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Craig&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jun 2020 14:34:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/36795#M2815</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2020-06-27T14:34:22Z</dc:date>
    </item>
    <item>
      <title>Re: Incident Response Checklist</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/36863#M2818</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp;wrote:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;Incident Response Checklist for Ransomware:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;1) Make a backup.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;2) Make multiple types of backup.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;3) Check your backups occasionally.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Rob's list is how one mitigates risk regarding ransomware.&amp;nbsp; To it, I would add:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;You will need backups that were made prior to infection. Understand the difference between off-line backups, on-line backups and synchronization. Also, understand how your synchronization provider does snapshots (&lt;A href="https://support.microsoft.com/en-us/office/restore-your-onedrive-fa231298-759d-41cf-bcd0-25ac53eb8a15" target="_blank" rel="noopener"&gt;example&lt;/A&gt;).&lt;/LI&gt;&lt;LI&gt;Design processes so you can recreate data that is younger than the most recent backup (or three).&amp;nbsp; For example, if you are in the payment processing business, you might keep the remittance stubs for a week before throwing them out.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Document RPO for everything.&amp;nbsp; If you can only afford to lose 2 hours of work, you need to back up at least every 2 hours, which can be expensive.&amp;nbsp; The generic "I can't afford to lose anything" is even more expensive.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Document RTO and business impact for everything. Prior to its detection/containment, malware tends to impact multiple services.&amp;nbsp; You will need to triage.&lt;/LI&gt;&lt;LI&gt;Leverage standard system images and data backup/recovery/sync in your daily life (e.g. PC refresh). Once restoring a PC to "yesterday" becomes a non-event, incident response procedures naturally mature.&lt;/LI&gt;&lt;LI&gt;Understand how to horizontally scale recovery efforts to not be dependent on one smart person or a single "tape drive".&lt;/LI&gt;&lt;LI&gt;Practice (tabletop and parallel recovery) so that when&amp;nbsp;the rubber hits the road, you can respond instead of react/panic.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;The corresponding incident response is pretty much the same as any malware:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Stop the spread. Isolate impacted machines.&amp;nbsp; Consider increased prophylactic actions to protect at-risk critical machines.&lt;/LI&gt;&lt;LI&gt;Prevent future infection. Understand what you missed (e.g. how the malware works, what patches might be missing; what you are failing to ingress filter, etc) and fix it.&amp;nbsp; Force password changes on any impacted accounts.&lt;/LI&gt;&lt;LI&gt;Clean the mess.&amp;nbsp; There may be recovery scripts for well-known infections, but re-imaging infected machines is the only way to be "sure", and even then it may not get boot-loader malware.&lt;/LI&gt;&lt;LI&gt;Restore corporate data from backup.&lt;/LI&gt;&lt;LI&gt;Recollect everything you did not backup.&lt;/LI&gt;&lt;LI&gt;Live without that which you can not recollect.&lt;/LI&gt;&lt;LI&gt;If recollection is insufficient, polish your resume and reflect on the value of backups.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Additional items that should be considered:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;The trolls got in somehow and compromised your machines.&amp;nbsp; Was there any hidden damage, persistence or exfiltration?&amp;nbsp; Can you prove it?&lt;/LI&gt;&lt;LI&gt;If there is evidential value in the compromised equipment, you might need to recover onto new hardware.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Involve legal early to understand any contractual and legal notification requirements.&lt;/LI&gt;&lt;LI&gt;Involve public-relations early to understand how to meet/manage customer expectations as you recover.&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Tue, 30 Jun 2020 17:55:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/36863#M2818</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2020-06-30T17:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: Incident Response Checklist</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/50866#M3476</link>
      <description>&lt;P&gt;If it helps, I don't mind sharing (of course after removing everything that's confidential to my organization) the Incident Response Checklist that I specifically built for when a Ransomware attack is observed on the network. It has been tested, reviewed and vetted by large consulting firms.&lt;/P&gt;</description>
      <pubDate>Fri, 06 May 2022 15:49:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/50866#M3476</guid>
      <dc:creator>crycos</dc:creator>
      <dc:date>2022-05-06T15:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: Incident Response Checklist</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/50873#M3477</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1278275435"&gt;@crycos&lt;/a&gt;Great Idea, everyone could certainly appreciate your check list, and experience.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sat, 07 May 2022 05:52:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Incident-Response-Checklist/m-p/50873#M3477</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2022-05-07T05:52:05Z</dc:date>
    </item>
  </channel>
</rss>

