Friday, May 2, 2008

[ISN] ITL Bulletin for March 2008


Forwarded from: Elizabeth Lennon <elizabeth.lennon (at) nist.gov>

ITL BULLETIN FOR MARCH 2008

HANDLING COMPUTER SECURITY INCIDENTS: NIST ISSUES
UPDATED GUIDELINES

Shirley Radack, Editor
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
U.S. Department of Commerce

Today, organizations that operate and manage information technology (IT)
systems are spending more time than ever before in responding to
security incidents. New incidents and threats that arise daily have the
potential to seriously damage and disrupt the security of the
organizationÂ's information and IT systems.

Security incidents are violations or threats of violation of the
organizationÂ's computer security policies, acceptable use policies, or
standard computer security practices. Organizations should consider
carefully their ability to handle these security incidents and threats
effectively when they plan, develop, and implement their IT security
programs.

Applying risk management procedures, organizations should identify and
assess the risks of security incidents and identify effective ways to
deal with them. The first approach is to prevent security incidents
whenever possible. But since not all incidents can be prevented,
organizations should take steps to establish an incident response
capability for rapidly detecting incidents, minimizing loss and
destruction, identifying any weaknesses in their systems that may have
been exploited, and restoring IT services. This is a complex
undertaking, requiring considerable planning and the commitment of
resources to carry out the plans.

Intrusion detection and prevention systems (IDPSs) and other mechanisms
can be used to monitor threats. Clear procedures are needed to assess
the current and potential impact of incidents and to implement effective
methods for collecting, analyzing, and reporting data. Specific
communication channels should be established with internal groups, such
as human resources and legal staffs, and with external groups, such as
law enforcement, the media, and other incident response teams.

Security Threats to IT Systems

The many security-related threats that organizations must address
include:

- Denial of Service (DoS)­an attack that prevents or impairs the
authorized use of networks, systems, or applications by exhausting
resources.

- Malicious Code­a virus, worm, Trojan horse, or other code-based
malicious entity that successfully infects a host.

- Unauthorized Access­a person gains logical or physical access without
permission to a network, system, application, data, or other IT
resource.

- Inappropriate Usage­a person violates acceptable use of any network
or computer policies.

- Multiple Component­a single incident that encompasses two or more
incidents; for example, a malicious code infection leads to
unauthorized access to a host, which is then used to gain unauthorized
access to additional hosts.

Updated Guide on Handling Security Incidents

NISTÂ's Information Technology Laboratory recently issued NIST Special
Publication (SP) 800-61 Revision 1, Computer Security Incident Handling
Guide: Recommendations of the National Institute of Standards and
Technology. Written by Karen Scarfone and Tim Grance of NIST and by
Kelly Masone of Booz Allen Hamilton, NIST SP 800-61 Revision 1 provides
practical guidance to help organizations establish an effective incident
response program, analyze and respond to information security incidents,
and reduce the risks of future incidents. The recommendations in the
guide are useful for those organizations that are just setting up their
incident handling teams, as well as those that have already done so.

The updated guide, which replaces NIST SP 800-61, Computer Security
Incident Handling Guide, focuses primarily on the procedures and
solutions for detecting, analyzing, prioritizing, and handling
incidents. The guidelines and recommended solutions can be used on many
different hardware platforms, operating systems, protocols, or
applications and can be tailored to meet the specific security and
mission requirements of different organizations.

NIST SP 800-61 Revision 1 provides in-depth information on the need for
incident response capabilities. It covers the structures of incident
response teams and discusses the other groups within an organization
that might participate in incident handling activities. The basic steps
of handling incidents effectively, including incident detection,
analysis, containment, eradication, and recovery, are presented.
Separate sections in the guide provide specific recommendations for
handling the five types of incidents: denial of service (DoS), malicious
code, unauthorized access, inappropriate usage, and multiple component
incidents. All of these incidents are defined, and examples of each are
given. The preparation, detection, analysis, containment, eradication,
and recovery steps for each type of incident are detailed. Checklists
for handling each of the five types of incidents are included.

The appendices bring together useful information sources that assist
organizations in their incident handling programs. Included are a
consolidated list of the recommendations that are discussed in the
guide, incident response scenarios, and questions for use in incident
response exercises. Also provided are suggested items of information to
be collected about each incident, a glossary, an acronym list, lists of
in-print resources, online tools, and other resources that help
organizations in planning and performing incident response activities.
In addition, the appendices present frequently asked questions about
incident response activities and the steps to be followed in incident
handling. The final section of the appendices contains incident
reporting guidelines for federal agencies from the United States
Computer Emergency Readiness Team (US-CERT) in the Department of
Homeland Security.

This ITL bulletin summarizes the updated guide, which is available at:

http://csrc.nist.gov/publications/PubsSPs.html.

Basics of Incident Handling

Organizations face major decisions and actions when they develop their
computer security incident response capabilities (CSIRC). One of the
first considerations should be to create an organization-specific
definition of the term Â"incidentÂ" so that the scope of the term is
clear. The organization should decide what services the incident
response team should provide, consider which team structures and models
can provide those services, and select and implement one or more
incident response teams. An incident response plan, and associated
policies and procedures, should be developed when a team is established
so that the incident response process is performed effectively,
efficiently, and consistently. The plan, policies, and procedures should
identify the teamÂ's interactions with other teams within the
organization as well as with external parties.

The incident response process is composed of several phases. The initial
phase involves establishing and training an incident response team, and
acquiring the necessary tools and resources to enable the team to carry
out its responsibilities. During this preparation activity, the
organization also attempts to limit the number of incidents that will
occur by selecting and implementing a set of controls based on the
results of risk assessments. However, residual risk will inevitably
persist after controls are implemented, and no control is foolproof.

The next phase is detection and analysis of security breaches, which
alerts the organization whenever incidents occur. A
containment/eradication/recovery phase follows. Depending upon the
severity of the incident, the organization can act to mitigate the
impact of the incident by containing it and ultimately recovering from
it. After the incident is adequately handled, the organization issues a
report that details the cause and cost of the incident and the steps the
organization should take to prevent future incidents. This last phase is
post-incident activity.

The organizationÂ's incident response team should be available for
contact by anyone who discovers or suspects that an incident involving
the organization has occurred. One or more team members, depending on
the magnitude of the incident and availability of personnel, should
handle the incident. The incident handlers analyze the incident data,
determine the impact of the incident, and act appropriately to limit the
damage to the organization and restore normal services. Although the
incident response team may have only a few members, the teamÂ's success
depends on the participation and cooperation of individuals throughout
the organization.

NIST Recommendations for Handling Security Incidents

NIST advises that organizations implement the following recommendations
in planning and developing their incident response capabilities:

Establish and operate a formal incident response capability.

Federal agencies and departments are specifically directed to establish
incident response capabilities under the Federal Information Security
Management Act (FISMA) of 2002. Federal organizations are required to
develop and implement procedures for detecting, reporting, and
responding to security incidents. Federal civilian agencies are
responsible for designating a primary and secondary point of contact
(POC) to report all incidents to the United States Computer Emergency
Readiness Team (US-CERT) and for documenting corrective actions that
have been taken and their impact. Each agency is responsible for
determining specific ways in which these requirements are to be met.

Also, policy guidance issued by the Office of Management and Budget
(OMB) requires that agencies have a capability to provide help to users
when security incidents occur in their systems and to share information
concerning common vulnerabilities and threats (OMB Circular No. A-130,
Appendix III). OMB Memorandum M-07-16, Safeguarding Against and
Responding to the Breach of Personally Identifiable Information,
provides guidance on reporting security incidents that involve
personally identifiable information.

Federal Information Processing Standard (FIPS) 200, Minimum Security
Requirements for Federal Information and Information Systems, specifies
minimum security requirements for federal information and information
systems, including incident response. The specific requirements for the
implementation of security controls are defined in NIST SP 800-53,
Recommended Security Controls for Federal Information Systems.

Organizations should take the following steps in establishing an
incident response capability:

- Create an incident response policy and plan;

- Develop procedures for performing incident handling and reporting,
based on the incident response policy;

- Set guidelines for communicating with outside parties regarding
incidents.

- Select a team structure and staffing model;

- Establish relationships between the incident response team and other
groups, both internal to and external to the organization;

- Determine the services that the incident response team should provide;
and

- Staff the incident response team and provide staff members with
appropriate training.

Reduce the frequency of incidents by effectively securing networks,
systems, and applications.

It is less costly and more effective to prevent incidents than to try to
fix the problems that occur when security controls are inadequate. Many
security incidents can overwhelm the resources and capacity of the
organization to respond, and can result in delayed or incomplete
recovery. Extensive damage may occur, and systems and information may
not be available for long periods. When the security of networks,
systems, and applications is effectively protected and maintained, the
incident response team can focus on handling serious problems.

Document the organizationÂ's guidelines for interactions with other
organizations regarding incidents.

Clear procedures should be established to guide incident handling team
members who may need to communicate with outside parties, including
other incident response teams, law enforcement, the media, vendors, and
external victims. These communications often must occur quickly, and
guidelines are needed so that only the appropriate information is shared
with the right parties. The inappropriate release of sensitive
information can lead to greater disruption and financial loss than the
incident itself. Creating and maintaining a list of internal and
external POCs, along with backups for each contact, can help
organizations to make the communications among the involved parties
easier and faster.

Emphasize the importance of incident detection and analysis throughout
the organization.

Organizations might experience thousands or millions of possible
indications of security incidents each day. These incidents are recorded
mainly by logging and computer security software. Centralized logging
and event correlation software can be effective in automating the
initial analysis of the voluminous data that is collected and in
selecting the events of interest that require human review. To assure
the quality of the data collected, organizations should establish
logging standards and procedures that facilitate the collection of
adequate information by logs and security software. This data should be
reviewed regularly by the appropriate staff members.

Develop written guidelines for prioritizing incidents.

Prioritizing the handling of individual incidents is a critical decision
point in the incident response process. Incidents should be prioritized
based on the following:

- Criticality of the affected resources and data, such as whether a
public Web server or a user workstation is affected; and

- Current and potential technical effect of the incident, such as
root compromise or destruction of data.

Combining the criticality of the affected resources and the current and
potential technical effect of the incident determines the impact of the
incident to the organization. For example, data destruction on a user
workstation might result in a minor loss of productivity; however, root
compromise of a public Web server might result in a major loss of
revenue, productivity, access to services, and reputation, as well as
the release of sensitive data. The latter breach could result in the
release of credit card numbers, Social Security numbers, and other forms
of personally identifiable information. Since incident handlers may be
under great stress during incidents, it is important to make the
prioritization process clear. Organizations should decide how the
incident response team should react under various circumstances and then
create a Service-Level Agreement (SLA) that documents the appropriate
actions and maximum response times. This documentation is particularly
valuable for organizations that outsource components of their incident
response programs. Documenting the guidelines should facilitate faster
and more consistent decision making.

Review the lessons learned from security incidents to improve the
organizationÂ's security incident handling processes.

After a major incident has been handled, the organization should hold a
meeting to review the lessons learned from the incident and the
effectiveness of the incident handling process. Then it is possible to
identify necessary improvements to existing security controls and
practices. Meetings to review lessons learned should also be held
periodically for lesser incidents. The information accumulated from all
of the meetings to review the lessons learned should be used to identify
systemic security weaknesses and deficiencies in policies and
procedures. Follow-up reports generated for each resolved incident can
be important not only for evidentiary purposes but also for reference in
handling future incidents and in training new members of the incident
response team. An incident database, with detailed information on each
incident that occurs, can be another valuable source of information for
incident handlers.

Seek to maintain situational awareness during large-scale incidents.

Organizations often are challenged to maintain situational awareness for
handling of large-scale incidents because these incidents are very
complex. Many people within the organization may play a role in the
incident response, and the organization may need to communicate rapidly
and efficiently with various external groups. Collecting, organizing,
and analyzing all the pieces of information, so that the right decisions
can be made and executed, are not easy tasks. The key to maintaining
situational awareness is to prepare to handle large-scale incidents by:

- Establishing, documenting, maintaining, and exercising on-hours
and off-hours contact and notification mechanisms for various
individuals and groups within the organization, such as the chief
information officer (CIO), head of information security, IT
support staff, and business continuity planning staff. Mechanisms
are also needed for contacts outside the organization, such as
US-CERT, incident response organizations, and counterparts at
other organizations;

- Planning and documenting guidelines for the prioritization of
incident response actions based on business impact;

- Preparing one or more individuals to act as security incident
leads with responsibility for gathering information from the
incident handlers and other parties, and distributing relevant
information to the parties that need it; and

- Practicing the handling of large-scale incidents through exercises
and simulations on a regular basis. Since these incidents happen
rarely, incident response teams often lack experience in handling
them effectively.

More Information

See Appendix J of SP 800-61 Revision 1 for information about federal
incident reporting guidelines, including definitions and reporting time
frames. The US-CERT Web page can be found at:

http://www.us-cert.gov/federal/reportingRequirements.html.

OMB directives and guidelines are available at:

http://www.whitehouse.gov/omb/.

NIST publications assist organizations in planning and implementing a
comprehensive approach to information security. See NISTÂ's Web page for
information about NIST standards and guidelines that are referenced in
the Computer Security Incident Handling Guide and other security-related
publications, covering related topics, such as security planning, risk
management procedures, security controls, intrusion detection systems,
and firewalls. http://csrc.nist.gov/publications/index.html


Disclaimer
Any mention of commercial products or reference to commercial
organizations is for information only; it does not imply recommendation
or endorsement by NIST nor does it imply that the products mentioned are
necessarily the best available for the purpose.



Elizabeth B. Lennon
Writer/Editor
Information Technology Laboratory
National Institute of Standards and Technology
100 Bureau Drive, Stop 8900
Gaithersburg, MD 20899-8900
Telephone (301) 975-2832
Fax (301) 975-2378



___________________________________________________
Subscribe to InfoSec News
http://www.infosecnews.org/mailman/listinfo/isn