Module 1: Incident Response Overview
Last updated
Last updated
The whos and hows to cyber incidents.
ITIL conists of five key stages:
Service Strategy
Service Design
Service Transition
Service Operation
Continual Service Improvement
The Incident Management process starts whenever:
A user, customer, or supplier reports an issue
Technical staff notice a system failure
An event monitoring system raises an alert
Abusive Content
Spam, harmful speech, pornography
Malicious code
Viruses, worms, trojans, spyware, rootkits
Information Gathering
Scanning, sniffing social engineering
Intrusion Attempts
Exploit and login attempts
Intrusions
Account and application compromise, bots
Availability
DDoS, sabotage
Information security
Unauthorized data access or modification
Fraud
Unauthorized use, phishing, copyright
Enclave Cybersecurity Threats
TEC003
System fingerprinting via scanning
TEC004
System fingerprinting via sniffing
TEC006
Credential discovery via scanning
MITRE ATT&CK Tactics and Techniques Example
Reconnaissance
Active Scanning, Search open sources
Resource Development
Acquire infrastructure, Develop capabilities
Initial Access
Drive-by access, Phishing
Execution
Serverless execution, deploy container
Persistence
Account manipulation, implant internal image
Privilege Escalation
Abuse elevated control mechanism, process injection
Defense Evasion
Access token manipulation, Hide artifacts
Credential Access
Adversary-in-the-middle, Brute force
Discovery
Account discovery, Network sniffing
Lateral Movement
Exploitation of remote services, Internal spearphishing
Collection
Archive collected data, Clipboard data
Command and Control
Application layer protocol, Protocol tunneling
Exfiltration
Automated exfiltration, Exfiltration over physical medium
Impact
Data encrypted, System shutdown
Good password hygiene is important, and sharing password management improvements is a key part of the post-mortem stage of incident response.
Check your API perms.