Cyber Security Incident Response Playbooks V1.0 Can be used in conjunction with the Standard Categories for Incident Response v2.1. https://www.st- andrews.ac.uk/itsupport/security/standardcategoriesforincidentresponse/ Can be used with the Standard Categories ‘TheHive’ templates v1.0 To be released For questions and comments, please email stacsirt@st-andrews.ac.uk All playbooks are designed to be a template which can be filled out with more specific local steps and measures. Example flows (from:to) are included in the ‘block applied’ playbook.
External Investigation Step Action From To 1 Notification 2 Identify affected users / systems 3 Categorize incident 4 Determine severity 5 Investigate with playbook 6 Report, considering external
Malicious code Step Action From To 1 Notification of malicious code 2 Submit sample to malware analysis / AV vendor 3 Determine IoCs 4 Create IDS rules 5 Historical log search 6 Block relevant IoCs 7 Identify previous infections 8 Block machines from network 9 Inform service desk / user 10 Close when ‘clean’
Internal Investigation Step Action From To 1 Notification / Requirement 2 Identify any investigation requirements 3 Categorize Incident 4 Investigate with playbook
Copyright Infringement Step Action From To 1 Notification 2 Identify user 3 Inform user, with regulations 4 Follow regulation process
Denial of Service Step Action From To 1 Identification 2 Identify target (s) 3 Get packet dump 4 Initiate out of band comms if required 5 Report to upstream service provider 6 Check for extortion messages 7 Consider mitigation techniques
Unauthorised Access Step Action From To 1 Notification 2 Identify affected systems 3 Isolate system 4 Determine severity 5 Identify IoCs 6 Identify spread 7 Update IDS 8 Isolate as required 9 Recover systems (rebuild)
APT Step Action From To 1 Notification 2 Identify IoCs 3 Historical search 4 Determine severity / internal spread 5 Escalate 6 Update IDS
Social Step Action From To 1 Notification of compromised account 2 Secure the account 3 Refresh logins 4 Determine IoCs 5 Check historical records 6 Determine severity of information 7 Escalate
Vulnerability notification Step Action From To 1 Notification of vulnerability 2 Research relevant sites 3 Calculate CVSS score 4 Write up report 5 Release
Block applied (with example flows) Step Action From To 1 Get source email Internal / External CSIRT 2 Extract URLs Email 3 Check current status of sites DNS 4 Report to block provider/technology Block provider / RPZ 5 Put into IDS rules IDS 6 Check historical records Networks - DNS 7 Follow relevant playbook for detections Playbooks
Threat / Extortion / Blackmail Step Action From To 1 Notification 2 Determine severity 3 Check with externals for cases (real or hoax) 4 Escalate