Download presentation
Presentation is loading. Please wait.
Published byJulian Collin Montgomery Modified over 6 years ago
1
Cyber Security Incident Response Playbooks
V1.0 Can be used in conjunction with the Standard Categories for Incident Response v2.1. andrews.ac.uk/itsupport/security/standardcategoriesforincidentresponse/ Can be used with the Standard Categories ‘TheHive’ templates v1.0 To be released For questions and comments, please All playbooks are designed to be a template which can be filled out with more specific local steps and measures. Example flows (from:to) are included in the ‘block applied’ playbook.
2
External Investigation
Step Action From To 1 Notification 2 Identify affected users / systems 3 Categorize incident 4 Determine severity 5 Investigate with playbook 6 Report, considering external
3
Malicious code Step Action From To 1 Notification of malicious code 2
Submit sample to malware analysis / AV vendor 3 Determine IoCs 4 Create IDS rules 5 Historical log search 6 Block relevant IoCs 7 Identify previous infections 8 Block machines from network 9 Inform service desk / user 10 Close when ‘clean’
4
Internal Investigation
Step Action From To 1 Notification / Requirement 2 Identify any investigation requirements 3 Categorize Incident 4 Investigate with playbook
5
Copyright Infringement
Step Action From To 1 Notification 2 Identify user 3 Inform user, with regulations 4 Follow regulation process
6
Denial of Service Step Action From To 1 Identification 2
Identify target (s) 3 Get packet dump 4 Initiate out of band comms if required 5 Report to upstream service provider 6 Check for extortion messages 7 Consider mitigation techniques
7
Unauthorised Access Step Action From To 1 Notification 2
Identify affected systems 3 Isolate system 4 Determine severity 5 Identify IoCs 6 Identify spread 7 Update IDS 8 Isolate as required 9 Recover systems (rebuild)
8
APT Step Action From To 1 Notification 2 Identify IoCs 3
Historical search 4 Determine severity / internal spread 5 Escalate 6 Update IDS
9
Social Step Action From To 1 Notification of compromised account 2
Secure the account 3 Refresh logins 4 Determine IoCs 5 Check historical records 6 Determine severity of information 7 Escalate
10
Vulnerability notification
Step Action From To 1 Notification of vulnerability 2 Research relevant sites 3 Calculate CVSS score 4 Write up report 5 Release
11
Block applied (with example flows)
Step Action From To 1 Get source Internal / External CSIRT 2 Extract URLs 3 Check current status of sites DNS 4 Report to block provider/technology Block provider / RPZ 5 Put into IDS rules IDS 6 Check historical records Networks - DNS 7 Follow relevant playbook for detections Playbooks
12
Threat / Extortion / Blackmail
Step Action From To 1 Notification 2 Determine severity 3 Check with externals for cases (real or hoax) 4 Escalate
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.