SIR

¡Supera tus tareas y exámenes ahora con Quizwiz!

Creating Post Incident Reviews

-A review is assigned to each user in the request assessments field -This field can be emptied to avoid automated assessments

What would a manager want to see in Reporting?

-Aggregations for priority and workload -Drill-down to granularity -Time Period views

Role: Security Analyst

-Assigned to L1 or L2 agents who work security incidents -Creates and updates security incidents, requests and tasks as well as problems, changes and outages related to their incidents.

OOB Integration capabilities

-Block Request -Email Search and Delete -Enrich Configuration Item -Enrich Observable -Get Network Statistics -Get Running Processes -Isolate Host -Publish to Watchlist -Sighting Search -Threat Lookup

What does the OOB Risk Score Calculator Consider?

-CI Business Impact -SI Business Impact -SI Priority -SI Severity -User's Business Impact -Vulnerable item Business Impact

Dashboards OOB

-CISO Reporting Overview -Security Analyst Overview -Security Incident Explorer

Role: Security Manager

-Can update Business Criticality Calculators and view the manager dashboard -Creates and updates security incidents, requests and tasks as well as problems, changes and outages related to their incidents.

SIR Sources

-Catalog -Tickets -Emails -Events -Logs -3rd Party Integrations

Configuring Post Incident Reviews

-Create Assessment Metric Category (Platform Admin) -Create Assessment Metrics -Define Additional Reviewers (optional)

SN NIST States

-Draft -Analysis -Contain -Eradicate -Recover -Review -Closed

SN SANS States

-Draft -Identification -Contain -Eradicate -Recover -Review -Closed

Security Tag Groups

-Enrichment whitelist./blacklist - Categorize process as known good or known bad -Metatag - Demo Only -Trafic Light Protocol - Used to mark sensitivity of data, can drive ACL Restriction -Block for sharing - Prevent sharing in trusted circles

What can be used to determine if a calculator runs?

-Filter Groups -Scripted condition -Condition builder

Role: External

-For external users to view and work tasks assigned to them -User with this role can view assigned tasks, but not the related Security Incidents

Role: Security Admin

-Full control over all SIR data -Configures Territories and Skills - Security roles are only assignable by this role

What would a CIO/CISO want to see in Reporting?

-High Level Overviews -Single Clear indicators of organizational health and function

Post Incident Report Include:

-Initial Incidents that cuased the security incident -Change Requests, Problems and Vulnerabilities linked to the Security Incident -Descriptions on the Security Incident -Activity Logs with all work notes, response tasks and activities -Optionally, the audit log

Available Process Definitions

-NIST Stateful -NIST Open -SANS Open

What is on the CISO Homepage?

-New Security Incidents this week -Security Incidents closed this week -New Security Incidents (Running 7 Days) -Security Incidents Closed (Running 7 days) -Average time to identify -Average time to contain -Average time to contain critical -Weekly New security Incidents -Weekly closed security incidents -Security Incident Close Codes -Security Incident Criticality Report (business services)

NIST States

-Preparation -Detection and Analysis -Containment, Eradication and Recovery -Post Incident Activity

How does the Splunk Integration work?

-Pushes records into the em_event table -Can Also: -Assign manual tasks -Automatically address events using workflow or orchestration

Role: Read

-Read only access to security incidents, typically for reporting/monitoring

Security Alert Sources

-SIEM -Firewall IDS-IPS -Security endpoint -Identity and Access -Network Security -Threat Intel

SOX

-Sarbanes-Oxley Act of 2002 -aka Public Company accounting reform and investor protection act -aka Corporate and auditing accountability, responsibility and transparency Act

Knowledge Bases OOB

-Security Incident -Security Incident Response Runbook

License Tier Standard (SIR)

-Security Incident Response -Limited Trusted Circles -No PA

License Tier Professional

-Security Incident Response -Vulnerability Response -Threat Intelligence -Limited Trusted Circles -PA for Security Operations -Event Management for security operations

License Tier Enterprise

-Security Incident Response -Vulnerability Response -Threat Intelligence -Trusted Circles -PA for Security Operations -Event Management for Security Operations -Orchestration for Security Operations -Configuration Compliance

Commonly used tables for reporting

-Security Incident [sn_si_incident] -Security Incident Audit Log [sn_si_audit_log] -Task [task]

How can a security incident be triggered?

-Service Catalog -Manually -Email Parsing -Third Party integration

Incident assignment factors

-Time Zone -Location -Skills/Capabilities

Role: Security Basic

-Underlying role for basic security access -Creates and updates security incidents, requests and tasks as well as problems, changes and outages related to their incidents.

What would an analyst want to see in Reporting

-Up-to-the-minute views -Clear Prioritizations -Granularity

Escalations

-Used to get Security incident in front of the right person (Functional and Hierarchical escalation) -Escalate Button only shows up if an escalation group is configured for current assignment group

Security Incident Calculators

-Used to set specific fields according to matches conditions -Calculator Groups run each calculator one at a time and stop running after first match

What should be considered when automating SI creation?

-What additional info can enrich the ticket? -How will events be captured, filtered and ingested?

TLP Roles

-sn_sec_cmn.tlp_red -sn_sec_cmn.tlp_amber -sn_sec_cmn.tlp_green

Roles in Security Incident

-sn_si.admin -sn_si.manager -sn_si.analyst -sn_si.basic -sn_si.read -sn_si.external -sn_si.ciso -sn_si.knowledge_admin -sn_si.integration_user

How many roles are installed with SI?

10

How many workflows are installed with SI?

24

How many tables are installed with SI?

27

How many script includes are installed with SI?

28

How many assessment metrics are installed with SI?

36

Definition of Security Incident

A Violation of computer security policies, acceptable use policies, or standard computer practices

Alert definition

A particular event (or series of events) that may be of interest

Event definition

A special record the system uses to log when certain conditions occur and to take some kinds of action in response.

Risk Score Calculators

Calculated as a mean representing -Risk Based on Priority -Type of Security Incident -Number of sources that triggered the failed score on the indicator

CERT

Computer Emergency Response Team

CSIRT

Computer Security Incident Response Team

Goal of SN SIR

Containment as soon as possible by reducing time to get the right info in front of the right eyes

GDPR

General Data Protection Regulation

What kind of information does the Security analyst homepage have?

Granularity "What work is assigned to me?"

HIPAA

Health Insurance Portability and Accountability Act

Firewall IDPS-IPS

Intrusion detection/prevention system

SIR Analysis

Mainly a manual Process of analyst working inc, but may have automated enrichment

Role: Knowledge Admin

Manages the security incident KB, both content and config

NOC

Network Operations Center

PCI-DSS

Payment Card Industry Data Security Standard

Role: Integration User

Permits external tools to create/update security incident records

What role is needed to create new Post Incident Review Categories?

Platform Admin

Who can select the process definition?

Platform Admin - Appears to work for Security Incident admin, but has error due to scoping

Script include that controls process definitions

ProcessDefinition

What Workflow updates a 3rd part watch list?

Publish to watch list

SIR Detection

Raised through automation originating from Firewalls, intrusion detections systems, logs of email or web gateways etc OR Manually

Role: CISO

Read and write access to security incidents and can view CISO dashboards

Application menu to define process definition

Security Incident > Administration > Process Definitions

Application Menu for Risk Score Calculators

Security Incident > Setup > Risk Score Configuration

What role is required to setup Sec Ops inbound actions?

Security Incident Admin

SIRT

Security Incident Response Team

Who can create a new Process Definition?

Security Incident admin -Platform Admin needed to change scripts

SIEM

Security Information and Event Management

Application Menu to create new email parsing rule

Security Operation > Email Processing > Email Parsing

SOC

Security Operations Center

What table does security incident extend?

Service Order [sm_order] -Service Order extends task

What happens when more than 1 calculator group affects the same field?

Successive calculators will alter the previous field, but will be reported when the incident is raised

Definition: Security Incident Response

The action plan taken to mitigate security incidents and imminent security threats

Script include called from User Reported Phishing inbound action

UserReportedPhishing

What questions should be ask when setting up Splunk Integration?

Which fields in cURL call? -Where will the data be stored? -Can be mapped to specific fields -Unmapped data will fill the additional information field

Can the Security Incident Admin edit workflows?

Yes

Security Incident Response Plugin Name

com.snc.security_incident

What role is required to use the REST API Explorer

rest_api_explorer

Application Menu for Escalations

security Operations > Groups > Escalations

Security Incident Table Name

sn_si_incident

Security Request table name

sn_si_request

Security Incident Task table name

sn_si_task


Conjuntos de estudio relacionados

6.2 Credit Risk and Credit Derivatives

View Set