introduction to csirts

13
Security Incident Response Capabilities & CSIRTs Adli Wahid Security Specialist [email protected]

Upload: apnic

Post on 15-Apr-2017

213 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Introduction to CSIRTs

SecurityIncidentResponseCapabilities&CSIRTs

[email protected]

Page 2: Introduction to CSIRTs

AdliWahid

• SecuritySpecialist@APNIC• [email protected]• MemberofINTERPOLCyberCrimeExpertGroup• Let’sConnect

• Twitter:@adliwahid• Linkedin:AdliWahid• APNIC’sBlog:https://blog.apnic.net

Page 3: Introduction to CSIRTs

SecurityResilience

SecuritybyDesign

SecurityinDeployment

SecurityinOperation

SecurityinBreach

Page 4: Introduction to CSIRTs
Page 5: Introduction to CSIRTs

EcosystemNetwork

Operators/ServiceProviders

LawEnforcement/

Judiciary

PolicyMakers EndUsers/Consumers

NationalCERTs/CSIRTs|CyberSecurity

Agency

Hardware/SoftwareVendors

Page 6: Introduction to CSIRTs

Why?

1. Getnotified2. ReduceImpactofSecurityIncident3. Understandthe(root)cause4. DoSomethingAboutIt

Page 7: Introduction to CSIRTs

GetNotified• HowcanotherCERTs/CSIRTcontactyou?

o Incidentso SourceofSecurityIncidentso Suspiciousactivitieso ThreatInformation

• Whois db andothermeanso APNIC’sWhois Accuracyinitiative

• Willyoudosomethingaboutit?o Awarenesso Capabilitieso Policies&Procedures

• Alloftheabove:Preparedness

irt:IRT-APNIC-IS-APaddress:SouthBrisbane,Australiae-mail:[email protected]:[email protected]:AIC1-APtech-c:AIC1-APauth:#Filteredremarks:APNICInfrastructureServicesmnt-by:MAINT-APNIC-IS-APchanged:[email protected] 20110704source:APNIC

https://blog.apnic.net/2016/09/27/lea-stakeholders-enter-whois-discussion/

Page 8: Introduction to CSIRTs

ReducePotentialImpact• Timeliness• SecurityIncidentshaveaffectconstituent’s

• Operation• Business• Image/Brand• Safety

• Understandthe(root)causeoAdvise/Alerttheconstituents

• Reducecostrequiredtofix

Cryptolocker

http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Page 9: Introduction to CSIRTs

DoSomethingAboutIt• Remediation

oAnalysisoCollaborationo Escalation

• DDoSExampleo Fixing/removingvulnerablehostso Fixing/removingvulnerableservicesoBCP38/SourceAddressValidationoContinuousMonitoring

• Joinindustry-wideinitiatives

ShadowServer Foundation

https://www.cybergreen.net

Page 10: Introduction to CSIRTs

Mapping Threat to Incident Response

l© NIST

NIST SP 800-61 rev 2 (2012

Page 11: Introduction to CSIRTs

CommunityofCSIRTs• Trustedgroup• InformationSharing• Beyondthat

o LessonsLearnedo JointProjects(Standards,Tools,Frameworks)o JointActivities(Events,Drills)oResources(Training,Trainers)oMentoring

oExamples:o FIRST.org ,APCERT,NZITF

FIRST.org Fellows

https://www.first.org

Page 12: Introduction to CSIRTs

CERT/CSIRTActivitiesinAPRegion• Partnerships

• CollaborationwithFIRST.org• MoUwithAsiaPacificComputerEmergencyResponseTeams(APCERT)

• Shareresources,promoteinitiatives• Activities

• FIRSTTechnicalColloquia(SecurityTrack)atAPRICOT&APNICSupportedEvents

• CyberSecurityWorkshops• Training/E-Learning

• 2017• FIRST-TC@APRICOT• Moreactivitiesbeingplanned

TongaCERTDiscussion

SecurityWorkshopinBhutan

Page 13: Introduction to CSIRTs

ThankYou

[email protected]