Preparation

ID: RS0001

Get prepared for a security incident.

Response Actions

ID Name Description
RA1001 Practice Practice in the real environment. Sharpen Response Actions within your organization
RA1002 Take trainings Take training courses to gain relevant knowledge
RA1003 Raise personnel awareness Raise personnel awareness regarding phishing, ransomware, social engineering, and other attacks that involve user interaction
RA1004 Make personnel report suspicious activity Make sure that personnel will report suspicious activity i.e. suspicious emails, links, files, activity on their computers, etc
RA1005 Set up relevant data collection Usually, data collection is managed by Log Management/Security Monitoring/Threat Detection teams. You need to provide them with a list of data that is critically important for IR process. Most of the time, data like DNS and DHCP logs are not being collected, as their value for detection is relatively low. You can refer to the existing Response Actions (Preparation stage) to develop the list
RA1006 Set up a centralized long-term log storage Set up a centralized long-term log storage. This is one of the most critical problems companies have nowadays. Even if there is such a system, in most of the cases it stores irrelevant data or has too small retention period
RA1007 Develop communication map Develop a communication map for both internal (C-level, managers and technical specialists from the other departments, that could be involved in IR process) and external communications (law enforcement, national CERTs, subject matter experts that you have lack of, etc)
RA1008 Make sure there are backups Make sure there are both online and offline backups. Make sure they are fully operational. In the case of a successful ransomware worm attack, thats the only thing that will help you to safe your critically important data
RA1009 Get network architecture map Get network architecture map. Usually, its managed by the Network security team. It will help you to choose the containment strategy, such as isolating specific network segments
RA1010 Get access control matrix Get Access Control Matrix. Usually, its managed by the Network security team. It will help you to identify adversary opportunities, such as laterally movement and so on
RA1011 Develop assets knowledge base Develop assets knowledge base. It will help you to compare observed activity with a normal activity profile for a specific host, user or network segment
RA1012 Check analysis toolset Make sure your toolset for analysis and management is updated and fully operational. Make sure that all the required permissions have been granted as well
RA1013 Access vulnerability management system logs Access vulnerability management system logs. It will help to identify the vulnerabilities a specific host had at a specific time in the past
RA1014 Connect with trusted communities Connect with trusted communities for information exchange
RA1101 Access external network flow logs Make sure you have access to external communication Network Flow logs
RA1102 Access internal network flow logs Make sure you have access to internal communication Network Flow logs
RA1103 Access internal HTTP logs Make sure you have access to internal communication HTTP logs
RA1104 Access external HTTP logs Make sure you have access to external communication HTTP logs
RA1105 Access internal DNS logs Make sure you have access to internal communication DNS logs
RA1106 Access external DNS logs Make sure you have access to external communication DNS logs
RA1107 Access VPN logs Make sure you have access to VPN logs
RA1108 Access DHCP logs Make sure you have access to DHCP logs
RA1109 Access internal packet capture data Make sure you have access to internal communication Packet Capture data
RA1110 Access external packet capture data Make sure you have access to external communication Packet Capture data
RA1111 Get ability to block external IP address Make sure you have the ability to block an external IP address from being accessed by corporate assets
RA1112 Get ability to block internal IP address Make sure you can block an internal IP address from being accessed by corporate assets
RA1113 Get ability to block external domain Make sure you have the ability to block an external domain name from being accessed by corporate assets
RA1114 Get ability to block internal domain Make sure you can block an internal domain name from being accessed by corporate assets
RA1115 Get ability to block external URL Make sure you have the ability to block an external URL from being accessed by corporate assets
RA1116 Get ability to block internal URL Make sure you can block an internal URL from being accessed by corporate assets
RA1117 Get ability to block port external communication Make sure you can block a network port for external communications
RA1118 Get ability to block port internal communication Make sure you can block a network port for internal communications
RA1119 Get ability to block user external communication Make sure you can block a user for external communications
RA1120 Get ability to block user internal communication Make sure you can block a user for internal communications
RA1121 Get ability to find data transferred by content pattern Make sure you have the ability to find data transferred at a particular time in the past by its content pattern (i.e. specific string, keyword, binary pattern etc)
RA1122 Get ability to block data transferring by content pattern Make sure you have the ability to block data transferring by its content pattern (i.e. specific string, keyword, binary pattern etc)
RA1123 Get ability to list data transferred Make sure you have the ability to list the data that is being transferred at the moment or at a particular time in the past
RA1124 Get ability to collect transferred data Make sure you have the ability to collect the data that is being transferred at the moment or at a particular time in the past
RA1125 Get ability to identify transferred data Make sure you have the ability to identify the data that is being transferred at the moment or at a particular time in the past (i.e. its content, value)
RA1126 Find data transferred by content pattern Make sure you have the ability to find the data that is being transferred at the moment or at a particular time in the past by its content pattern
RA1127 Get ability to analyse user-agent Make sure you have the ability to analyse an User-Agent request header
RA1128 Get ability to list Firewall rules Make sure you have the ability to list firewall rules
RA1201 Get ability to list users opened email message Make sure you have the ability to list users who opened a particular email message
RA1202 Get ability to list email message receivers Make sure you have the ability to list receivers of a particular email message
RA1203 Get ability to block email domain Make sure you have the ability to block an email domain
RA1204 Get ability to block email sender Make sure you have the ability to block an email sender
RA1205 Get ability to delete email message Make sure you have the ability to delete an email message
RA1206 Get ability to quarantine email message Make sure you have the ability to quarantine an email message
RA1207 Get ability to collect email message Make sure you have the ability to collect an email message
RA1208 Get ability to analyse email address Make sure you have the ability to analyse an email address
RA1301 Get ability to list files created Make sure you have the ability to list files that have been created at a particular time in the past
RA1302 Get ability to list files modified Make sure you have the ability to list files that have been modified at a particular time in the past
RA1303 Get ability to list files deleted Make sure you have the ability to list files that have been deleted at a particular time in the past
RA1304 Get ability to list files downloaded Make sure you have the ability to list files that have been downloaded from the internet at a particular time in the past
RA1305 Get ability to list files with tampered timestamps Make sure you have the ability to list files with a tampered timestamp
RA1306 Get ability to find file by path Make sure you have the ability to find a file by its path (including its name)
RA1307 Get ability to find file by metadata Make sure you have the ability to find file by its metadata (i.e. signature, permissions, MAC times)
RA1308 Get ability to find file by hash Make sure you have the ability to find a file by its hash
RA1309 Get ability to find file by format Make sure you have the ability to find a file by its format
RA1310 Get ability to find file by content pattern Make sure you have the ability to find a file by its content pattern (i.e. specific string, keyword, binary pattern etc)
RA1311 Get ability to collect file Make sure you have the ability to collect a specific file from a (remote) host or a system
RA1312 Get ability to quarantine file by path Make sure you have the ability to block a file from being accessed by its path (including its name)
RA1313 Get ability to quarantine file by hash Make sure you have the ability to block a file from being accessed by its hash
RA1314 Get ability to quarantine file by format Make sure you have the ability to block a file from being accessed by its format
RA1315 Get ability to quarantine file by content pattern Make sure you have the ability to block a file from being accessed by its content pattern (i.e. specific string, keyword, binary pattern etc)
RA1316 Get ability to remove file Make sure you have the ability to remove a specific file from a (remote) host or a system
RA1317 Get ability to analyse file hash Make sure you have the ability to analyse a file hash
RA1318 Get ability to analyse Windows PE Make sure you have the ability to analyse a Windows Portable Executable file
RA1319 Get ability to analyse macos macho Make sure you have the ability to analyse a macOS Mach-O file
RA1320 Get ability to analyse Unix ELF Make sure you have the ability to analyse a UNIX ELF file
RA1321 Get ability to analyse MS office file Make sure you have the ability to analyse a Microsoft Office file
RA1322 Get ability to analyse PDF file Make sure you have the ability to analyse a PDF file
RA1323 Get ability to analyse script Make sure you have the ability to analyse a script file (i.e. Python, PowerShell, Bash scripts etc)
RA1324 Get ability to analyse jar Make sure you have the ability to analyse JAR file
RA1325 Get ability to analyse filename Make sure you have the ability to analyse a filename
RA1401 Get ability to list processes executed Make sure you have the ability to list processes being executed at the moment or at a particular time in the past
RA1402 Get ability to find process by executable path Make sure you have the ability to find process executed at a particular time in the past by its executable path (including its name)
RA1403 Get ability to find process by executable metadata Make sure you have the ability to find process executed at a particular time in the past by its executable metadata (i.e. signature, permissions, MAC times)
RA1404 Get ability to find process by executable hash Make sure you have the ability to find process executed at a particular time in the past by its executable hash
RA1405 Get ability to find process by executable format Make sure you have the ability to find process executed at a particular time in the past by its executable format
RA1406 Get ability to find process by executable content pattern Make sure you have the ability to find process executed at a particular time in the past by its executable content pattern (i.e. specific string, keyword, binary pattern etc)
RA1407 Get ability to block process by executable path Make sure you have the ability to block process by its executable path (including its name)
RA1408 Get ability to block process by executable metadata Make sure you have the ability to block process by its executable metadata (i.e. signature, permissions, MAC times)
RA1409 Get ability to block process by executable hash Make sure you have the ability to block process by its executable hash
RA1410 Get ability to block process by executable format Make sure you have the ability to block process by its executable format
RA1411 Get ability to block process by executable content pattern Make sure you have the ability to block process by its executable content pattern (i.e. specific string, keyword, binary pattern etc)
RA1501 Manage remote computer management system policies Make sure you can manage Remote Computer Management system policies
RA1502 Get ability to list registry keys modified Make sure you have the ability to list registry keys modified at a particular time in the past
RA1503 Get ability to list registry keys deleted Make sure you have the ability to list registry keys deleted at a particular time in the past
RA1504 Get ability to list registry keys accessed Make sure you have the ability to list registry keys accessed at a particular time in the past
RA1505 Get ability to list registry keys created Make sure you have the ability to list registry keys created at a particular time in the past
RA1506 Get ability to list services created Make sure you have the ability to list services that have created at a particular time in the past
RA1507 Get ability to list services modified Make sure you have the ability to list services that have been modified at a particular time in the past
RA1508 Get ability to list services deleted Make sure you have the ability to list services that have been deleted at a particular time in the past
RA1509 Get ability to remove registry key Make sure you have the ability to remove a registry key
RA1510 Get ability to remove service Make sure you have the ability to remove a service
RA1511 Get ability to analyse registry key Make sure you have the ability to analyse a registry key
RA1601 Manage identity management system Make sure you can manage Identity Management System, i.e. remove/block users, revoke credentials, and execute other Response Actions
RA1602 Get ability to lock user account Make sure you have the ability to lock user account from being used
RA1603 Get ability to list users authenticated Make sure you have the ability to list users authenticated at a particular time in the past on a particular system
RA1604 Get ability to revoke authentication credentials Make sure you have the ability to revoke authentication credentials
RA1605 Get ability to remove user account Make sure you have the ability to remove a user account
RA1606 Get ability to list user accounts Make sure you have the ability to list user accounts on a particular system