{"id":15748,"date":"2019-07-10T07:10:21","date_gmt":"2019-07-10T15:10:21","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/07\/10\/news-9495\/"},"modified":"2019-07-10T07:10:21","modified_gmt":"2019-07-10T15:10:21","slug":"news-9495","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/07\/10\/news-9495\/","title":{"rendered":"Enterprise incident response: getting ahead of the wave"},"content":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Wed, 10 Jul 2019 14:19:31 +0000<\/strong><\/p>\n<p>Enterprise defenders have a tough job. In contrast to small businesses, large enterprise can have thousands of endpoints, legacy hardware from mergers and acquisitions, and legacy apps that are business critical and prevent timely patching. Add to that a deluge of indicators and metadata from the perimeter that may represent the early stages of a <a rel=\"noreferrer noopener\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/advanced-persistent-threat-files-apt10\/\" target=\"_blank\">devastating attack<\/a>\u2014or may be nothing at all. <\/p>\n<p>So how do network defenders get out from behind the 8-ball? How do leaders bring an effective strategy to bear in mobilizing incident response (IR) resources? To deal with knotty problems like this, security researchers have developed a number of IR models to help bring a maximally sane, efficient strategy to network defense efforts.<\/p>\n<h3>The cyber kill chain<\/h3>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"39357\" data-permalink=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/07\/enterprise-incident-response-getting-ahead-of-the-wave\/attachment\/intrusion_kill_chain_-_v2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/Intrusion_Kill_Chain_-_v2.png\" data-orig-size=\"950,681\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Intrusion_Kill_Chain_-_v2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/Intrusion_Kill_Chain_-_v2-300x215.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/Intrusion_Kill_Chain_-_v2-600x430.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/Intrusion_Kill_Chain_-_v2-600x430.png\" alt=\"\" class=\"wp-image-39357\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/Intrusion_Kill_Chain_-_v2-600x430.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/Intrusion_Kill_Chain_-_v2-300x215.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/Intrusion_Kill_Chain_-_v2.png 950w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>https:\/\/en.wikipedia.org\/wiki\/Kill_chain<\/figcaption><\/figure>\n<p>In 2011, Lockheed Martin developed the<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html\" target=\"_blank\"> cyber kill chain<\/a>. Borrowed from the US military, the kill chain essentially breaks most cyberattacks down to their constituent elements, and theorizes that forcing a hard stop to any of the seven phases will prevent the entire attack. So if an attack is caught at the installation phase and remediated, the attacker can no longer proceed to act on objectives. But if endpoint protection can stop an attack at the delivery phase, so much the better.  <\/p>\n<p>The general idea that makes the kill chain such an appealing way of looking at an attack is that you can&#8217;t block everything. Malspam will get through perimeter defenses. Reconnaissance will sometimes happen whether you like it or not. Exploitation will definitely happen with that one employee who is committed to clicking on everything.  <\/p>\n<p>So rather than throwing up a Maginot line of ever-increasing defenses at ever-escalating costs, the kill chain suggests that defenders have seven opportunities to shut down an attack, and can fight on a battlefield of their choosing. While it would be best to identify an attack at the Reconnaissance phase, killing it at the Delivery phase can keep the network just as safe, without burning out your SOC by expecting them to catch everything.  Check out some more details on how the kill chain is implemented here.<\/p>\n<h3>The ATT&amp;CK model<\/h3>\n<p>A somewhat more granular model, <a rel=\"noreferrer noopener\" aria-label=\"ATT&amp;CK (opens in a new tab)\" href=\"https:\/\/attack.mitre.org\/resources\/enterprise-introduction\/\" target=\"_blank\">ATT&amp;CK<\/a> is a matrix that maps a lengthy list of attacker capabilities to a 12-step attack chain. Often seen as a complement to the kill chain, the ATT&amp;CK can be a useful exercise to match TTPs already observed to attack chain phases to determine defense priorities. When <a rel=\"noreferrer noopener\" aria-label=\"looking at use cases (opens in a new tab)\" href=\"https:\/\/www.anomali.com\/resources\/what-mitre-attck-is-and-how-it-is-useful\" target=\"_blank\">looking at use cases<\/a> for the model, threat data sharing is one of the most useful. Mapping out a full matrix of observed TTPs can be a method to quickly share a snapshot of the threat landscape across multiple defensive groups or different organizations.<\/p>\n<h3>\n<div>Critiques of IR models <\/div>\n<\/h3>\n<p>Most critiques of the kill chain and its more recent variants boil down to &#8220;what about X?&#8221; This is a little bit misguided, as attacker capabilities change over time, and a comprehensive matrix of TTPs would be exhausting to look at, and probably inaccurate in some way. What these models are really meant to assist with is bringing threat intelligence and strategy into the SOC to eliminate blind reactivity. Using any strategic model at all can bring better results than blind monitoring.<\/p>\n<h3>Intelligence: the bigger point<\/h3>\n<p>The takeaway for the SOC leader or CISO looking to implement an IR model is not picking the one, singularly correct model. Rather, implementing strategic defense in any form can boost the SOC&#8217;s responsiveness, efficiency, and accuracy. Having a well-mapped matrix tying observed indicators to specific attack phases can be an aid in prioritizing responses, as well as judging severity for a successful attack caught midstream.  <\/p>\n<p>Most importantly, having an incident response model forces SOC staff to respond to an incident in a strategic manner, addressing threats furthest along an attack chain first, and using threat staging to derive intelligence on potential ongoing attacks. As with conventional warfare, beating back attacks and winning the war depends on having a plan.  <\/p>\n<p>Stay vigilant, and stay safe.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/07\/enterprise-incident-response-getting-ahead-of-the-wave\/\">Enterprise incident response: getting ahead of the wave<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/07\/enterprise-incident-response-getting-ahead-of-the-wave\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Wed, 10 Jul 2019 14:19:31 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/business-2\/2019\/07\/enterprise-incident-response-getting-ahead-of-the-wave\/' title='Enterprise incident response: getting ahead of the wave'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/07\/shutterstock_354771683.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>As with traditional warfare, beating back attacks and winning depends on having a plan. Here are several incident respond models security researchers have developed for responding to threats.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/business-2\/\" rel=\"category tag\">Business<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/enterprise\/\" rel=\"tag\">enterprise<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/incident-response\/\" rel=\"tag\">Incident Response<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/kill-chain\/\" rel=\"tag\">kill chain<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/threat-intelligence\/\" rel=\"tag\">threat intelligence<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/business-2\/2019\/07\/enterprise-incident-response-getting-ahead-of-the-wave\/' title='Enterprise incident response: getting ahead of the wave'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/07\/enterprise-incident-response-getting-ahead-of-the-wave\/\">Enterprise incident response: getting ahead of the wave<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001,12177,12657,22209,12040],"class_list":["post-15748","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business","tag-enterprise","tag-incident-response","tag-kill-chain","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15748"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15748\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15748"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}