You are on page 1of 2

Preparation

1 Identification
2 Containment
3
Objective: Establish contacts, define Objective: Detect the incident, determine its Objective: Mitigate the attack’s effects on the
procedures, and gather information to save scope, and involve the appropriate parties. targeted environment.
time during the incident handling.
Insider abuses are hard to detect and there is no Don’t do anything, without a written request
Contacts 100% success tips. from the concerned CISO/person in charge.
■ Make sure to also have contact points in your Based on your legal team advisory, a written
public relation team, human resources team Technical identification permission from the concerned user might also
and legal department be handy.
■ Have a centralized logging facility ■ Alerts from a SIEM or correlation tools
■ Be sure to have a global authorization and
Malicious behaviour can have been detected with ■ Involve people:
the correlation of several abnormal events Different people should be informed about the
clearance process. This process must
specially take care of the removal of privileges abuse so that they can help to assist on it. This
on former jobs ■ Alerts from an IDS/IPS detecting an includes HR management, legal management, PR
management and business management of the
■ Provide strong authentication accordingly to
intrusion
In case the insider tried to hack the system, an suspected insider.
the risk of the business application
Intrusion Detection System (or Intrusion Prevention
System) can be able to trigger an alert. ■ Meeting:
An HR manager should meet the suspected insider
Human identification to explain him/her what has been found and what
will happen. Support can be required from legal,
■ Management: technical and management people.
The manager of the insider might be the first to
notice the suspected behaviour. ■ Privileges lowering:
If the suspected insider is allowed to stay at work
■ Control, risk, compliance: until the end of the investigation, provide him/her a
These teams have their own systems to detect computer with minimum authorizations.
operational anomalies and they can also trigger
alerts if something abnormal is detected. ■ Authorization freeze:
Suspend access and authorizations of the
■ Colleagues: suspected insider. This must include application
Insider’s colleagues are maybe the most valuable clearance. This can also include system account,
notification channel because they know perfectly keys, building facility badge.
the tasks, the process and the impacts on their
duty jobs. They can guess easily what is ■ Remote access:
happening. Suspend remote access capabilities, i.e.:
smartphones, VPN accounts, tokens...
■ External parties:
External partners or structure can also have their ■ Seizure:
own detection capabilities. If operations have been Seize all the professional computing device of the
falsified internally, these external entities can bring suspected insider.
a real enlightenment.
Containment
3 Recovery
5
Case 1: abnormal activity Objective: Restore the system to normal Incident Response Methodology
operations.

If nothing malicious or fraudulent is confirmed yet, If the incident has not been made public yet, be
two investigations should start right now: sure to warn all the impacted stakeholders
- forensics investigation on the computing (customers, concerned partners …) and required IRM #12
devices of the suspected insider. authorities. This communication must be made by
- log investigation on different audit trails top management in case of huge impacts. Insider abuse
components Deal with internal information disclosed intentionally
Eventually warn your employees or some local
Case 2: malicious / fraudulent activity ___________________________________________________
teams about the issue to raise awareness and IRM Authors: CERT SG / David Bizeul
increase security rules. IRM version: 1.1

If malicious or fraudulent behaviour is already When situation comes back to normal, eventually E-Mail: cert.sg@socgen.com
confirmed, think about file a complaint against the Web: https://cert.societegenerale.com
remove the official communication. Twitter: @CertSG
suspected insider.
In this case, do not take any further technical
Aftermath
6
actions. Provide the legal team or law enforcement
officer all requested evidences and be ready to Objective: Document the incident’s details,
assist on demand. discuss lessons learned, and adjust plans and Abstract
defences.
This Incident Response Methodology is a cheat sheet dedicated
If collateral damages can result from the abuse, be to handlers investigating on a precise security issue.
sure to contain the incident impacts before making Report Who should use IRM sheets?
it public. Be sure to inform authorities if required.  Administrators
An incident report should be written and made  Security Operation Center
 CISOs and deputies
available to all of the actors of the incident.
 CERT (Computer Emergency Response Team)
Remember: If you face an incident, follow IRM, take notes
Remediation
4 The following themes should be described:
■ Initial detection
and do not panic. Contact your CERT immediately if
needed:

■ Actions and timelines


Objective: Take actions to remove the threat
and avoid future incidents. ■ What went right
■ What went wrong Incident handling steps
The remediation part is pretty limited in case of an
insider abuse. Following actions can be considered ■ Incident impact 6 steps are defined to handle security Incidents
 Preparation: get ready to handle the incident
depending on the case:  Identification: detect the incident
Capitalize  Containment: limit the impact of the incident
■ Take disciplinary action against the malicious  Remediation: remove the threat
employee (or terminate the contract) and Some improvement might be especially valuable  Recovery: recover to a normal stage
remove all his/her credentials. considering insider abuse:  Aftermath: draw up and improve the process

■ Delete all fictitious or fraudulent operations ■ Authorization process improvements IRM provides detailed information for each step.
made by the insider ■ Controls improvements in the organisation
■ Review all programs or scripts made by the ■ Awareness on fraud and malicious activity
insider and remove all unnecessary codes This document is for public use

You might also like