Interior Page Icon

After Action Activities

Continually Improving Enterprise Resilience



Overview

After a cyber incident, certain activities should take place so that an organization may respond to it appropriately with the understanding that the adversary may still be present in the organization's environment. These activities should take into account the need for long term business functions to continue. This document describes how to apply Adaptive Response, Analytic Monitoring, Coordinated Defense, and Realignment resiliency techniques.

Applying Adaptive Response to Detect Adversary Impacts

Adaptive Response - implementing cyber courses of actions (CCoA) to manage risk - in order to respond dynamically to specific situations, using agile and alternative operational contingencies to maintain minimum operational capabilities, limit consequences and avoid destabilization. Adaptive Response optimizes an organization's capability to respond in a timely and appropriate manner to adversary activities, thus maximizing its capability to maintain the integrity and availability of core services. There are three approaches to applying Adaptive Response:

Priorities for Immediate Action with Adaptive Response

The top priorities for Adaptive Response are:

Applying Analytic Monitoring to Detect Adversary Impacts

Analytic Monitoring - Continuously gather, fuse, and analyze threat intelligence data to identify vulnerabilities, find indications of potential adverse conditions, and identify potential or actual damage - Optimizes an organization's ability to detect adversary activities, thus maximizing the ability to identify and contain the adversary's impacts. There are three approaches to applying Analytic Monitoring:

Priorities for Immediate Action with Analytic Monitoring

The top priorities for Analytic Monitoring are:

Applying Coordinated Defense to Share Situational Awareness

Coordinated Defense - managing multiple, distinct mechanisms adaptively and in a coordinated way - can ensure that defender actions support both the immediate and long term needs of the enterprise. There are two major implementation approaches to Coordinated Defense.

Priorities for Immediate Action with Coordinated Defense

The top priorities for Coordinated Defense are:

Applying Realignment to Limit Adversary Impacts

Realignment - Aligning cyber resources with core aspects of the business functions - enables defenders to reduce the attack surface of the organization by minimizing the possible attack vectors. There are four ways of implementing realignment. They are:

Priorities for Immediate Action with Realignment

The top priorities for Realignment are all dependent on knowing what functions are critical to the enterprise. Once this knowledge has been established, the following actions should be implemented:

Preparing for the Future

As the adversary continues to evolve their tactics, it is important to realize the notion of "after the incident" becomes more problematic and the need to incorporate continuous evolution and resiliency enhancement becomes more critical. Unlike non-adversarial events (e.g., natural disasters) adversarial cyber events do not necessarily have a definitive endpoint nor can one be certain that the adversary or their malware is not still present in the organization's infrastructure. This makes it more challenging to pursue and capture the necessary after action information. Understanding the cyber attack lifecycle will help an organization understand and describe the stage of the current attack and what resources may be threatened.

Some organizations are hesitant to document anything about an incident due to potential for legal discovery. In addition there are also fears with regard to collaborating with industry partners because of trade secrets and competition. These concerns must be overcome to deal effectively with the evolving threat the adversary poses.

As the organization adopts resiliency techniques it also needs to ensure consistency and avoid cascading failures across distributed systems. Dynamic resource allocation tools and adaptive management tools are continuing to develop. Tools are only useful when properly implemented, staffed, and managed, so it is critical to have staff knowledgeable in how to deploy these tools. Political issues with respect to responsibilities for ongoing and dynamic risk management must also be resolved before implementing these tools within the organization.

See Key Concepts and Terms for definitions

Previous Activity Back to Menu