Interior Page Icon

Forensics

Restoring Trust in the Enterprise



Overview

Investigating cyber incidents requires defenders identify compromised systems and data as well as try to predict what the adversary will do next. Defenders must balance the benefits of forensics with the need to remove the adversary quickly. They must also preserve forensic data in case of future incidents and as legal evidence. This document describes how to apply Analytic Monitoring, Coordinated Defense, Segmentation and Substantiated Integrity resiliency techniques.

Applying Analytic Monitoring to Detect Adversary Impacts

Analytic Monitoring - Continuously gathering, fusing, and analyzing threat intelligence data to identify vulnerabilities, finding indications of potential adverse conditions, and identifying potential or actual damage - Optimizes an organization's ability to detect adversary activities, thus maximizing the ability to identify and contain the adversary's impacts. There are three approaches to applying analytic monitoring:

Priorities for Immediate Action with Analytic Monitoring

The top priorities for Analytic Monitoring are:

Applying Coordinated Defense to Share Situational Awareness

Coordinated Defense - managing multiple, distinct mechanisms adaptively and in a coordinated way - can ensure that forensic efforts support both the immediate and long term needs of the enterprise. There are two major implementation approaches to coordinated defense.

Priorities for Immediate Action with Coordinated Defense

The top priorities for Coordinated Defense are:

Applying Segmentation to Limit Adversary Impacts

Segmentation - physical or logical separation or isolation of communications based on trustworthiness and criticality - enables defenders to study the adversary's action without the adversary's awareness of the scrutiny. Separation or isolation can be physical or logical, and predefined or dynamic.

Priorities for Immediate Action with Segmentation

The top priorities for Segmentation are:

Applying Substantiated Integrity to Limit the Adversary's Ability to Hide

Substantiated Integrity - ascertaining whether critical services, information stores, information streams, and components have been corrupted - can prevent an adversary from modifying forensic evidence such as logs and thereby prevents them from hiding their presence. There are three approaches to substantiated integrity:

Priorities for Immediate Action with Substantiated Integrity

Preparing for the Future

Organizations should consider employing an integrated analysis team of forensic/malicious code analysts, tool developers, and real-time operations personnel. Having such a team allows organizational personnel, including developers, implementers, and operators, to share relevant information and facilitates the rapid detection of intrusions, development of appropriate mitigations, and the deployment of effective defensive measures.

Deception environments and techniques (e.g., honeynets and honeytokens on valid endpoints) are maturing and becoming easier to deploy. As they do so, they make it easier to balance the benefits of forensics with the need to remove the adversary quickly. Properly configured they can also aid in identifying which types of embedded devices and non-enterprise owned systems present are the greatest risks and what risks those may be.

The increased use of virtualization makes it easier to quickly recover from an attack as well expunge (albeit temporarily) an adversary's foothold in an organization. But at the same time, the non-persistence of data via virtualization (e.g., thinly provisioned cloud environments) can make it even more difficult to analyze adversary malware and to retain a legally viable set of evidence.

In addition, the legal and regulatory environment is changing. What is admissible in court and what is considered discoverable data as well as what an enterprise is required or prohibited from collecting need to be taken into account as the rules change. In addition, the forensic response and any potential disclosure may implicate the need to contact an appropriate law enforcement or government agency (e.g., an organization should not report that a state actor was responsible for a breach, before contacting the appropriate law enforcement and government agencies).

See Key Concepts and Terms for definitions

Previous Activity Back to Menu Next Activity