{"id":23539,"date":"2024-11-13T21:44:29","date_gmt":"2024-11-13T17:44:29","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/post-incident-lessons\/23539\/"},"modified":"2024-11-13T21:44:29","modified_gmt":"2024-11-13T17:44:29","slug":"post-incident-lessons","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/post-incident-lessons\/23539\/","title":{"rendered":"How to learn from a cybersecurity incident"},"content":{"rendered":"<p>Serious cybersecurity incidents often impact many different parties \u2014 including those who don\u2019t typically handle IT or security matters on a daily basis. Of course, the initial response needs to focus on identifying, containing, and recovering from an incident. But once the dust has settled, the time comes for another crucial stage: learning from the experience. What can the incident teach us? How can we improve our chances of preventing similar attacks in the future? These questions are well worth answering \u2014 even if the incident caused no significant damage due to an effective response or simply luck.<\/p>\n<h2>Involving people<\/h2>\n<p>Incident analysis is important for the whole organization. It\u2019s crucial to involve not only IT and security teams but also senior management and IT system stakeholders, as well as any third-party vendors affected by the incident or involved in its response. A productive atmosphere is crucial. It\u2019s important to emphasize that this isn\u2019t a witch hunt (though mistakes will be discussed). Blame-shifting and manipulating information will only distort the picture, hinder analysis, and harm the organization\u2019s long-term security.<\/p>\n<p>Many companies keep incident details under wraps, fearing reputational damage or a repeat attack. While this is completely understandable, and certain details should indeed remain confidential, <a href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/let-others-light-candles\" target=\"_blank\" rel=\"nofollow noopener\">striving for maximum transparency in response<\/a> is important. Specifics of an attack and response should be shared, if not with the general public, then at least with a trusted circle of peers in the cybersecurity field who can then help others prevent similar attacks on their organizations.<\/p>\n<h2>Detailed incident analysis<\/h2>\n<p>Although much incident data is already collected during the response phase, post-incident analysis provides an opportunity for deeper insights. First of all, answer questions like: How and when did the adversary penetrate the organization? What vulnerabilities and technical\/organizational weaknesses were exploited? How did the attack unfold? Mapping attacker actions and response efforts on a timeline helps pinpoint when anomalies were detected, how they were identified, what response measures were taken, whether all relevant teams were promptly engaged, and if escalation scenarios were followed.<\/p>\n<p>The answers to these questions should be documented meticulously, referencing factual data like SIEM logs, timestamps for task creation in the task manager, timestamps for emails being sent, and so on. This enables you to build a comprehensive and detailed picture, allowing for collective evaluation of both the speed and effectiveness of each response step.<\/p>\n<p>It\u2019s also necessary to separately assess an incident\u2019s impact on other aspects of the business, such as continuity of operations, data integrity and leaks, financial losses (both direct and indirect), and company reputation. This will help balance the scale and cost of the incident against the scale and cost of measures to strengthen information security.<\/p>\n<h2>Identifying strengths and weaknesses<\/h2>\n<p>Technical incident reports may seem to contain all the information you need, but in reality they often lack crucial organizational context. A report might state that attackers accessed the system by exploiting a certain vulnerability, and that the organization needs to patch said vulnerability on all servers. However, this superficial analysis overlooks critical questions: How long did this vulnerability remain unpatched after it was disclosed? What other known vulnerabilities exist on the servers? What are the agreed-upon patching SLAs between IT and cybersecurity? Does vulnerability prioritization exist within the company?<\/p>\n<p>Each stage and process affected by the incident deserves this level of scrutiny. This holistic approach allows to assess the security landscape flaws that enabled the incident. It\u2019s important not to focus solely on the negatives: if certain teams responded quickly and effectively or if existing processes\/technologies aided in incident detection or mitigation, these aspects should also be analyzed to understand whether this positive experience can be applied elsewhere.<\/p>\n<p>Human error and behavioral factors warrant special attention. What role did they play? Again, the goal isn\u2019t to blame but to identify measures to mitigate or balance the inevitable impact of human factors in the future.<\/p>\n<h2>Planning for improvement<\/h2>\n<p>This is the most creative and organizationally challenging phase of the incident review. It requires developing effective, realistic steps to address weaknesses within resource constraints. Involving senior management in this process is especially beneficial \u2014 as the saying goes, cybersecurity budgets are never approved faster than after a major incident. Several aspects should be considered in the plan:<\/p>\n<p><strong>IT asset map update.<\/strong> The incident may have revealed a lot of new information about how the company\u2019s data is processed and how processes are implemented in general. It\u2019s often necessary to update priorities, reflecting a better understanding of which assets require the most protection.<\/p>\n<p><strong>Detection and response technologies.<\/strong> By analyzing which stages of the attack went undetected by defenders, and which technical measures were missing to stop the attack\u2019s progression, the team can plan to implement additional security tools, such as <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">EDR<\/a>, , and NGFW. Sometimes it becomes clear that while the necessary tools seem to be in place, they lack automation (for example, automated response playbooks), or data streams (such as <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/threat-intelligence?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">threat intelligence<\/a> feeds). Or, perhaps, log storage practices facilitated their wholesale deletion by the attackers. Technology enhancements should receive special attention if the analysis showed that defenders spent an excessive amount of time manually searching for compromised hosts or other laborious tasks, lacked access to critical information, or didn\u2019t have the tools for enterprise-wide response.<\/p>\n<p><strong>Processes and policies.<\/strong> Having determined whether the incident occurred due to violations of existing policies or their absence, it\u2019s essential to address this by revisiting the entire chain of events, correcting any identified process deficiencies, and reflecting these corrections in the security policy. Ranging from processes, policies, and regulatory timelines for vulnerability and account management, to incident response playbooks \u2014 the revised company processes should ensure the prevention of any similar future incidents.<\/p>\n<p>The overall incident response plan should also be updated and refined based on practical experience. It\u2019s important to clarify which parties were unable to fully participate in the process, and how to organize rapid communication between them to ensure swift decision-making in emergencies.<\/p>\n<p><strong>Proactive measures: technology.<\/strong> Incidents provide an opportunity to take a fresh look at existing practices for account management and patch management. Step-by-step improvements should be planned in areas where the company hasn\u2019t followed best practices: implementing the principle of least privilege and <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-benefit-from-identity-security\/48399\/\" target=\"_blank\" rel=\"noopener nofollow\">centralized identity management<\/a>, and prioritizing and systematically <a href=\"https:\/\/www.kaspersky.com\/blog\/top-exploited-vulnerabilities-cve-2023-q1-2024\/51317\/\" target=\"_blank\" rel=\"noopener nofollow\">addressing key infrastructure vulnerabilities<\/a>.<\/p>\n<p><strong>Proactive measures: people.<\/strong> Each human error requires <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">corrective measures<\/a> \u2014 targeted training or even drills tailored to individual roles. It\u2019s worth discussing what training is necessary for specific individuals, departments, or the entire organization. A major incident can be a powerful wake-up call, emphasizing the importance of information security and driving engagement in cybersecurity awareness training, even among those who usually downplay its importance.<\/p>\n<p>Following updated processes may be more challenging \u2014 requiring a special effort in training. Reminders from management and an incentive program may be necessary to ensure the updated regulations are fully adopted.<\/p>\n<h2>Preparing for the next incident<\/h2>\n<p>All of the measures listed above will enhance cybersecurity resilience, and readiness for incidents \u2014 in theory. But to be sure of the result, it\u2019s worth validating their effectiveness through cybersecurity exercises, <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/penetration-testing?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">penetration testing<\/a>, or red teaming. These simulations of real cyber-incidents serve different purposes, so which combination is most suitable depends on the organization and the measures taken post-incident.<\/p>\n<p>Implementing all the improvements and updated security measures can be a lengthy, phased process, so regular meetings with all involved parties are necessary to collect feedback, discuss implementation, address challenges, and explore further security enhancements. To ensure these meetings are not mere empty talk, it\u2019s essential to agree on specific metrics and milestones to track progress effectively.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>Analyzing incidents and drawing lessons from them should be an integral part of the incident response process. This can help improve the overall security level of a company.<\/p>\n","protected":false},"author":2722,"featured_media":23540,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[346,2506,2373,2793,131],"class_list":{"0":"post-23539","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-education","10":"tag-incident-response","11":"tag-incidents","12":"tag-response","13":"tag-tips"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/post-incident-lessons\/23539\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/post-incident-lessons\/28288\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/post-incident-lessons\/28424\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/post-incident-lessons\/38512\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/post-incident-lessons\/52599\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/post-incident-lessons\/28491\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/post-incident-lessons\/34379\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/post-incident-lessons\/34004\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/incident-response\/","name":"incident response"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=23539"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23539\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/23540"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=23539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=23539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=23539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}