Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan (e-book) Chełmek

Any good attacker will tell you that expensive security monitoring and prevention tools aren...t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic …

od 152,15 Najbliżej: 47 km

Liczba ofert: 1

Oferta sklepu

Opis

Any good attacker will tell you that expensive security monitoring and prevention tools aren...t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You...ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone.Written by members of Cisco...s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.Learn incident response fundamentals-and the importance of getting back to basicsUnderstand threats you face and what you should be protectingCollect, mine, organize, and analyze as many relevant data sources as possibleBuild your own playbook of repeatable methods for security monitoring and responseLearn how to put your plan into action and keep it running smoothlySelect the right monitoring and detection tools for your environmentDevelop queries to help you sort through data and create valuable reportsKnow what actions to take during the incident response phase Spis treści: Foreword Preface Should You Read This Book? Why We Wrote This Book Cut to the Chase How to Navigate This Book Additional Resources Conventions Used in This Book Safari Books Online How to Contact Us Acknowledgments 1. Incident Response Fundamentals The Incident Response Team Justify Your Existence Measure Up Whos Got My Back? Friends on the Outside The Tool Maketh the Team Choose Your Own Adventure Buy or Build? Run the Playbook! Chapter Summary 2. What Are You Trying to Protect? The Four Core Questions There Used to Be a Doorway Here Host Attribution Bring Your Own Metadata Identifying the Crown Jewels Make Your Own Sandwich More Crown Jewels Low-Hanging Fruit Standard Standards Risk Tolerance Can I Get a Copy of Your Playbook? Chapter Summary 3. What Are the Threats? The Criminal Is the Creative Artist; the Detective Only the Critic Hanging Tough Cash Rules Everything Around Me Greed.isGood(); I Dont Want Your Wallet, I Want Your Phone Theres No Place Like 127.0.0.1 Lets Play Global Thermonuclear War Defense Against the Dark Arts Chapter Summary 4. A Data-Centric Approach to Security Monitoring Get a Handle on Your Data Logging Requirements Just the Facts Normalization Playing Fields Fields in Practice Fields Within Fields Metadata: Data About Data About Data Metadata for Security Blinded Me with [Data] Science! Metadata in Practice Context Is King Chapter Summary 5. Enter the Playbook Report Identification Objective Statement Result Analysis Data Query/Code Analyst Comments/Notes The Framework Is CompleteNow What? Chapter Summary 6. Operationalize! You Are Smarter Than a Computer People, Process, and Technology Trusted Insiders Dont Quit the Day Job Critical Thinking Systematic Approach Playbook Management System Measure Twice, Cut Once, Then Measure Again Report Guidelines Reviewing High-Fidelity Reports in Theory Reviewing Investigative Reports in Theory Reviewing Reports in Practice Event Query System Result Presentation System Incident Handling and Remediation Systems Case Tracking Systems Keep It Running Keep It Fresh Chapter Summary 7. Tools of the Trade Defense in Depth Successful Incident Detection The Security Monitoring Toolkit Log Management: The Security Event Data Warehouse Deployment considerations Intrusion Detection Isnt Dead Deployment considerations Inline blocking or passive detection Location, location, location Lets look at real-world examples Limitations HIP Shot Deployment considerations Lets look at real-world examples Limitations Hustle and NetFlow Deployment considerations 1:1 versus sampled NetFlow on steroids Lets look at real-world examples Limitations (and workarounds) Realities of expiration Directionality Device support UDP DNS, the One True King Deployment considerations Little P, big DNS Client queries Server responses RPZed Four policy triggers to rule them all Dont block; subvert Lets look at real-world examples Limitations HTTP Is the Platform: Web Proxies Deployment considerations Threat prevention Lets look at real-world examples Backdoor downloads and check-ins Exploit kits Limitations [rolling] Packet Capture Deployment considerations Lets look at real world examples Limitations Applied Intelligence Deployment considerations Lets look at real-world examples Limitations Shutting the Toolbox Putting It All Together Chapter Summary 8. Queries and Reports False Positives: Every Playbooks Mortal Enemy There Aint No Such Thing as a Free Report An Inch Deep and a Mile Wide A Million Monkeys with a Million Typewriters A Chain Is Only as Strong as Its Weakest Link Detect the Chain Links, Not the Chain Getting Started Creating Queries Turning Samples of Malicious Activity into Queries for Reports Reports Are Patterns, Patterns Are Reports The Goldilocks-Fidelity Exploring Out of Sight of Land Sticking with What You Know Inverting Known Good Looking for Things Labeled as Bad Intelligence: A smart addition to your playbook Basics are 90% of the game Chapter Summary 9. Advanced Querying Basic Versus Advanced The False Positive Paradox Good Indications Consensus as an Indicator (Set Operations and Outlier Finding) Set Operations for Finding Commonalities Finding Black Sheep Statistics: 60% of the Time, It Works Every Time Skimming the IDS Flotsam Off the Top Pulling Patterns Out of NetFlow Horizontal Scanning Vertical Scanning Looking for Beaconing with Statistics Is Seven a Random Number? Correlation Through Contingent Data Who Is Keyser Söze? Guilty by Association Chapter Summary 10. Ive Got Incidents Now! How Do I Respond? Shore Up the Defenses Lockdown The Fifth Estate No Route for You Not Your Bailiwick One Potato, Two Potato, Three Potato, Yours Get to the Point Lessons Learned Chapter Summary 11. How to Stay Relevant Oh, What a Tangled Web We Weave, When First We Practice to Deceive! The Rise of Encryption Encrypt Everything? Catching the Ghost TL;DR Index

Specyfikacja

Podstawowe informacje

Autor
  • Jeff Bollinger, Brandon Enright, Matthew Valites
Rok wydania
  • 2015
Ilość stron
  • 276
Kategorie
  • Hacking
Wybrane wydawnictwa
  • O'Reilly Media