Checklist B

Resources to Create in Advance

The following sections outline a general checklist for resources to have available before a cyber extortion crisis, so that you can make informed decisions and implement an effective response. These include plans, procedures, contact information, templates, technology, credentials, and reference materials.

Full response programs are ideal, but if you have not had time to create these, start with the items listed in the checklist that follows. These are simply general guidelines; modify and adapt them to suit your environment.

Note that you will almost certainly need to call in outside help during your recovery process. Make sure to have documentation for key activities that outside parties can follow, even if they aren’t intimately familiar with your environment.

Images

Tip

Make sure response plans and documents are available even if your entire technology environment is down. The best methods for doing this vary depending on the organization, but it can be as simple as copying the information to encrypted USBs and storing them offline at different locations. Review your options and consider how you will access information in the worst-case scenarios.

Response plans that clearly delineate:

  • Images Roles and responsibilities (described in Section 4.3), with key details such as:

    • Who coordinates the response and is empowered to make decisions?

    • Who can make financial decisions in a crisis (such as whether to purchase new equipment/software, pay a ransom, etc.)?

    • Who will decide which evidence to preserve, and which not to preserve?

    • Who drafts and approves internal and external communications, such as statements to the media, key stakeholders, regulators, and more? (Typically, public relations and your breach coach should be involved, at a minimum.)

    • Who is responsible for notifying responders and stakeholders, from outside IT consultants to the board of directors? (You may want to establish a phone tree.)

    • Backup assignments for each task (in case a person is out or there is a need for schedule rotation).

  • Images Triage guidelines for first responders, such as:

  • Images Defined incident management and escalation processes

  • Images Documentation processes for responders

  • Images Notification obligations, including requirements for contacting insurers, regulators, government agencies, and other parties

Crisis communications plans that address:

Specific procedures for tasks such as:

  • Images Evidence collection, including clear, specific steps for gathering and preserving evidence

  • Images Backing up various device configurations, and rolling back changes if needed

  • Images Restoration of data and systems (It’s important to test this in advance and keep it up to date!)

  • Images Conducting an investigation, including adversary research, scoping, and breach investigation

Contact information for the response team, leadership, and third parties:

Internal staff

  • Images IT

  • Images Legal

  • Images Cybersecurity

  • Images Finance

  • Images Executive team

  • Images Public relations

  • Images Board of directors contact

External parties

  • Images Managed services providers (MSPs) and technology vendors

  • Images Cyber insurance claims hotline/form

  • Images Breach coach/cyber attorney

  • Images Incident response/forensics firm

  • Images Ransom negotiator

  • Images Bank

  • Images Public relations firm

  • Images Law enforcement (FBI, Secret Service, police department)

  • Images Regulators

Make sure to include after-hours contact information in case it is needed and keep the contact list up-to-date.

Templates for use throughout the response:

  • Images Response strategy templates to be filled out and periodically updated during the crisis.

  • Images Communications templates that have been preapproved by legal counsel, public relations specialists, and the leadership team. These may include public notification templates to use in the event of a potential cybersecurity incident, sample communications for human resources personnel to use with employees, templates for regulator notifications, and more.

Technology to support response efforts:

  • Images Effective detection systems. The earlier an incident is detected, the easier it is to minimize damage. Ensure that the organization has detection mechanisms in place, such as endpoint detection and response (EDR), network detection and response (NDR), antivirus, and more. Note that adversaries often strike after normal business hours, on holidays, and on weekends. It is not enough to simply have detection systems installed; today’s organizations need 24/7 monitoring for potential incidents.

  • Images Centralized incident documentation system, such as ticketing software

  • Images Centralized monitoring and logging systems

  • Images Threat hunting software, such as EDR, security information and event management (SIEM), vulnerability scanners, and other tools

  • Images Evidence preservation tools appropriate for the types of systems in use, such as imaging software/hardware and cloud-based log export utilities

  • Images Backup and restoration tools

  • Images Credentials and methodology for accessing:

    • Monitoring and logging systems

    • Threat hunting software

    • Backup and restoration tools

    • Network equipment

    • Cloud applications

    • Workstations, servers, and other infrastructure

Reference materials:

  • Images Network diagrams that illustrate key servers, network devices, cloud repositories, and interconnections

  • Images Inventory of servers, cloud assets, and key data repositories, along with information about who has administrative access

  • Images Data and asset classification policy

  • Images Accurate, up-to-date list of all employees, users, roles, and accounts

  • Images List of available sources of evidence, along with retention times and prioritization guidelines for various types of incidents (Make sure to get input from the organization’s selected breach coach ahead of time.)

  • Images Documentation describing any key dependencies or the order of operations that would be important for restoring the technology environment and access to data

  • Images Backups and documentation of network device and server configurations, account lists, domain structure, etc.

  • Images “Gold standard” images of workstations, servers, and network devices, to facilitate quick redeployment

  • Images Prioritized list of business functions and systems needed to support them, reviewed and approved by the organization’s leadership in advance

  • Images Copy of the cyber insurance policy, including a summary of key requirements that may affect the response

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset