{"id":754,"date":"2021-07-09T15:32:28","date_gmt":"2021-07-09T12:32:28","guid":{"rendered":"https:\/\/hygger.io\/guides\/?p=754"},"modified":"2022-01-26T11:18:51","modified_gmt":"2022-01-26T08:18:51","slug":"incident-response","status":"publish","type":"post","link":"https:\/\/hygger.io\/guides\/agile\/software-development\/incident-response\/","title":{"rendered":"Incident Response"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Reputation, customer trust, and revenue are the factors that should be constantly monitored and taken care of. When they are at stake, it is critical for any business to identify and timely respond to security incidents and events.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Regardless of the size,\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/hygger.io\/guides\/agile\/software-development\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Agile software development<\/span><\/a><span data-preserver-spaces=\"true\">\u00a0companies need to have an incident response plan in place to reduce the risks of being a victim of any cyber-attack.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A well-prepared incident response strategy defines a breach, steps that need to be taken to address a security incident, roles and responsibilities of the security team, appropriate tools for managing the problem, and the notification requirements following a data breach.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Below we describe the incident response methodology, all essential incident response procedures, best practices, and benefits of an incident response plan. Dive in and learn more about this important process for any software development company.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21329\" src=\"https:\/\/hygger.io\/wp-content\/uploads\/2021\/07\/yX14WLBBgDr6kLPhBR5dHApmfLokbMJqkNGACkS1-1.png\" alt=\"The basics of Incident Response\" width=\"1500\" height=\"900\" \/><\/p>\n<h2>What is Incident Response?<\/h2>\n<p>Incident response is an organized process of addressing the aftermath of a security breach or cyberattack. This also includes the way the company attempts to manage the consequences of the breach or attack. This approach is also known as an IT incident, security incident, or computer incident.<\/p>\n<h3>What is the goal of incident response?<\/h3>\n<p>First of all, the goal is to effectively manage the incident, limit damages, and reduce recovery time and costs. Secondly, it is also about keeping at minimum collateral damage such as brand reputation.<\/p>\n<p>In fact, IR implies making a plan before it is necessary. It helps the company to ensure that it can make quick decisions with reliable info.<\/p>\n<h3>Who is the incident response team?<\/h3>\n<p>Cyber incident response activities should be ideally conducted by a company&#8217;s computer security incident response team (CSIRT). It is also known as a cyber incident response team.<\/p>\n<p>This team should include information security, general IT staff, and members from top management. However, representatives from the HR, legal, and public relations departments can be also involved.<\/p>\n<p>The team follows the company&#8217;s incident response plan (IRP), which contains written instructions on how to react in case of network events, confirmed breaches, and security incidents.<\/p>\n<h3>What is the importance of incident response?<\/h3>\n<p>Any incident activity that is not handled properly can escalate into a bigger problem. This problem will definitely lead to a damaging data breach, system collapse, and large expenses, of course. When an organization responds quickly, it has chances to minimize losses, restore services and processes, mitigate exploited vulnerabilities, and reduce risks.<\/p>\n<p>This process helps companies to be prepared for both the known and the unknown. It is a reliable way to identify a security incident immediately when it occurs.<br \/>\nMost businesses rely on sensitive information that would be detrimental if compromised. Incidents may range from simple malware infections to complex problems. And any incident may have short- and long-term effects that can impact the success of the entire company.<\/p>\n<p>Pay special attention to the things that can be done in advance to brace yourself for the impact of a security incident.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21330\" src=\"https:\/\/hygger.io\/wp-content\/uploads\/2021\/07\/Toxic-people_02@2x.jpg\" alt=\"The incident response team\" width=\"2000\" height=\"1200\" \/><\/p>\n<h2>Consistent Steps for Effective Incident Response<\/h2>\n<p>There are six steps for successful cyber incident response, proposed by the SANS Institute:<\/p>\n<h3>1. Preparation<\/h3>\n<p>This is the first stage of incident response that is really important. With thorough preparation, companies can determine how well their CIRT will be able to respond to incidents. It should contain determining the CIRT members, a policy, response plan, documentation, access control, and tools.<\/p>\n<h3>2. Identification<\/h3>\n<p>This stage includes the process through which incidents are detected to enable rapid response and therefore reduce damages and costs. The IT staff gathers events from log files, intrusion detection systems, monitoring tools, error messages, and firewalls to detect and manage incidents and their scope.<\/p>\n<h3>3. Containment<\/h3>\n<p>The key goal of this stage is to contain the damage and prevent further damage from occurring. The earlier you detect incidents, the sooner they can be contained to minimize damage.<\/p>\n<h3>4. Eradication<\/h3>\n<p>This stage entails removing the threat and restoring affected systems to their previous state, ideally while minimizing data loss. The measures that not only remove the malicious content but also ensure that the affected systems are completely clean should be taken.<\/p>\n<h3>5. Recovery<\/h3>\n<p>Recovery includes testing, monitoring, and validating systems while putting them back into production with the aim to verify that they are ok. Recovery is also about decision-making in terms of the time and date to restore important operations.<\/p>\n<h3>6. Lessons learned<\/h3>\n<p>The final phase of IT incident management helps you to educate and improve future incident response efforts. Lessons learned reports are a clear review of the entire incident. They can be used during recap meetings or as training materials for new CIRT members.<\/p>\n<h2>What Is IRP &#8211; the Incident Response Plan?<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-21331\" src=\"https:\/\/hygger.io\/wp-content\/uploads\/2021\/07\/Toxic-people_03@2x.jpg\" alt=\"What is Incident Response?\" width=\"2000\" height=\"1200\" \/><\/p>\n<p>An incident response plan is a set of documented procedures that detail the steps that should be taken in every phase of IR. This plan usually contains the guidelines for roles and responsibilities, communication, and standardized response protocols. Creating IRP, use clear language and determine any ambiguous terms.<\/p>\n<h3>Incident response plan management<\/h3>\n<p><span data-preserver-spaces=\"true\">Incident response requires thoughtful planning, ongoing oversight, and clear metrics that will let efforts be properly measured. Your IRP must be periodically tested to ensure its effectiveness. You should also consider training all the necessary parties on applicable incident response procedures.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">What are the specific metrics used to measure the effectiveness of incident response initiatives? Here are several key ones:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">The number of incidents detected<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">The number of repeat incidents<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">The number of incidents missed<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">The number of incidents that require action<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">The number of incidents that led to breaches<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">The remediation timeframe<\/span><\/li>\n<\/ul>\n<h2>Five Steps to Creating an Incident Management Plan<\/h2>\n<h3>1. Identify all critical components of your network<\/h3>\n<p>Prioritize their backup and note their locations. It will help you to recover the network quickly.<\/p>\n<h3>2. Determine single points of failure and address them<\/h3>\n<p>Having a plan B for every critical component of your network is actually a good idea. Single points of failure may expose the network when an incident strikes, so try to quickly address them with redundancies or software failover features.<\/p>\n<h3>3. Generate a workforce continuity plan<\/h3>\n<p>Remember that employee safety has a top priority. Ensure their safety and limit business downtime by enabling them to work remotely.<\/p>\n<h3>4. Write an IR plan<\/h3>\n<p>The incident response plan may include a list of roles and responsibilities for the IR team members, a summary of the tools and physical resources that must be in place, a business continuity plan, a list of critical network and data recovery processes, etc.<\/p>\n<h3>5. Train the staff<\/h3>\n<p>It is crucial that everyone in your company understands the importance of the plan. Do not forget to educate your staff about IR.<\/p>\n<h2>Incident Response Best Practices<\/h2>\n<h3>Creating playbooks<\/h3>\n<p>Creating playbooks will teach your CSIRT team how to sort different kinds of incidents and gather proper evidence. Just accent your attention on the common attack scenarios that organizations face (DDoS, Malware, Unauthorized access, Phishing, etc.). Outline in this doc what triggers an escalation to the incident management team and recommend what evidence needs to be gathered.<\/p>\n<h3>Performing cyber threat exercises<\/h3>\n<p>You should be prepared for the real things by playing various attack scenarios. This can even be as simple as doing some training exercises.<\/p>\n<p>Generating different attack scenarios is a good way to test any playbooks that have been put in place. Additionally, it will help to define any gaps in an incident response plan.<\/p>\n<h3>Initiating threat hunting<\/h3>\n<p>A proactive search of suspicious activities is the point where your incident response team begins to mature. People who perform these ad hoc investigations really develop their investigative mindset. These skills are exactly what is required during the identification phase of an incident.<\/p>\n<h3>What are the tools for an incident response procedure?<\/h3>\n<p><span data-preserver-spaces=\"true\">Nowadays you can easily find a variety of powerful and competitive tools and methods that can be used to assist with incident response. They are typically categorized by detection, prevention, and response functionalities.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Some companies actively use the military-derived OODA loop for this aim. This is an approach that encourages a business to observe, orient, make proper decisions, and act when an incident occurs applying commonly used IR tools for assistance.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">There are also special tools that allow companies to act against threats by stopping them from spreading or minimizing the impact they have on the computing environment. Modern technologies can be successfully used to automate and streamline specific incident response functions to minimize detection times and system errors.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Incident response tools and services are usually divided into the following categories:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">security incident and event management<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">endpoint security management<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">employee awareness and training<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">vulnerability management<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">forensics analysis<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">firewall, intrusion prevention, and DoS mitigation<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">net flow and traffic analysis<\/span><\/li>\n<\/ul>\n<p><span data-preserver-spaces=\"true\">These robust tools provide businesses with both visibility and control providing security teams with the essential info they need to know to handle the anomalous behavior.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">After all, the IR tools assist with direct response efforts allowing companies to minimize the risks involved.<\/span><\/p>\n<h4>Conclusion<\/h4>\n<p>No one wants to go through a data breach or any security risk, but it\u2019s essential to plan for them. Prepare for it, and be aware of what to do when it happens.<br \/>\nThe faster your company can detect and respond to a problem, the less likely it will have a serious impact on your data, reputation, customer trust, and a potential loss in revenue. If there is no incident response process in place in your organization, consider leveraging a third-party managed security tool.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reputation, customer trust, and revenue are the factors that should be constantly monitored and taken care of. When they are at stake, it is critical for any business to identify and timely respond to security incidents and events. Regardless of the size,\u00a0Agile software development\u00a0companies need to have an incident response plan in place to reduce [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":342,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"class_list":["post-754","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software-development"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"An organized approach to addressing and managing security breaches and cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hygger.io\/guides\/agile\/software-development\/incident-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Incident Response? - Hygger.io Guides\" \/>\n<meta property=\"og:description\" content=\"An organized approach to addressing and managing security breaches and cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hygger.io\/guides\/agile\/software-development\/incident-response\/\" \/>\n<meta property=\"og:site_name\" content=\"Hygger.io Guides\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-09T12:32:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-26T08:18:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hygger.io\/guides\/wp-content\/uploads\/2021\/04\/agile.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"8 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hygger.io\/guides\/#website\",\"url\":\"https:\/\/hygger.io\/guides\/\",\"name\":\"Hygger.io Guides\",\"description\":\"Hygger: Project Management Software &amp; Tools for Companies\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/hygger.io\/guides\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/hygger.io\/guides\/agile\/software-development\/incident-response\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/hygger.io\/guides\/wp-content\/uploads\/2021\/04\/agile.png\",\"contentUrl\":\"https:\/\/hygger.io\/guides\/wp-content\/uploads\/2021\/04\/agile.png\",\"width\":1400,\"height\":300,\"caption\":\"Agile\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hygger.io\/guides\/agile\/software-development\/incident-response\/#webpage\",\"url\":\"https:\/\/hygger.io\/guides\/agile\/software-development\/incident-response\/\",\"name\":\"What is Incident Response? - Hygger.io Guides\",\"isPartOf\":{\"@id\":\"https:\/\/hygger.io\/guides\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hygger.io\/guides\/agile\/software-development\/incident-response\/#primaryimage\"},\"datePublished\":\"2021-07-09T12:32:28+00:00\",\"dateModified\":\"2022-01-26T08:18:51+00:00\",\"author\":{\"@id\":\"https:\/\/hygger.io\/guides\/#\/schema\/person\/cab80745946cdf5feea0cee70ab6cffc\"},\"description\":\"An organized approach to addressing and managing security breaches and cyberattacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/hygger.io\/guides\/agile\/software-development\/incident-response\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hygger.io\/guides\/agile\/software-development\/incident-response\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hygger.io\/guides\/agile\/software-development\/incident-response\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hygger.io\/guides\/\",\"url\":\"https:\/\/hygger.io\/guides\/\",\"name\":\"\\u0413\\u043b\\u0430\\u0432\\u043d\\u0430\\u044f \\u0441\\u0442\\u0440\\u0430\\u043d\\u0438\\u0446\\u0430\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@id\":\"https:\/\/hygger.io\/guides\/agile\/software-development\/incident-response\/#webpage\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/hygger.io\/guides\/#\/schema\/person\/cab80745946cdf5feea0cee70ab6cffc\",\"name\":\"Pavel Kukhnavets\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/hygger.io\/guides\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1c304a131d7d560805a98b095abf6816b67434834ab4109340b1e6dfa4061a1b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1c304a131d7d560805a98b095abf6816b67434834ab4109340b1e6dfa4061a1b?s=96&d=mm&r=g\",\"caption\":\"Pavel Kukhnavets\"},\"description\":\"Pavel is a Content Marketing Manager at Hygger.io &amp; Welldoneby.com, a project management tool loved both by tech and non-tech people. Pavel writes about the world of Agile project management, covering such topics as popular methodologies, frameworks, techniques, innovative tools, and much more that affect the overall efficiency and productivity of product teams.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/hygger.io\/guides\/wp-json\/wp\/v2\/posts\/754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hygger.io\/guides\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hygger.io\/guides\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hygger.io\/guides\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/hygger.io\/guides\/wp-json\/wp\/v2\/comments?post=754"}],"version-history":[{"count":7,"href":"https:\/\/hygger.io\/guides\/wp-json\/wp\/v2\/posts\/754\/revisions"}],"predecessor-version":[{"id":1143,"href":"https:\/\/hygger.io\/guides\/wp-json\/wp\/v2\/posts\/754\/revisions\/1143"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hygger.io\/guides\/wp-json\/wp\/v2\/media\/342"}],"wp:attachment":[{"href":"https:\/\/hygger.io\/guides\/wp-json\/wp\/v2\/media?parent=754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hygger.io\/guides\/wp-json\/wp\/v2\/categories?post=754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}