🕹️
Ghoulsec Vault
Website Toolbase
  • Welcome !
  • 🗃️Exam Prep Notes
    • 📔CEH V13 (Master Edition)
      • Module 02: Footprinting and Reconnaissance
      • Module 03: Scanning Networks
      • Module 04: Enumeration
      • Module 05: Vulnerability Analysis
      • Module 06: System Hacking
      • Module 07: Malware Threats
      • Module 08: Sniffing
      • Module 09 : Social Engineering
      • Module 10: Denial of Service
      • Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls , Honeypots
      • Module 13: Hacking web servers
      • Module 14: Hacking Web Applications
      • Module 15:SQL Injection
      • Module 16: Wireless Attacks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT & OT Hacking
      • Module 19 : Cloud Computing
      • Module 20 : Cryptography
    • 📘ISC2 -Certified in Cyber Security
      • Chapter -1 Security Principals
      • Chapter -2 Disaster Recovery,Business Continuity & Incident Response
      • Chapter -3 Access Control Concepts
      • Chapter -4 Network Security
      • Chapter -5 Security Operations
    • 📗AZ - 900
      • Basics of Cloud Computing
        • Economic of Scale
        • CapEx & OpEx
        • Consumption based model
        • Cloud Deployment Models
        • Shared Responsibility Model
        • Data centers, Regions & Availability Zones & Geographyies in Azure
        • Resources & Resource Group
        • Azure Access Tools
        • Azure Service Lifecycle
        • Azure SLAs
        • Azure Cloud Adoption Framework
      • Azure Services
        • Azure Computing Services
        • Azure Networking Services
        • Azure Storage Services
        • Azure Database Service
        • Azure Marketplace
        • Big Data & Azure
        • Azure Serverless Computing
        • IoT & Azure
        • Other Azure Services
        • Azure Resource Locks & Resource Tags
        • Azure Security Services
          • Security Groups
          • Routing Tables
          • Azure Firewall
          • Azure DDOS Protection
          • Azure Identity & Access Management (Azure AD)
          • Azure RBAC
          • Azure Security Center
          • Azure Key Vault
      • Azure policies & Blueprints
      • Azure Cost Management
      • Azure Core Tenents
    • 📗SC - 900
      • Zero Trust Model
      • Shared Responsibility Model
      • Defense in Depth
      • Security Controls
      • CIA Triad
      • Encryption / Hashing / Signing
      • Microsoft Security & Compliance Principals
      • Common Identity Attacks
      • Microsoft Identity as Primary Security Perimeter
      • Modern Authentication with Azure AD
      • Azure AD Identity Types
      • Azure External Identities
      • Hybrid Identities
      • Authentication Methods & Password Protection
      • Conditional Access
      • Azure AD Roles & RBAC
      • Governance in Azure AD
      • Azure Identity Protection
      • Azure NSG, DDOS, Firewall
      • Azure Bastion & Keyvault
      • Azure Encryption
      • Azure CSPM
      • Azure Security Center
      • Azure Defender
        • Microsoft O365 Defender
        • Azure Sentinel
      • Microsoft Cloud App Security
      • Microsoft Intune
      • Microsoft Complaince Manager
      • Information Protection
      • Microsoft insider risk capabilities
    • 📔AWS Cloud Practitioner
      • Cloud Deployment
        • AWS Global Infrastructure
      • AWS Cloud Essentials
        • AWS SNS
          • AWS SQS
      • AWS Compute & Container Services
        • AWS EC2
          • Elasticity & Agility
        • AWS Serverless Computing
        • AWS Container Services
        • AWS Beanstalk
        • AWS Load Balancing
      • AWS Storage & Databases
      • AWS Networking
      • AWS Security
        • AWS Organisation
        • AWS Compliance
        • AWS DDOS
        • Additional Security Services
      • AWS Monitoring & Analytics
        • Other Analytics Services
      • AWS Pricing & Support
      • AWS Migration & Innovation
        • Migration Statergies
        • AWS Snow Family
        • AWS Transfer Family
        • Innovation on AWS
      • AWS Well Architecture Framework
      • Other AWS Services
  • 🧑‍💻Cyber Security Base
    • Ghoul's Den
    • Cheatsheets
    • SSL Handbook
      • Installing OpenSSL
      • Encrypting Web Servers using SSL
      • Compiling .pfx file using openssl
      • De-compiling .pfx file
      • Zimbra Mail Server SSL renew
      • SSL Certificates
    • ☁️Cloud Security
      • Amazon Web Services (AWS)
        • AWS - IAM & Policy Management
        • AWS Organization
        • AWS - Roles (Assume Role)
        • AWS - EC2 (Elastic Computing)
        • AWS - VPC
        • AWS - Bastion Host
        • AWS Application Load Balancer
        • AWS Auto Scaling Group
        • AWS WAF
        • AWS - VPC Peering
        • AWS Transit Gateway
        • AWS NAT Gateway
        • AWS - Route 53
        • AWS Certificates Manager
        • AWS Network Load Balancer (NLB)
    • 🕸️Network Security
      • Firewalls
        • Sophos - Security Suite
          • Sophos Firewalls
      • VPN
        • VPNs
          • Wireguard Tunneling
          • StrongSwan Gateway VPN Server on Ubuntu
      • IP Address and IP Subnetting
      • Basic to Advance Networking Materials
    • 🧑‍💻VAPT
      • Sample Report Templete
      • OWASP
        • OWASP Web Application Security & WebGoat
      • Web Application testing checklist
        • Client Side Penetration Testing
          • Clickjacking
          • Websockets
          • CSRF
          • XSS Filters
        • Server Side Penetration Testing
        • Advanced Web Application Pentesting
          • OAuth
          • JWT Injection
          • Server Side Templete Injection
    • ☄️GRC
      • ISMS AUDIT PLAN
      • CIS Compliance Windows
    • 🔍Forensic
      • Forensic Tools
      • EMAIL Forensics
      • File header forensics
    • Trend Micro
      • Deep Security
        • Installation & Prerequisite
          • Microsoft SQL server 2022
          • Postgres 16 Core
          • Installation
    • Practical Malware Analysis & API Threats
  • 🕹️Server are fun !
    • Securing Linux
      • Securing SSH
      • Sudoers
      • UFW (Uncomplicated FW)
      • Unattended Upgrades
      • Password Complexiety
      • Auditing Linux
      • Samba - SMB
      • NFS - Network File System
      • FTP
      • AIDE
    • Servers
      • Linux Sever
        • OpenLDAP Server Setup
          • ldap-account-manager
          • Securing OpenLDAP
          • OpenLDAP client setup
          • Checking LDAP setup
        • Users & Groups
        • Password Policy
        • File & File Permissions
        • Automatic Updates
        • Adding GUI to Ubuntu Server
        • DNS Server
        • NTP Server
      • Windows Sever
        • Deep dive into Windows Server
        • Windows server Installation
        • Disable IPv6
        • Disable Server Manager on startup
        • Promoting OS to AD server
        • AD DNS
        • AD DHCP
        • AD Activation
        • AD Users & Groups
        • AD FileServer
        • Adding Users into AD
        • Bulk Importing users into Domain
        • Windows AD Resources
        • Group Policy Editor
          • Creating First Policy
          • Restricting CMD & Powershell
          • Password Policies
          • Audit Policies
          • Log Retention Policy
          • Windows Defender Firewall
          • Patch Management & Window Updates
        • Setting Up local accounts for windows hosts
    • Hacking Systems
      • Linux Systems
        • Battery Charge Threshold (Linux)
        • Metasploitable OS Complete Solved
      • Tricking Windows
        • Bitlocker & Time based policy bypass
    • Monitoring HeartBeats
    • RAID Technology
    • Managing Partitions
      • Parted
      • Fdisk
      • LVM
        • Re-claiming unused disk space
        • Adding physical volume into VG
        • Removing physical volume from VG
      • SWAP Memory
    • Virtualization
      • Proxmox
        • Proxmox VE Installation
        • Default Storage Expansion
        • Proxmox Network Link Aggegration
        • NAT Interface Configuration
        • Importing disk into proxmox
        • Creating an LVM Thin Pool
        • Proxmox IAM
  • 🙍‍♂️Dan the AI Expert
    • Ollama Ollama ...
      • Ollama
        • Ollama models
        • Open Web UI & Ollama Integration
    • Microsoft Presentation using AI
  • 🛡️Security Operations
    • Wazuh - Open Source XDR. Open Source SIEM.
      • Components
      • Deployment Methods
      • Installation
        • Single Node Installation
          • Wazuh Indexer Installation
          • Wazuh Server Installation
          • Wazuh Dashboard Installation
          • Single node deployment with Script
        • Managing multiple Wazuh clusters with Cross-Cluster Search
          • Cluster Configuration
          • Set up Cross-Cluster Search
        • Upgrading Wazuh Central Components
        • Uninstalling Wazuh
      • Custom Decoder & Rules
        • Pfsense Decoders
        • Pfsense Rules
      • Security Operations Center Tools (Wazuh)
    • IRIS-DFIR / Case Management
    • Graylog & ElasticSearch
    • Zabbix NMS
      • Zabbix Installation
      • Zabbix Database Management
        • Zabbix Database backup
        • Zabbix Database restore
        • MySQL Replication (M-M)
        • MySQL Replication (M-W)
      • Zabbix Geomap Setup
      • Adding Hosts into Zabbix
      • Zabbix Hostgroups
      • Auto Registration Hosts Zabbix
      • Zabbix Globalscrips
      • Zabbix HA Cluster
      • Zabbix Proxy
      • Zabbix Notifications
      • Zabbix Maintainance
      • Zabbix User Management & Authentication
      • Zabbix Housekeeping
      • Scheduled Reporting
      • Service Monitoring using Zabbix
  • Git the master!!
    • Configuring git
    • Git Branches
    • Undoing changes
    • Git - Cheat sheet
    • My first git...
Powered by GitBook
On this page
  • Incidence Response
  • Business Continuity
  • Disaster Recovery
  • Chapter Resources
  1. Exam Prep Notes
  2. ISC2 -Certified in Cyber Security

Chapter -2 Disaster Recovery,Business Continuity & Incident Response

PreviousChapter -1 Security PrincipalsNextChapter -3 Access Control Concepts

Last updated 1 month ago

Incidence Response

Incident Response (IR) is the process of managing and addressing security breaches or cyberattacks to minimize damage and reduce recovery time and costs. Below is an overview of the key terminology and components of Incident Response, along with the different models for an Incident Response Team (IRT).

Incident Response Terminology:

1

Breach

A breach occurs when an attacker gains unauthorized access to an organization's data, systems, or networks. It often involves the exposure or theft of sensitive information.

2

Event

An event refers to any observable occurrence in a system or network. It could be something as simple as a login attempt or a system restart. Not all events are security incidents, but they can indicate potential security issues.

3

Exploit

An exploit is a piece of code, technique, or vulnerability that allows an attacker to gain unauthorized access to a system, application, or network. It takes advantage of weaknesses in a system's security defenses.

4

Incident

An incident is an event or series of events that disrupt normal operations and pose a threat to an organization’s systems or data. Incidents may include breaches, denial-of-service attacks, malware infections, or data leaks.

5

Intrusion

Intrusion refers to unauthorized access or manipulation of a system or network by an attacker. It often implies that the attack has bypassed initial security controls.

6

Threat

A threat is anything that has the potential to exploit a vulnerability and cause harm to the organization, such as hackers, malware, or natural disasters.

7

Vulnerability

A vulnerability is a weakness or flaw in a system, application, or network that can be exploited by a threat to cause damage or unauthorized access. Vulnerabilities can be in software, hardware, or even human processes.

8

Zero day

A zero-day refers to a vulnerability in software or hardware that is unknown to the vendor or developer. It is particularly dangerous because attackers can exploit the flaw before the developer has the opportunity to patch it, leaving systems exposed.

Four Main Components of Incident Response (IR):

Preparation: This phase involves setting up processes, tools, and resources to effectively respond to incidents. It includes developing an incident response policy, training staff, and setting up a communication plan. It’s about ensuring the organization is ready to detect and handle security incidents effectively.

  • Example: Creating an incident response playbook, implementing security tools, and conducting regular employee training.

Detection and Analysis: In this phase, the goal is to identify and verify potential security incidents through monitoring, log analysis, and security tools. It’s important to differentiate between false alarms and real incidents. Analysts must analyze the event to understand the severity and scope.

  • Example: Using intrusion detection systems (IDS) and security information and event management (SIEM) tools to monitor for signs of suspicious activities.

Containment, Eradication, and Recovery: Once an incident is confirmed, the focus shifts to containing the damage to prevent further spread, eradicating the cause of the incident (e.g., removing malware), and recovering systems to their normal state. This phase aims to minimize the impact of the incident on the organization.

  • Example: Isolating affected systems from the network to prevent the spread of malware, cleaning infected systems, and restoring data from backups.

Post-Incident Activity: After the incident is contained and systems are restored, the focus shifts to learning from the incident. This includes conducting a post-attack analysis, identifying lessons learned, updating incident response procedures, and improving security measures to prevent future incidents.

  • Example: Creating a report on the incident, conducting a root cause analysis, and implementing stronger security controls to mitigate future risks.

Three Possible Models for an Incident Response Team (IRT):

In the leveraged model, an organization uses external resources, such as a third-party security firm or consultants, to provide incident response support. This model is often used when in-house expertise is limited or when a specialized skill set is required.

  • Advantages: Access to expertise and resources without the need for a fully dedicated in-house team.

  • Disadvantages: May be slower to respond, as external parties may require more time to familiarize themselves with the organization’s environment.

In the dedicated model, the organization has a full-time, in-house team responsible for managing all aspects of incident response. This team is always available to handle incidents and maintain security monitoring on an ongoing basis.

  • Advantages: Faster response time and better familiarity with the organization's systems and networks.

  • Disadvantages: High cost and the need for specialized knowledge and resources.

The hybrid model combines both internal resources and external support. The organization may have an in-house incident response team, but in times of high demand or for specialized expertise, they can leverage external resources.

  • Advantages: Flexibility in scaling the incident response capacity as needed, combining the benefits of both internal and external resources.

  • Disadvantages: Coordination between internal and external teams can be challenging during an incident.


Business Continuity

Business Continuity (BC) refers to the processes, policies, and procedures an organization puts in place to ensure that critical business functions can continue or quickly resume in the event of a disruption, disaster, or emergency. The goal of business continuity planning is to minimize downtime, protect organizational assets, and ensure that the business can maintain essential operations even during crises such as natural disasters, cyberattacks, or infrastructure failures.

Components of a Business Continuity (BC) plan include:

  • List of the BCP Team Members

  • Immediate Response Procedures and Checklists

  • Notification Systems and Call Trees

  • Guidance for Management

  • How/When to Enact the Plan

  • Contact Numbers for Critical Members of the Supply Chain

  • How/When to Enact the Plan (Repeated for Emphasis)


Disaster Recovery

Disaster Recovery (DR) refers to the strategies, policies, and procedures an organization puts in place to restore its IT infrastructure, systems, applications, and data after a disruptive event such as a natural disaster, cyberattack, hardware failure, or other major incidents. The primary goal of disaster recovery is to ensure the rapid recovery and continuity of critical business operations and IT services, minimizing downtime and financial losses.

Unlike Business Continuity, which focuses on ensuring that business operations continue during a disruption, Disaster Recovery specifically deals with the restoration of IT systems and data after a disaster.

Five possible components to include in a Disaster Recovery (DR) plan:

  1. Executive summary providing a high-level overview of the plan

  2. Department-specific plans

  3. Technical guides for IT personnel responsible for implementing and maintaining critical backup systems

  4. Full copies of the plan for critical disaster recovery team members

  5. Checklists for certain individuals


Chapter Resources

🗃️
📘
198KB
CC-Chapter2.pdf
pdf