forked from rahuldeve/Diversification-Dataset
-
Notifications
You must be signed in to change notification settings - Fork 0
/
03hb002.txt
10815 lines (7720 loc) · 534 KB
/
03hb002.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
Handbook for
Computer Security
Incident Response
Teams (CSIRTs)
Moira J. West-Brown
Don Stikvoort
Klaus-Peter Kossakowski
Georgia Killcrece
Robin Ruefle
Mark Zajicek
First release: December 1998
2nd Edition: April 2003
HANDBOOK
CMU/SEI-2003-HB-002
Pittsburgh, PA 15213-3890
Handbook for
Computer Security
Incident Response
Teams (CSIRTs)
CMU/SEI-2003-HB-002
Moira J. West-Brown
Don Stikvoort
Klaus-Peter Kossakowski
Georgia Killcrece
Robin Ruefle
Mark Zajicek
First release: December 1998
2nd Edition: April 2003
Networked Systems Survivability Program
Unlimited distribution subject to the copyright.
The original version of this handbook was provided with funding from the following organizations:
U.S. National Science Foundation (NSF);
SURFnet bv;
SURFnet ExpertiseCentrum bv;
M&I/STELVIO bv;
German Federal Ministry of Education, Science, Research and Technology (Bundesministerium fuer Bildung,
Wissenschaft, Forschung und Technologie);
Verein zur Foerderung eines Deutschen Forschungsnetzes e.V. (DFN-Verein).
Funding for the revised edition of this handbook was provided by the Software Engineering Institute.
This report was prepared for the
SEI Joint Program Office
HQ ESC/DIB
5 Eglin Street
Hanscom AFB, MA 01731-2116
The ideas and findings in this report should not be construed as an official DoD position. It is published in the
interest of scientific and technical information exchange.
FOR THE COMMANDER
Christos Scondras
Chief of Programs, XPK
This work is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a
federally funded research and development center sponsored by the U.S. Department of Defense.
Copyright 2003 by Carnegie Mellon University.
NO WARRANTY
THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS
FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT
LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR
RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES
NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT,
TRADEMARK, OR COPYRIGHT INFRINGEMENT.
Use of any trademarks in this report is not intended in any way to infringe on the rights of the trademark holder.
Internal use. Permission to reproduce this document and to prepare derivative works from this document for internal use is
granted, provided the copyright and "No Warranty" statements are included with all reproductions and derivative works.
External use. Requests for permission to reproduce this document or prepare derivative works of this document for external
and commercial use should be addressed to the SEI Licensing Agent.
This work was created in the performance of Federal Government Contract Number F19628-00-C-0003 with Carnegie
Mellon University for the operation of the Software Engineering Institute, a federally funded research and development
center. The Government of the United States has a royalty-free government-purpose license to use, duplicate, or disclose the
work, in whole or in part and in any manner, and to have or permit others to do so, for government purposes pursuant to the
copyright license under the clause at 252.227-7013.
For information about purchasing paper copies of SEI reports, please visit the publications portion of our Web site
(http://www.sei.cmu.edu/publications/pubweb.html).
Table of Contents
Preface to the Second Edition ...............................................................................ix
Preface to the First Edition ....................................................................................xi
Acknowledgements ..............................................................................................xiii
Abstract..................................................................................................................xv
1
2
Introduction .....................................................................................................1
1.1 Scope of the Document .............................................................................4
1.2
Intended Audience.....................................................................................5
1.3 Use of This Document ...............................................................................6
1.4 Document Structure...................................................................................7
Basic Issues.....................................................................................................9
2.1 CSIRT Framework.....................................................................................9
2.1.1 Mission Statement .......................................................................10
2.1.2 Constituency ................................................................................11
2.1.3 Place in Organization...................................................................17
2.1.4 Relationship to Other Teams .......................................................19
2.2 Service and Quality Framework...............................................................21
2.3 CSIRT Services .......................................................................................23
2.3.1 Service Categories.......................................................................24
2.3.2 Service Descriptions ....................................................................25
2.3.3 Selection of Services ...................................................................34
Information Flow......................................................................................35
2.4
2.5 Policies....................................................................................................38
2.5.1 Attributes .....................................................................................39
2.5.2 Content ........................................................................................40
2.5.3 Validation.....................................................................................41
2.5.4
Implementation, Maintenance, and Enforcement .........................42
2.6 Quality Assurance ...................................................................................42
2.6.1 Definition of a Quality System ......................................................43
2.6.2 Checks: Measurement of Quality Parameters ..............................45
CMU/SEI-2003-HB-002
i
3
2.6.3 Balances: Procedures to Assure Quality...................................... 47
2.6.4 Constituents View of Quality ....................................................... 48
2.7 Adapting to Specific Needs ..................................................................... 48
2.7.1 The Need for Flexibility................................................................ 50
2.7.2 Legal Issues ................................................................................ 51
Institutional Regulations .............................................................. 58
2.7.3
Incident Handling Service ............................................................................ 61
3.1 Service Description ................................................................................. 61
3.1.1 Objective ..................................................................................... 62
3.1.2 Definition ..................................................................................... 63
3.1.3 Function Descriptions .................................................................. 64
3.1.4 Availability ................................................................................... 65
3.1.5 Quality Assurance ....................................................................... 65
3.1.6
Interactions and Information Disclosure....................................... 66
3.1.7
Interfaces with Other Services..................................................... 66
3.1.8 Priority......................................................................................... 66
3.2 Service Functions Overview.................................................................... 67
3.3 Triage Function ....................................................................................... 69
3.3.1 Use of Tracking Numbers ............................................................ 70
3.3.2 Use of Standard Reporting Forms ............................................... 73
3.3.3 Preregistration of Contact Information ......................................... 75
3.4 Handling Function ................................................................................... 76
Incident Life Cycle ....................................................................... 77
3.4.1
3.4.2
Incident Analysis ......................................................................... 79
3.4.3 Tracking of Incident Information................................................... 91
3.5 Announcement Function ......................................................................... 92
3.5.1 Announcement Types.................................................................. 93
3.5.2 A Priori Considerations................................................................ 95
3.5.3 Announcement Life Cycle............................................................ 97
3.6 Feedback Function ............................................................................... 100
Interactions ........................................................................................... 102
3.7
3.7.1 Points of Contact ....................................................................... 103
3.7.2 Authentication............................................................................ 106
3.7.3 Secure Communication ............................................................. 109
3.7.4 Special Considerations.............................................................. 110
Information Handling..............................................................................119
Information Collection................................................................ 119
3.8.1
Information Verification.............................................................. 120
3.8.2
3.8.3
Information Categorization......................................................... 121
Information Storage................................................................... 122
3.8.4
3.8.5
Information Sanitizing and Disposal........................................... 123
3.8
ii
CMU/SEI-2003-HB-002
4
3.8.6 Prioritization Criteria...................................................................124
3.8.7 Escalation Criteria......................................................................128
Information Disclosure ...............................................................132
3.8.8
Team Operations .........................................................................................137
4.2 Fundamental Policies ............................................................................141
4.2.1 Code of Conduct........................................................................141
4.2.2
Information Categorization Policy...............................................143
4.2.3
Information Disclosure Policy.....................................................144
4.2.4 Media Policy ..............................................................................148
4.2.5 Security Policy ...........................................................................149
4.2.6 Human Error Policy....................................................................150
4.3 Continuity Assurance.............................................................................151
4.3.1 Continuity Threats......................................................................152
4.3.2 Workflow Management ..............................................................155
4.3.3 Out-Of-Hours Coverage.............................................................157
4.3.4 Off-Site Coverage ......................................................................159
4.4 Security Management............................................................................159
4.5 Staff Issues............................................................................................166
4.5.1 CSIRT Staff................................................................................167
4.5.2 Hiring Staff.................................................................................169
4.5.3 Arrival and Exit Procedures........................................................171
4.5.4 Training Staff .............................................................................172
4.5.5 Retaining Staff ...........................................................................174
4.5.6 Extension of Staff.......................................................................175
5
Closing Remarks .........................................................................................177
5.1 Closing Remarks from the First Edition..................................................177
5.2 Closing Remarks for the Second Edition ...............................................178
Appendix A: About the Authors ........................................................................181
Appendix B: Glossary........................................................................................187
Bibliography.........................................................................................................193
CMU/SEI-2003-HB-002
iii
iv
CMU/SEI-2003-HB-002
List of Figures
Figure 1: CSIRT Within an Organization ..............................................................18
Figure 2: CSIRT Peer Relationships.....................................................................21
Figure 3: Service and Quality Framework as Derived from Mission Statement.....22
Figure 4:
Incident Handling Service Functions .....................................................67
Figure 5: CERT/CC Incident Handling Life Cycle .................................................77
Figure 6: CERT/CC Code of Conduct.................................................................143
CMU/SEI-2003-HB-002
v
vi
CMU/SEI-2003-HB-002
List of Tables
Table 1:
Examples of CSIRT Types With Associated Missions and Constituencies12
Table 2:
Possible Authority Relationships Between a CSIRT and Its Constituency15
Table 3:
Service Description Attributes................................................................23
Table 4:
List of Common CSIRT Services ...........................................................25
Table 5:
Examples of Possible Information Flow to and from the Incident Handling
Service..................................................................................................37
Table 6:
Basic Policy Attributes...........................................................................40
Table 7:
Policy Content Features ........................................................................41
Table 8:
Examples of Dynamic Environment Factors and Their Impact on CSIRTs50
Table 9:
Examples of Liability Issues Arising From Omission..............................56
Table 10: Examples of Liability Issues Arising From the Content of Signed
Contracts...............................................................................................56
Table 11: Examples of Liability Issues Arising From Information Disclosure .........57
Table 12: Range of Possible Incident Handling Service Objectives Based on
Differing Team Types.............................................................................62
Table 13: Possible Instantiations of Handling Function Attributes..........................76
Table 14: Analysis Depth Factors .........................................................................82
Table 15: Notable Characteristics of Log Files ......................................................83
Table 16:
Incident Tracking Information ................................................................91
Table 17: Possible Inter-Team Support Types..................................................... 113
Table 18: Considerations for Information Sharing ............................................... 113
CMU/SEI-2003-HB-002
vii
viii
CMU/SEI-2003-HB-002
Preface to the Second Edition
We have often been asked whether an updated version of the CSIRT Handbook would ever
be released. Periodically we have reviewed the document and found that most of the material
and guidance provided are still current, relevant, and helpful to new and existing teams. Some
of the examples included and organizations discussed were dated, but otherwise the concepts
and recommendations covered are still valid for todays work.
In the summer of 2002, the CERT CSIRT Development Team began collaboration with the
Trusted Introducer for European Computer Security Incident Response Teams (CSIRTs)
service to create a standard set of service descriptions for CSIRT functions. As we finished
that document1 it became apparent that we should, indeed, update the CSIRT Handbook to
include this new list of services. As we began to revise the document we felt it was also time
to update any out-of-date examples and also any out-of-date terminology. We also included,
where appropriate, references to new discussion topics, resources, or CSIRT operational
activities that we believe are relevant to the information discussed in this handbook.
In the long run though, we elected to minimize the changes to the original as much as
possible. These are the main changes that have been made:
1. Many of the examples provided in the handbook have been updated. We have kept a
number of the previous examples, as they are still true conceptually and the guidance
available still proves to be useful today. More recent examples have been added that we
hope will be more applicable for todays readers.
2. The new CSIRT service definitions have been incorporated throughout the handbook.
3. The handbook has been aligned with other new documents that we have produced or are
in the process of producing, specifically the new Organizational Models for CSIRTs
handbook. This document is a companion piece to the CSIRT Handbook. It provides
detailed information on the types of organizational structures and corresponding services
that may be implemented to provide a CSIRT capability. We have timed the release of
this updated version of the CSIRT Handbook with the publication of the Organizational
Models for CSIRTs handbook.
As stated in the original CSIRT Handbook preface: We can learn from the experiences of
others and we do this every day. So if you have comments on this version, if you want to
1 The list of services is available at http://www.cert.org/csirts/services.html.
CMU/SEI-2003-HB-002
ix
share your opinions, or if you have other suggested additions, please contact us. We regularly
attend FIRST Conferences and other CSIRT events, and we can be contacted in person or
reached as a group by sending email to the following address: csirt-handbook@cert.org.
x
CMU/SEI-2003-HB-002
Preface to the First Edition
The number of computer security incident response teams (CSIRTs) continues to grow as
organizations respond to the need to be better prepared to address and prevent computer
security incidents. Just as computer science has struggled to be recognized as a scientific field
in its own right, computer security has struggled to be recognized as an essential component
of computer science. Similarly, the need for CSIRTs should be recognized within the security
arena. As new teams have attempted to form, they have faced the hurdles of having to justify
the need for their existence and gaining support and understanding of the problems that they
are trying to address. If they have managed to overcome those hurdles, then they have had an
additional challenge to face: the lack of documented information on how to effectively form
and operate a CSIRT and gain recognition for it. So the need for a handbook of this type is
long overdue.
The idea to write this handbook resulted from an email discussion between the original
authors (West-Brown, Stikvoort, and Kossakowski) in the summer of 1996. At that time the
authors were each working on similar projects in their own organizations: helping other
CSIRTs form and develop corresponding policies and procedures. The authors saw a growing
demand from newly forming teams for help and assistance in their formation and operation
and realized that there were insufficient experts available to fulfill this growing demand.
Because the task of forming and operating a CSIRT is fraught with pitfalls that can result in
the demise of a team, it was clear that to ensure an infrastructure of competent and respected
CSIRTs, supporting information and guidance would be imperative for success.
As with many projects of this type, the handbook development has taken longer than was
originally anticipated; it has been something that weve tried to work on when we had spare
time. Given that the field in which we work is so dynamic and demanding and experts are in
short supply, that spare time has generally been carved from late nights and weekends. We
had the luxury of spending most of a week in October 1996 together devoted to scoping the
handbook, which resulted in a 22-page structured outline of the issues. With that foundation
in place, we returned to our own organizations and began the slow process of writing the
content of the various sections and continued document development.
We hope that you will find this resulting first edition a useful reference document in the
formation, management, and operation of your CSIRT. We have based material in this
handbook on our experiences in forming and operating our own organizations CSIRTs and
through assisting other CSIRTs in their formation and operation.
CMU/SEI-2003-HB-002
xi
xii
CMU/SEI-2003-HB-002
Acknowledgements
We have many people to thank for contributions that made the original handbook possible.
First our thanks go to the CERT Coordination Center (CERT/CC), Verein zur Foerderung
eines Deutschen Forschungsnetzes e.V. (DFN-Verein), M&I/STELVIO, U.S. National
Science Foundation (NSF), SURFnet ExpertiseCentrum bv, and SURFnet bv. These
organizations supported this effort through funding, allowed us to spend time and resources
on this project, and gave us the opportunity to gain experience and flourish in this field.
Special thanks go to our colleagues at CERT/CC, CERT-NL, and DFN-CERT who were busy
handling incidents and addressing computer security emergencies at times when we were
working on deadlines for this project.
Our thanks also go to the organizations that have sought our help in forming and operating
their CSIRTs. Addressing their probing questions and having them share their differing needs
and situations with us has enabled us to obtain a more rounded view of the field and has
broadened the scope of our experience.
We sought technical review of the first draft of this document from a variety of individuals.
We selected a cross section of reviewers ranging from those we knew were interested in
forming a CSIRT and were new to the field of computer security, to those who have
considerable operational experience from a technical or management perspective. Knowing
how busy such people are, we selected 15 reviewers in the hope that maybe 8 would have the
opportunity to read the draft and provide feedback in the short time available. To our
amazement, 14 of the reviewers provided us with feedback of some sort. The 15th reviewer
sent his apologies explaining that he was unavailable due to illness. Our thanks go to all the
reviewers who found time to comment on the first draft of this handbook (affiliations shown
are from the time of the first edition):
David Finch (MOREnet)
Eduardo Garcia (Price-Waterhouse)
John Horton (DANTE)
Erik Huizer (SURFnet ExpertiseCentrum bv)
Larry J. Hughes, Jr. (NorthWestNet)
Georgia Killcrece (CERT/CC)
Kathleen Kimball (Pennsylvania State University)
Wolfgang Ley (DFN-CERT)
CERT is registered in the U.S. Patent and Trademark Office.
CMU/SEI-2003-HB-002
xiii
Hannes P. Lubich (SWITCH-CERT)
Jorgen Bo Madsen (NORDUnet CERT)
Ken McNulty (SEI)
Maj. Byron Thatcher (AFIWC/AFCERT)
Wietse Venema (IBM)
Mark Zajicek (CERT/CC)
We would particularly like to acknowledge the efforts of Larry J. Hughes, Jr., Georgia
Killcrece, Wolfgang Ley, Hannes P. Lubich, and Jorgen Bo Madsen who all went above and
beyond the call of duty by providing very extensive and detailed comments.
The first draft of this document was an interesting work written by three authors with
differing native tongues. The task of taking that draft and generating a document ready for
technical review was placed on the shoulders of Bill McSteen (a technical writer/editor at the
SEI). Bill did an excellent job of smoothing over the bumps in the flow of the document so
that the reviewers were able to focus on technical and structural comments. Bills continued
effort was as essential to provide the final version of this document.
Our thanks for this second edition go to Pamela Curtis, also a technical writer/editor at the
SEI, without whose expert help this task would have been much more difficult to accomplish.
Her technical and editorial assistance helped tremendously and enabled the authors to focus
on the content of the material.
We would also like to extend heartfelt thanks to our Technical Manager, Dr. Barbara Laswell,
who encouraged us to revise the Handbook and who generously provided the resources and
time for us to devote to this revised text.
Finally, we would like to thank our families. Without their support, understanding, and
encouragement, none of us would have been able to complete our portions of this work nor
would we have found it an enjoyable exercise.
xiv
CMU/SEI-2003-HB-002
Abstract
This document provides guidance on forming and operating a computer security incident
response team (CSIRT). In particular, it helps an organization to define and document the
nature and scope of a computer security incident handling service, which is the core service
of a CSIRT. The document explains the functions that make up the service; how those
functions interrelate; and the tools, procedures, and roles necessary to implement the service.
This document also describes how CSIRTs interact with other organizations and how to
handle sensitive information. In addition, operational and technical issues are covered, such
as equipment, security, and staffing considerations.
This document is intended to provide a valuable resource to both newly forming teams and
existing teams whose services, policies, and procedures are not clearly defined or
documented. The primary audience for this document is managers who are responsible for
the creation or operation of a CSIRT or an incident handling service. It can also be used as a
reference for all CSIRT staff, higher level managers, and others who interact with a CSIRT.
CMU/SEI-2003-HB-002
xv
xvi
CMU/SEI-2003-HB-002
1 Introduction
The evolution of the Internet has been widely chronicled. Resulting from a research project
that established communications among a handful of geographically distributed systems, the
Internet now covers the globe as a vast collection of networks made up of millions of
systems.
The Internet has become one of the most powerful and widely available communications
mediums on earth, and our reliance on it increases daily. Governments, corporations, banks,
and schools conduct their day-to-day business over the Internet. With such widespread use,
the data that resides on and flows across the network varies from banking and securities
transactions to medical records, proprietary data, and personal correspondence.
The Internet is easy and cheap to access, but the systems attached to it lack a corresponding
ease of administration. As a result, many Internet systems are not securely configured.
Additionally the underlying network protocols that support Internet communication are
insecure, and few applications make use of the limited security protections that are currently
available.
The combination of the data available on the network and the difficulties involved in
protecting the data securely make Internet systems vulnerable attack targets. It is not
uncommon to see articles in the media referring to Internet intruder activities.
But, exploitation of security problems on the Internet is not a new phenomenon. In 1988 the
Internet Worm incident occurred and resulted in a large percentage of the systems on the
network at that time being compromised and temporarily placed out of service. Shortly after
the incident, a meeting was held to identify how to improve response to computer security
incidents on the Internet. The recommendations resulting from the meeting included a call for
a single point of contact to be established for Internet security problems that would act as a
trusted clearinghouse for security information. In response to the recommendations, the
CERT Coordination Center (also known as the CERT/CC and originally named the
Computer Emergency Response Team) was formed to provide response to computer security
CERT is registered in the U.S. Patent and Trademark Office.
CMU/SEI-2003-HB-002
1
incidents on the Internet [CERT/CC 1997b]. The CERT/CC was one of the first organizations
of this typea computer security incident response team (CSIRT2).
A CSIRT can most easily be described by analogy with a fire department. In the same way
that a fire department has an emergency number that you can call if you have or suspect a
fire, similarly a CSIRT has a number and an email address that you can contact for help if
you have or suspect a computer security incident. A CSIRT service doesnt necessarily
provide response by showing up on your doorstep (although some do offer that service); they
usually conduct their interactions by telephone or via email.
Another similarity between fire departments and CSIRTs is that responding to emergencies is
only part of the service provided. Just as important is trying to prevent emergencies from
occurring in the first place. So just as a fire department offers fire safety education to raise
awareness and encourage best practices, CSIRTs produce technical documents and undertake
education and training programs for the same purpose. In the area of improvement, a fire
department will influence laws to ensure improved safety codes and fire-resistant products.
Similarly CSIRTs participate in forums to improve baseline security standards.
When the Internet Worm incident occurred, the size of the network was estimated at 60,000
hosts; a decade later there were more than 36 million hosts on the Internet and a
corresponding increase in intruder activity. The January 2003 Internet Domain Survey [ISC
2003] shows 171.6 million hosts advertised in the Domain Name Service. Clearly a single
CSIRT is unable to effectively serve such a vast constituency. In particular a single CSIRT
wouldnt be able to address the individual needs of the diverse communities that make up the
Internet due to time zone, language, cultural, and organizational issues. Correspondingly, a
number of organizations have foreseen the need to be better prepared to respond to intruder
activity affecting their community [West-Brown 1995]. This has resulted in a surge of interest
in the formation of CSIRTs.
Hundreds of CSIRTs around the world have formed since 1988, and they, like newly forming
CSIRTs today, face many challenges as they strive to become operational. Newly forming
teams commonly seek guidance and assistance in determining the scope and range of their
services and in forming their operational policies and procedures [Pethia 1990a, Pethia
1990b]. When this CSIRT Handbook was originally published in 1998, there were not as
many resources available to help new teams establish appropriate and reliable services. Today
2 When the first edition of this handbook was published, the term incident response was used to
describe the core service of a CSIRT (hence the convention for the IR letters in the CSIRT
acronym). As our understanding of such teams has matured over time, incident response has
become one component of a much broader incident handling service that encompasses more
than just response to an event. We have, therefore, adopted the convention of incident handling
services throughout this handbook (as well as in our other publications [CERT/CC 2002a]).
However, we still continue to use the acronym CSIRT, since it is a generic description for a
team and is a term that has been widely adopted by the community.
2
CMU/SEI-2003-HB-002
there are many more articles, books, tutorials,3 other documents, and Web resources
available.4 There are also various organizations, such as the Forum of Incident Response and
Security Teams (FIRST) and the TERENA-sponsored TF-CSIRT (a task force for the
collaboration of incident response teams in Europe), who promote collaboration among teams
and provide resources for helping new and existing teams [TERENA 1995]. The good news
is that todays newly forming CSIRTs need not fend for themselves (learning only from their
own experiences or making costly mistakes); they can now leverage the experiences of many
others to help them develop and implement more effective teams.5,6,7
Although more information is now available to help organizations build their CSIRT
capability, unfortunately there is still little available in the area of operational policies and
procedures, e.g., generic CSIRT policies, procedures, and templates that can be adapted or
revised for use by newly forming teams. Either existing teams have nothing documented to
share or they are unable to share their documentation due to its sensitive nature. Seeking
expert advice is also difficult because there is still a shortage of experts in the field. Existing
experts are highly sought after, have little time to make available, and can be expensive to
engage.
Once operational, the need for well-defined services, policies, and procedures does not
diminish. Existing CSIRTs lacking clearly defined services commonly suffer from recurring
operational problems. For example, they rely on their existing staff to pass on their
operational experience to new staff. All too frequently, the consistency, reliability, and levels
of service exhibited by such CSIRTs fluctuate dramatically due to the varied perceptions of
each of the team members. As a consequence, the constituency served by these CSIRTs may
have a false impression of the services offered, which jeopardizes rapport between a CSIRT
and its constituency that is essential to the success of the team. Clearly defined and
documented services will help the team and, more importantly, will provide guidance for the
teams constituency, enabling them to understand the services offered by the CSIRT and how
those services should be accessed.
3 The CERT/CC, for example, offers a suite of courses for both CSIRT managers and incident
handlers. See http://www.cert.org/nav/index_gold.html.
4 See the CERT CSIRT Development Teams List of Resources for more information:
http://www.cert.org/csirts/resources.html.
5 See also the Workshops on Computer Security Incident Handling, Forum of Incident Response
and Security Teams, 1989-2002.
6 Sparks, Sandy; Fithen, Katherine; Swanson, Marianne; & Zechman, Pat. Establishing an Incident
Response Team. Tutorial, 9th Workshop on Computer Security Incident Handling, Forum of
Incident Response and Security Teams, Bristol, U.K., June 1997.
7 Stikvoort, Don & Kossakowski, Klaus-Peter. Incident Response Teams: the European
Perspective.8th Workshop on Computer Security Incident Handling, Forum of Incident Response
and Security Teams, San Jose, Calif., July 1996.
CMU/SEI-2003-HB-002
3
1.1 Scope of the Document
This document provides guidance on the generic issues to consider when forming and
operating a CSIRT. Relating back to our fire department analogy, providing an effective
service is a complex operation. It can only be a success if it is based on appropriate policies
and procedures and if it addresses a range of both reactive and proactive issues. A fire
department can be a volunteer or directly funded operation. The service provided is based on
available resources and funding. CSIRTs are under the same cost-cutting demands as other
organizations. So they must constantly make the tradeoff between the range and levels of
service that they would like to provide and what they can afford to provide. This includes
identifying the CSIRT services, policies, and procedures appropriate for a given situation. It
also means identifying those operational issues that must be addressed to implement an
efficient incident handling capability.
In particular, this document helps an organization to define and document the nature and
scope of a computer security incident handling service. To this end, we discuss the functions
that make up the service; how those functions interrelate; and the tools, procedures, and roles
necessary to implement the service. We also focus on incident analysis. Just as a fire
department may investigate a fire to understand how it came about (e.g., act of nature, arson,
or an electrical design fault), a CSIRT tries to understand how an incident occurred. While a
fire departments analysis will include sifting through ashes, a CSIRTs will include looking
at system logs and any files left behind by an intruder.
A fire department needs to coordinate with other fire departments who it may call (or be
called) on for reinforcements in times of peak demand or to address a crisis. It must interact
with other emergency services to respond appropriately and provide law enforcement with
the information that it legally requires. This document will discuss how CSIRTs interact with
other organizations, such as the sites that report security problems to it, other CSIRTs, law
enforcement, and the media. A fire department must handle information, some of which is
sensitive as it may pertain to the perpetrator of a crime. Similarly a CSIRT must handle
information appropriately. Most CSIRTs offer client confidentiality in the same way that
many crisis lines do, shielding the reporters and victims from public disclosure. This topic is
critical to the survival of a CSIRT, because if it cannot be trusted to handle information
appropriately, nobody will report to it, rendering the CSIRT almost useless. Consequently,
information handling is an essential issue of discussion in this handbook.
Some CSIRTs have dedicated staff while others pull together part-time, volunteer staff and
trusted security experts to address a given security crisis.8 A CSIRTs staff is its interface with
the world, and the image that its staff members project through the way they conduct
8 More information about different staffing models will be available in a companion document,
Organizational Models for CSIRTs, to be published in 2003 on our Web site at
<http://www/cert.org/csirts/>.
4
CMU/SEI-2003-HB-002
themselves, and the quality of service they provide, are paramount to the CSIRTs success.
Finding appropriately qualified staff can be difficult, since such staff are in great demand.
However, all too often people responsible for hiring CSIRT staff unknowingly look for the
wrong set of skills and qualities in potential employees. Consequently we discuss staffing and
hiring issues and steps that you can take to ensure that CSIRT staff provide a consistent,
warm, and professional interface for your team.
A CSIRT may provide a range of other services in addition to the incident handling service,
such as vulnerability handling and/or the provision of intrusion detection services. Although
we have included a high-level description of these other services, the specific procedures and
policies are beyond the scope of this document.
The material in this document is presented in a form that is suitably generic to enable the
reader to apply it to any type of CSIRT environment, from a fee-for-service team, to an in-
house team for a given organization, or an international coordination center.
1.2
Intended Audience
While many new CSIRTs have formed and become operational, the increase in the number of
these teams has not kept pace with Internet growth and intruder activity. Many more
organizations are recognizing the need for a CSIRT to address their specific needs.
Anticipating this need, we have targeted this handbook at those individuals who will be most
heavily involved in the establishment of CSIRTs.
The primary audience for this document consists of managers responsible for at least one of
the following:
the operation of an incident handling service
the creation of an incident handling service
the creation of a CSIRT
the operation of a CSIRT
As well as being a useful reference for higher management levels and all CSIRT staff, this
document can also be of use to other individuals who interact with a CSIRT and would
benefit from an awareness of the issues that affect a CSIRT, such as
members of the CSIRT constituency
law enforcement
media relations
CMU/SEI-2003-HB-002
5
We recognize that some organizations may choose to outsource their CSIRT services9 to
other managed service providers, although we have not focused specifically on that audience
in this handbook. We do believe, however, that the information contained in this handbook
can be used by such providers and adapted to fit their approaches for providing fee-based
services to an organization or enterprise. To that end, the handbook can be a valuable
resource document for these service providers in identifying the same types of issues that
other CSIRTs face in providing services to their constituency.
1.3 Use of This Document
This document is intended to provide a valuable resource to both newly forming teams and
existing teams whose services, policies, and procedures are not clearly defined or
documented. Ideally this document should be used at the early stages when an organization
has obtained management support and funding to form a CSIRT, prior to the team becoming
operational. However, the material can still be a very useful reference document for
operational teams.
This material can be used by a newly forming team as the basis for understanding the issues
involved in establishing a CSIRT. The information can then be used to assist the development
of detailed domain- or organization-specific service definitions, policies, procedures, and
operational issues. As a result of applying the material provided in this document, an
organization should be on a fast track to a documented, reliable, effective, and responsible
incident handling service.
In addition, an existing team can use this document to ensure they have covered the main
issues and options that are appropriate for their organization when developing their incident
handling service.
Where applicable, the authors identify approaches that have proved successful, as well as
pitfalls to avoid. In addition, various alternatives are described that might suit a particular
situation or be applicable for a given type of team, such as an international response team, a
national response team, an Internet service provider (ISP) team serving its customers, or a
team for a single organizational entity such as a university or corporation. It is important,
however, to note that this material is provided for reference and guidance. It is not intended to
dictate the range or content of services, policies, and procedures that any given team should
implement. These must be determined based on the individual needs of the CSIRT and the
constituency it serves. Hence, we encourage you to use the material provided in this
9
The Networked Systems Survivability Program at the Software Engineering Institute with funding
support from the General Services Administration Federal Computer Incident Response Center
(GSA FedCIRC) developed the report Outsourcing Managed Security Services. This document
is available from the CERT Web site at http://www.cert.org/security-improvement/modules/omss/.
6
CMU/SEI-2003-HB-002
document to understand the issues appropriate for your teams unique environment and to
choose approaches that meet your teams particular goals, needs, and requirements.
1.4 Document Structure
The rest of this document is organized as follows. Chapter 2 presents the basic framework of
the CSIRT model and describes basic issues that need to be considered and addressed by
every CSIRT. It also introduces general CSIRT terminology and concepts including the
importance of a clearly defined constituency, generation and implementation of policies, and
the impact of organizational and legal issues on a CSIRT. It introduces a range of services
that a CSIRT might provide and discusses how those services interact with the incident
handling service. This sets the context for the main focus for this documentthe incident
handling service, which is described in detail in Chapter 3. Chapter 3 describes the
construction of an incident handling service and its functional components. Additionally, it
discusses the range and nature of interactions that are associated with an incident handling
service and how information (mostly of a sensitive nature) is handled. For completeness,
Chapter 4, Team Operations, addresses practical operational and technical issues that every
CSIRT must consider. These issues, such as equipment, security, and staffing considerations,
are not all exclusive to an incident handling service, but they are critical to its success. The
document concludes with some closing remarks followed by information about the authors, a
bibliography of CSIRT-related materials, and a glossary of abbreviations and terms.
CMU/SEI-2003-HB-002
7
8
CMU/SEI-2003-HB-002
2 Basic Issues
A CSIRT may offer a range of services. However, it must at least provide an implementation
of the incident handling service discussed later in this chapter and covered in depth in
Chapter 3. Without providing at least a component of the incident handling service, the team
cannot be called a CSIRT. Consider the analogy with a fire department. A fire department
may provide a range of services (fire prevention, awareness, training), and it may undertake
fire safety inspections. But at the core is the emergency response component. By providing
the emergency fire department, it stays up-to-date and in touch with reality, and it gains
community trust, respect, and credibility. Similarly, in an attempt to reduce the effect of
incidents through early detection and reporting or to prevent incidents, a team can be
proactive through awareness, training, and other services; but without the incident handling
service, the team is not a CSIRT.
This chapter presents the basic framework of the CSIRT model and describes the issues that
affect every CSIRT. These issues need to be considered and addressed for all CSIRTs
regardless of their size, nature, or scope. We begin by describing the CSIRT framework in
terms of what it sets out to do (mission), for whom (constituency), what its roots look like
(place in organization), and who its peers are (relationship to others). Next, we examine a
framework derived directly from the mission statement: the service and quality framework,
featuring CSIRT services, quality assurance, policies as major components, and information
flow as an essential boundary condition. In the last section, we review the issues faced when
adapting a CSIRT to the specific needs of its environment, where the legal issues are a
particularly important component.
2.1 CSIRT Framework
In the search for a quick fix to establishing guidelines under which a new team will operate,
many people go in search of existing CSIRT guidelines with the hope that they can simply be
adopted for use in their environment. However, they soon realize that no single set of service
definitions, policies, and procedures could be appropriate for any two CSIRTs. Moreover,
teams with rigid guidelines in place find themselves struggling to adapt to the dynamic world