热门文档
- 2024-10-29 15:21:25 PDCERF 方法包括哪六个阶段
- 2024-10-24 16:39:35 基础设施-无人机-智能巡检汇报V1.0(1)
- 2024-10-24 16:39:35 空中机器人创客教室建设方案
- 2024-10-24 16:39:35 航天图景无人机时空数据链行业应用解决方案
- 2024-10-24 17:19:27 智算中心建设项目初步设计方案
- 2024-10-30 19:10:38 【精品】互联网 慧公安大数据一体化解决方案慧警务建设方案慧公安全网情报息化作战平台
- 2024-10-30 19:10:38 公安行业移动息化短平台解决方案
- 2024-10-30 19:10:38 锐捷网络视频专网解决方案彩页2064
- 2024-10-24 16:39:35 【精品】大疆无人机桥梁养护应用解决方案(公开版本)
- 2024-10-24 16:39:35 林业行业解决方案培训
- 2024-10-29 14:37:47 应急论坛-02-谭昶(科大讯飞)-人工智能赋能智慧交通20191031(1)
- 2024-10-29 14:48:13 应急论坛-13-王昊(航天宏图)-3S技术赋能应急管理及灾害监测服务

1、本文档共计 43 页,下载后文档不带水印,支持完整阅读内容或进行编辑。
2、当您付费下载文档后,您只拥有了使用权限,并不意味着购买了版权,文档只能用于自身使用,不得用于其他商业用途(如 [转卖]进行直接盈利或[编辑后售卖]进行间接盈利)。
3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。
4、如文档内容存在违规,或者侵犯商业秘密、侵犯著作权等,请点击“违规举报”。
2、当您付费下载文档后,您只拥有了使用权限,并不意味着购买了版权,文档只能用于自身使用,不得用于其他商业用途(如 [转卖]进行直接盈利或[编辑后售卖]进行间接盈利)。
3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。
4、如文档内容存在违规,或者侵犯商业秘密、侵犯著作权等,请点击“违规举报”。
CISATURECybersecurity IncidentVulnerability Response PlaybooksOperational Procedures for Planning andConducting Cybersecurity Incident and VulnerabilityResponse Activities in FCEB Information SystemsPublication:November 2021Cybersecurity and Infrastructure Security AgencyDISCLAIMER:This document is marked TLP:WHITE.Disclosure is not limited.Sources may use TLP:WHITE when information carries minimal or noforeseeable risk of misuse,in accordance with applicable rules and procedures for public release.Subject to standard copyright rules,TLP:WHITE informationmay be distributed without re striction.For more information on the Traffic Light Protocol,see https://ww.cisa.gov/tlp/TLP:WHITETLP:WHITECONTENTS.3Overview.…33Audience...4Incident Response Playbook.5Incident Response Process....5Preparation Phase.................6Detection Analysis................10Containment.............14Eradication Recovery......15Post-Incident Activities.............16Coordination..17Vulnerability Response Playbook........21Preparation...........21Vulnerability Response Process2222Evaluation.......23Remediation..........24Reporting and Notification..............24Appendix A:Key Terms.25Appendix B:Incident Response Checklist............27Appendix C:Incident Response Preparation Checklist..........35Appendix E:Vulnerability and Incident Categories.....38Appendix F:Source Text....................39Appendix G:Whole-of-Government Roles and Responsibilities............41TLP:WHITECISA Cybersecurity and Infrastructure Security Agency2TLP:WHITEINTRODUCTIONThe Cybersecurity and Infrastructure Security Agency (CISA)is committed to leading the response tocybersecurity incidents and vulnerabilities to safeguard the nation's critical assets.Section 6 ofExecutive Order 14028 directed DHS,via CISA,to "develop a standard set of operational procedures(playbook)to be used in planning and conducting cybersecurity vulnerability and incident responseactivity respecting Federal Civilian Executive Branch(FCEB)Information Systems."1OverviewThis document presents two playbooks:one for incident response and one for vulnerability response.These playbooks provide FCEB agencies with a standard set of procedures to identify,coordinate,remediate,recover,and track successful mitigations from incidents and vulnerabilities affecting FCEBsystems,data,and networks.In addition,future iterations of these playbooks may be useful fororganizations outside of the FCEB to standardize incident response practices.Working together acrossall federal government organizations has proven to be an effective model for addressing vulnerabilitiesand incidents.Building on lessons learned from previous incidents and incorporating industry bestpractices,CISA intends for these playbooks to evolve the federal government's practices forcybersecurity response through standardizing shared practices that bring together the best people andprocesses to drive coordinated actions.The standardized processes and procedures described in these playbooks:Facilitate better coordination and effective response among affectedorganizations,Enable tracking of cross-organizational successful actions,Allow for cataloging of incidents to better manage future events,andGuide analysis and discovery.Agencies should use these playbooks to help shape overall defensive cyber operations to ensureconsistent and effective response and coordinated communication of response activitiesScopeThese playbooks are for FCEB entities to focus on criteria for response and thresholds for coordinationand reporting.They include communications between FCEB entities and CISA;the connectivecoordination between incident and vulnerability response activities;and common definitions for keycybersecurity terms and aspects of the response process.Response activities in scope of this playbookinclude those:Initiated by an FCEB agency (e.g.,a local detection of malicious activity ordiscovery of a vulnerability)Initiated by CISA (e.g.,a CISA alert or directive)or other third parties,includinglaw enforcement,intelligence agencies,or commercial organizations,contractors,and service providersThe Incident Response Playbook applies to incidents that involve confirmed malicious cyber activityand for which a major incident (as defined by the Office of Management and Budget [OMB]inExecutive Order (EO)14028:Improving the Nation's CybersecurityTLP:WHITECISA Cybersecurity and Infrastructure Security Agency3
请如实的对该文档进行评分-
-
-
-
-
0 分