首页行业方案智慧应急Federal Government Cybersecurity Incident and Vulnerability Response Playbooks
星河

文档

174

关注

0

好评

0
PDF

Federal Government Cybersecurity Incident and Vulnerability Response Playbooks

阅读 0 下载 0 大小 1.09M 总页数 43 页 2024-10-29 分享
价格: 200 积分
下载文档
/ 43
全屏查看
Federal Government Cybersecurity Incident and Vulnerability Response Playbooks
还有 43 页未读 ,您可以 继续阅读 或 下载文档
1、本文档共计 43 页,下载后文档不带水印,支持完整阅读内容或进行编辑。
2、当您付费下载文档后,您只拥有了使用权限,并不意味着购买了版权,文档只能用于自身使用,不得用于其他商业用途(如 [转卖]进行直接盈利或[编辑后售卖]进行间接盈利)。
3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。
4、如文档内容存在违规,或者侵犯商业秘密、侵犯著作权等,请点击“违规举报”。
CISATURECybersecurity IncidentVulnerability Response PlaybooksOperational Procedures for Planning andConducting Cybersecurity Incident and VulnerabilityResponse Activities in FCEB Information SystemsPublication:November 2021Cybersecurity and Infrastructure Security AgencyDISCLAIMER:This document is marked TLP:WHITE.Disclosure is not limited.Sources may use TLP:WHITE when information carries minimal or noforeseeable risk of misuse,in accordance with applicable rules and procedures for public release.Subject to standard copyright rules,TLP:WHITE informationmay be distributed without re striction.For more information on the Traffic Light Protocol,see https://ww.cisa.gov/tlp/TLP:WHITETLP:WHITECONTENTS.3Overview.…33Audience...4Incident Response Playbook.5Incident Response Process....5Preparation Phase.................6Detection Analysis................10Containment.............14Eradication Recovery......15Post-Incident Activities.............16Coordination..17Vulnerability Response Playbook........21Preparation...........21Vulnerability Response Process2222Evaluation.......23Remediation..........24Reporting and Notification..............24Appendix A:Key Terms.25Appendix B:Incident Response Checklist............27Appendix C:Incident Response Preparation Checklist..........35Appendix E:Vulnerability and Incident Categories.....38Appendix F:Source Text....................39Appendix G:Whole-of-Government Roles and Responsibilities............41TLP:WHITECISA Cybersecurity and Infrastructure Security Agency2TLP:WHITEINTRODUCTIONThe Cybersecurity and Infrastructure Security Agency (CISA)is committed to leading the response tocybersecurity incidents and vulnerabilities to safeguard the nation's critical assets.Section 6 ofExecutive Order 14028 directed DHS,via CISA,to "develop a standard set of operational procedures(playbook)to be used in planning and conducting cybersecurity vulnerability and incident responseactivity respecting Federal Civilian Executive Branch(FCEB)Information Systems."1OverviewThis document presents two playbooks:one for incident response and one for vulnerability response.These playbooks provide FCEB agencies with a standard set of procedures to identify,coordinate,remediate,recover,and track successful mitigations from incidents and vulnerabilities affecting FCEBsystems,data,and networks.In addition,future iterations of these playbooks may be useful fororganizations outside of the FCEB to standardize incident response practices.Working together acrossall federal government organizations has proven to be an effective model for addressing vulnerabilitiesand incidents.Building on lessons learned from previous incidents and incorporating industry bestpractices,CISA intends for these playbooks to evolve the federal government's practices forcybersecurity response through standardizing shared practices that bring together the best people andprocesses to drive coordinated actions.The standardized processes and procedures described in these playbooks:Facilitate better coordination and effective response among affectedorganizations,Enable tracking of cross-organizational successful actions,Allow for cataloging of incidents to better manage future events,andGuide analysis and discovery.Agencies should use these playbooks to help shape overall defensive cyber operations to ensureconsistent and effective response and coordinated communication of response activitiesScopeThese playbooks are for FCEB entities to focus on criteria for response and thresholds for coordinationand reporting.They include communications between FCEB entities and CISA;the connectivecoordination between incident and vulnerability response activities;and common definitions for keycybersecurity terms and aspects of the response process.Response activities in scope of this playbookinclude those:Initiated by an FCEB agency (e.g.,a local detection of malicious activity ordiscovery of a vulnerability)Initiated by CISA (e.g.,a CISA alert or directive)or other third parties,includinglaw enforcement,intelligence agencies,or commercial organizations,contractors,and service providersThe Incident Response Playbook applies to incidents that involve confirmed malicious cyber activityand for which a major incident (as defined by the Office of Management and Budget [OMB]inExecutive Order (EO)14028:Improving the Nation's CybersecurityTLP:WHITECISA Cybersecurity and Infrastructure Security Agency3
文档评分
    请如实的对该文档进行评分
  • 0
发表评论
返回顶部