Book description
Learn to identify security incidents and build a series of best practices to stop cyber attacks before they create serious consequences
Key Features
- Discover Incident Response (IR), from its evolution to implementation
- Understand cybersecurity essentials and IR best practices through real-world phishing incident scenarios
- Explore the current challenges in IR through the perspectives of leading experts
Book Description
Cybercriminals are always in search of new methods to infiltrate systems. Quickly responding to an incident will help organizations minimize losses, decrease vulnerabilities, and rebuild services and processes.
In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book uses frameworks such as MITRE ATT&CK® and the SANS IR model to assess security risks.
The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply these strategies, with discussions on incident alerting, handling, investigation, recovery, and reporting.
Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence and the procedures involved in IR in the cloud. Finally, the book concludes with an “Ask the Experts” chapter wherein industry experts have provided their perspective on diverse topics in the IR sphere.
By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently.
What you will learn
- Understand IR and its significance
- Organize an IR team
- Explore best practices for managing attack situations with your IR team
- Form, organize, and operate a product security team to deal with product vulnerabilities and assess their severity
- Organize all the entities involved in product security response
- Respond to security vulnerabilities using tools developed by Keepnet Labs and Binalyze
- Adapt all the above learnings for the cloud
Who this book is for
This book is aimed at first-time incident responders, cybersecurity enthusiasts who want to get into IR, and anyone who is responsible for maintaining business security. It will also interest CIOs, CISOs, and members of IR, SOC, and CSIRT teams. However, IR is not just about information technology or security teams, and anyone with a legal, HR, media, or other active business role would benefit from this book.
The book assumes you have some admin experience. No prior DFIR experience is required. Some infosec knowledge will be a plus but isn't mandatory.
Table of contents
- Preface
-
Getting Started with Incident Response
- The cybersecurity threat landscape
- What is incident response?
- The importance of organizational incident response plans
- GDPR and NIS regulations about incident response
- Components of an incident response plan
- Tips
- Summary
- Further reading
-
Incident Response – Evolution and Current Challenges
- The evolution of incident response
-
Challenges facing incident response
- Protecting the company brand
- Preventing future breaches
- Preparing for attacks
- Assessing security safeguards
- Aiding investigations and legal prosecutions
- Bringing the organization together during crises
- Ensuring the integration of security initiatives
- Improving the overall security stature of the organization
- Why do we need incident response?
- Tips
- Summary
- Further reading
- How to Organize an Incident Response Team
- Key Metrics for Incident Response
- Methods and Tools of Incident Response Processes
- Incident Handling
- Incident Investigation
-
Incident Reporting
- Reporting to the IR team
- Reporting to the SOC team
- Reporting to third parties
- Reporting to the media
- Reporting to the cloud service provider
- Phishing alerting and reporting
- Reporting on mobile devices
- Reporting with web email access
- Reporting to a SOC team and third-party services using IOC feeds
- Summary
- Further reading
- Incident Response on Multiple Platforms
-
Cyber Threat Intelligence Sharing
- Introducing threat intelligence
- The importance of threat intelligence
- How to share threat intelligence
- Threat intelligence tools and platforms
- Summary
- Further reading
-
Incident Response in the Cloud
- Cloud service models
- Assessing IR in the cloud using the SANS IR model
- Understanding cloud attacks using the MITRE cloud matrix
- Top threats facing cloud systems
- Implementing SOAR techniques and recommendations
- IR in the cloud: developing a plan of action
- Summary
- Further reading
- Building a Culture of Incident Readiness
-
Incident Response Best Practices
- Adopting proactive mobilization
- Using a well-defined resolution process
- Making an easy-to-implement IR plan
- Using effective communication strategies
- Breaking down information silos
- Using a centralized approach
- Testing IR plans
- Assessing and reviewing the IR plan
- Automating basic tasks
- Using templates and playbooks
- Carrying out post-incident reviews
- Tips
- Summary
- Further reading
- Incident Case Studies
-
Ask the Experts
- Approaches to IR
- IR in the cloud
- Tools and techniques
- Methods of attack
- Why subscribe?
- Other Books You May Enjoy
- Index
Product information
- Title: Incident Response in the Age of Cloud
- Author(s):
- Release date: February 2021
- Publisher(s): Packt Publishing
- ISBN: 9781800569218
You might also like
book
Intelligence-Driven Incident Response
Using a well-conceived incident response plan in the aftermath of an online security breach enables your …
book
Intelligence-Driven Incident Response, 2nd Edition
Using a well-conceived incident response plan in the aftermath of an online security breach enables your …
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …
book
Datadog Cloud Monitoring Quick Start Guide
A comprehensive guide to rolling out Datadog to monitor infrastructure and applications running in both cloud …