Open In App

Incident Management in Cyber Security

Introduction : In the field of cybersecurity, incident management can be defined as the process of identifying, managing, recording, and analyzing the security threats and incidents related to cybersecurity in the real world. This is a very important step after a cyber disaster or before a cyber disaster takes place in an IT infrastructure. This process includes knowledge and experience. Good incident management can reduce the adverse effects of cyber destruction and can prevent a cyber-attack from taking place. It can prevent the compromising of a large number of data leaks. An organization without a good incident response plan can become a victim of a cyber-attack in which the data of the organization can be compromised at large. There is a five-step process for incident management in cybersecurity given by the ISO/IEC Standard 27035. They are as follows. Step-1 : The process of incident management starts with an alert that reports an incident that took place. Then comes the engagement of the incident response team (IRT). Prepare for handling incidents. Step-2 : Identification of potential security incidents by monitoring and report all incidents. Step-3 : Assessment of identified incidents to determine the appropriate next steps for mitigating the risk. Step-4 : Respond to the incident by containing, investigating, and resolving it (based on the outcome of step 3). Step-5 : Learn and document key takeaways from every incident. 

Some tips for security incident management :



Necessary part of incident response : Always make a habit of collecting evidence and analyze forensics which is a necessary part of incident response. For these circumstances, the following things are needed.

  1. A well-defined policy to collect evidence to ensure that it is correct and very much sufficient to make it admissible in the Court of Law.
  2. It is also importantly needed to have the ability to employ forensics as needed for analysis, reporting, and investigation.
  3. The personnel of the IRT must be trained in cyber forensics, functional techniques and would also have some knowledge in the legal and governance.
  4. Proper chain of custody: It’s important to maintain a proper chain of custody for all evidence collected during the incident response process. This ensures that the evidence is admissible in court and helps establish its authenticity and integrity.
  5. Use of specialized tools: Incident response teams should have access to specialized tools for evidence collection and analysis, such as network and host-based forensics tools, memory forensics tools, and malware analysis tools.
  6. Documentation: All evidence collection and analysis activities should be well-documented to ensure that there is a clear and complete record of the incident response process. This can include log files, screenshots, and notes on activities performed.
  7. Preservation of evidence: It’s important to ensure that all evidence collected during the incident response process is properly preserved and protected from alteration, deletion, or destruction.
  8. Adherence to legal and regulatory requirements: Incident response teams must ensure that their evidence collection and analysis activities comply with legal and regulatory requirements. This can include following procedures for handling personally identifiable information (PII) and adhering to data protection regulations.
  9. Collaboration with law enforcement: In some cases, it may be necessary to collaborate with law enforcement agencies during the incident response process. This can involve sharing evidence and cooperating with investigations. It’s important to have a well-defined process for collaborating with law enforcement to ensure that all legal requirements are met.

Note – A strong incident management process is very much important in order to reduce the recovery costs, potential liabilities and most importantly reducing the damage to the victim (both at personal level and organizational level).



Article Tags :