Detection & Analysis Stage (Part 1)

Overview

  • This stage focuses on detecting security incidents using various tools, sensors, logs, and trained personnel.

  • Includes sharing information and utilizing context-based threat intelligence.

  • Network segmentation and visibility are critical.

Sources of Threat Detection

Threats can be detected through:

  1. Employees noticing abnormal behavior.

  2. Alerts from security tools (EDR, IDS, Firewall, SIEM, etc.).

  3. Threat hunting activities.

  4. Third-party notifications about a compromise.

Levels of Detection

To enhance detection, organizations categorize their networks into different levels:

  1. Network Perimeter: Firewalls, network intrusion detection/prevention systems, DMZ.

  2. Internal Network: Local firewalls, host intrusion detection/prevention systems.

  3. Endpoint Level: Antivirus systems, endpoint detection & response systems.

  4. Application Level: Application logs, service logs.


Initial Investigation

When a security incident is detected:

  • Conduct an initial investigation before calling an organization-wide incident response.

  • Gather key information:

    • Date/Time of the incident.

    • Who detected it and how it was detected.

    • Type of incident (e.g., phishing, system unavailability).

    • Impacted systems and actions taken.

    • Physical location, OS, IP addresses, hostnames, and system state.

    • If malware is involved: List of affected systems, type of malware, forensic data (hashes, files, etc.).

  • Understanding the impacted systems helps in making appropriate response decisions.

Building an Incident Timeline

  • A chronological event log that organizes information for analysis.

  • Example format:

Date
Time
Hostname
Event Description
Data Source

09/09/2021

13:31 CET

SQLServer01

Hacker tool 'Mimikatz' detected

Antivirus Software

  • Helps identify attacker behavior, network connections, downloads, and activity origins.


Incident Severity & Extent

Key questions to determine severity:

  1. What is the exploitation impact?

  2. What are the exploitation requirements?

  3. Are business-critical systems affected?

  4. Suggested remediation steps?

  5. How many systems are impacted?

  6. Is the exploit actively being used in the wild?

  7. Does the exploit have worm-like capabilities?

  • High-impact incidents require immediate escalation.


Incident Confidentiality & Communication

  • Incident details should remain confidential unless disclosure is legally required.

  • Communication should be handled by authorized personnel in coordination with legal teams.

  • Initial expectations and goals should be defined:

    • Type of incident.

    • Available evidence sources.

    • Time estimation for investigation.

    • Probability of identifying the adversary.

  • Keep stakeholders and management updated as the investigation progresses.


Quiz: Detection & Analysis Stage (Part 1)

  1. Which of the following is NOT a source of threat detection?

    • A) Firewall alerts

    • B) Threat hunting activities

    • C) A customer complaint about service delays

    • D) Employee reporting suspicious activity

  2. What is the purpose of network segmentation in threat detection?

    • A) It improves network speed.

    • B) It isolates sensitive data and increases visibility.

    • C) It eliminates the need for endpoint security.

    • D) It makes external attacks impossible.

  3. When conducting an initial investigation, which piece of information is the least relevant?

    • A) The color of the affected device

    • B) The system owner and its purpose

    • C) The IP address and hostname

    • D) The actions taken on the impacted system

  4. What does an incident timeline primarily focus on?

    • A) System performance benchmarks

    • B) Attacker behavior and event sequence

    • C) Employee activity logs

    • D) Network bandwidth usage

  5. Why should incident information be kept confidential?

    • A) To protect the adversary's identity

    • B) To prevent leaks that could benefit the attacker

    • C) To avoid informing law enforcement

    • D) To ensure all employees are aware of the breach

  6. What is an important factor when determining incident severity?

    • A) Number of impacted systems

    • B) The number of employees in the company

    • C) The software licensing cost

    • D) The length of time since the last security audit

  7. What is the role of a firewall in threat detection?

    • A) Prevents phishing attacks

    • B) Blocks unauthorized access at the network perimeter

    • C) Detects anomalies in email attachments

    • D) Tracks user login times

  8. If malware is involved in an incident, what information should be collected?

    • A) The number of employees who received an email about it

    • B) The type of malware and forensic details (hashes, files, etc.)

    • C) The software update history of the affected system

    • D) The cost of the affected device

  9. Why is context important when analyzing security incidents?

    • A) It helps prioritize responses based on potential impact

    • B) It speeds up hardware replacement

    • C) It guarantees all incidents have the same resolution process

    • D) It eliminates the need for log analysis

  10. What should be included in an incident report?

  • A) The favorite color of the affected user

  • B) The date, time, hostname, and event description

  • C) The last software update date

  • D) The marketing budget for cybersecurity awareness

Answers:

  1. C

  2. B

  3. A

  4. B

  5. B

  6. A

  7. B

  8. A

  9. A

  10. B

Last updated