ºÝºÝߣ

ºÝºÝߣShare a Scribd company logo
Services, Functions and Sub-functions
1 Incident Management
1.1 Incident Handling
1.1.1 Incident Validation and Classification
1.1.2 Incident Tracking
1.1.3 Information Collection
1.1.4 Coordination and reporting
1.1.5 Communication with news media
1.2 Incident Analysis
1.2.1 Impact Analysis
1.2.2 Mitigation Analysis
1.2.3 Recovery Analysis
1.3 Incident Mitigation and Recovery
1.3.1 Containment (self-spreading directed incidents)
1.3.2 Restore confidentiality, integrity, availability
2 Analysis
2.1 Artifact Analysis
2.1.1 Surface Analysis
2.1.2 Reverse Engineering
2.1.3 Run Time Analysis
2.1.4 Comparative Analysis
2.2 Media Analysis
2.3 Vulnerability / Exploitation Analysis
2.3.1 Technical (Malware) Vulnerability /
Exploitation Path Analysis
2.3.2 Root Cause Analysis
2.3.3 Remediation Analysis
2.3.4 Mitigation Analysis
3 Information Assurance
3.1 Risk Management
3.1.1 Risk Assessment
3.1.1.1 Inventory of Critical Asset/Data
3.1.1.2 Standards Evaluation
3.1.1.3 Execute Assessment
3.1.1.4 Findings & Recommendations
3.1.1.5 Tracking
3.1.1.6 Testing
3.1.2 Risk Assessment Advice
3.2 Compliance Management
3.2.1 Manage Compliance Requirements/Standards
3.2.2 Compliance Assessment
3.3 Operating Policies Support
3.4 Business Continuity and Disaster Recovery
Planning Support
3.5 Technical Security Support
3.6 Patch Management
6 Capability Building
6.1 Organizational Metrics
6.2 Training and Education
6.2.1 Knowledge, Skill, and Ability Requirements Gathering
6.2.2 Development of Educational and Training Materials
6.2.3 Delivery of Content
6.2.4 Mentoring
6.2.5 Professional Development
6.2.6 Skill Development
6.3 Conducting Exercises
6.3.1 Requirements Analysis
6.3.2 Format and Environment Development
6.3.3 Scenario Development
6.3.4 Executing Exercises
6.3.5 Exercise Outcome Review
6.4 Technical Advice
6.4.1 Infrastructure Design and Engineering
6.4.2 Infrastructure Procurement
6.4.3 Tools Evaluation
6.4.4 Infrastructure Resourcing
6.5 Lesson Learned Analysis
6.6 Development of Vulnerability Discovery/Analysis/
Remediation/Root Cause Analysis Methodologies
6.7 Development of processes for Gathering/Fusing/
Correlating Security Intelligence
6.8 Development of Tools
5 Outreach/Communications
5.1 Security Awareness Raising
5.2 Cybersecurity Strategic Policy Advisement
5.2.1 Function -Policy Consultancy
5.2.2 Legal Consultancy
5.3 Knowledge Sharing and Publications Dissemination
5.3.1 Public Service Announcements
5.3.2 Publication/Dissemination of Information
4 Situational Awareness
4.1 Sensor Operation
4.1.1 Requirements Analysis
4.1.2 Data Source Identification
4.1.3 Legitimizing Collection
4.1.4 Data Acquisition
4.1.5 Sensor Management
4.1.6 Results Management
4.2 Fusion and Correlation
4.2.1 Determine Fusion Algorithms
4.2.2 Fusion Analysis
4.3 Development and Curation of Security Intelligence
4.3.1 Source Identification and Inventory
4.3.2 Source Content Collection and Cataloging
4.3.3 Information sharing
Forum of Incident Response and Security Teams, Inc.
Security Incident Response Team (SIRT) Services Framework
Version 2.0, 2016 10 12

More Related Content

Viewers also liked (8)

Hari kantin sa
Hari kantin saHari kantin sa
Hari kantin sa
thaqiefahrazali
?
Peta konsep struktur atom
Peta konsep struktur atomPeta konsep struktur atom
Peta konsep struktur atom
Dwi Karyani
?
Part 1 Teori Organisasi
Part 1   Teori OrganisasiPart 1   Teori Organisasi
Part 1 Teori Organisasi
sudarsono mr
?
Teks pengacara majlis program sambutan maulidur rasul pada 10
Teks pengacara majlis program sambutan maulidur rasul  pada 10Teks pengacara majlis program sambutan maulidur rasul  pada 10
Teks pengacara majlis program sambutan maulidur rasul pada 10
Adnan Hassan
?
Buku panduan tmk merentas kurikulum
Buku panduan tmk merentas kurikulumBuku panduan tmk merentas kurikulum
Buku panduan tmk merentas kurikulum
Wan Suhaimi Wan Setapa
?
Brosur m.desa
Brosur m.desaBrosur m.desa
Brosur m.desa
cegusiti21
?
Ö²Îï´«²¥·½·¨
Ö²Îï´«²¥·½·¨Ö²Îï´«²¥·½·¨
Ö²Îï´«²¥·½·¨
Cheng Seng
?
Kertas kerja futsal 1 m1s
Kertas kerja futsal 1 m1sKertas kerja futsal 1 m1s
Kertas kerja futsal 1 m1s
Eurodeck Sdn Bhd
?
Peta konsep struktur atom
Peta konsep struktur atomPeta konsep struktur atom
Peta konsep struktur atom
Dwi Karyani
?
Part 1 Teori Organisasi
Part 1   Teori OrganisasiPart 1   Teori Organisasi
Part 1 Teori Organisasi
sudarsono mr
?
Teks pengacara majlis program sambutan maulidur rasul pada 10
Teks pengacara majlis program sambutan maulidur rasul  pada 10Teks pengacara majlis program sambutan maulidur rasul  pada 10
Teks pengacara majlis program sambutan maulidur rasul pada 10
Adnan Hassan
?
Ö²Îï´«²¥·½·¨
Ö²Îï´«²¥·½·¨Ö²Îï´«²¥·½·¨
Ö²Îï´«²¥·½·¨
Cheng Seng
?

Similar to FIRST SIRT services v2 (20)

Mm iso 27001 2013 +annex a
Mm iso 27001 2013 +annex aMm iso 27001 2013 +annex a
Mm iso 27001 2013 +annex a
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001
?
Computing security
Computing securityComputing security
Computing security
seung hyun Seo
?
pcnsa-blueprint_PAN-OS_v11.0-1__0012.pdf
pcnsa-blueprint_PAN-OS_v11.0-1__0012.pdfpcnsa-blueprint_PAN-OS_v11.0-1__0012.pdf
pcnsa-blueprint_PAN-OS_v11.0-1__0012.pdf
Azzeddine Salem
?
Report format
Report formatReport format
Report format
Rahul Pola
?
PMBOK 5th Edition Schema
PMBOK 5th Edition SchemaPMBOK 5th Edition Schema
PMBOK 5th Edition Schema
Razaullah Khan, MBA, PMP?, CAPM?
?
Literature survey andrei_manta_0
Literature survey andrei_manta_0Literature survey andrei_manta_0
Literature survey andrei_manta_0
darshanahiren
?
Thesis Final Report
Thesis Final ReportThesis Final Report
Thesis Final Report
Sadia Sharmin
?
Mapaprocesospmbok5 131124115700-phpapp02
Mapaprocesospmbok5 131124115700-phpapp02Mapaprocesospmbok5 131124115700-phpapp02
Mapaprocesospmbok5 131124115700-phpapp02
Bryan Barrezueta
?
Mapa procesos pmbok 5
Mapa procesos pmbok 5Mapa procesos pmbok 5
Mapa procesos pmbok 5
Pedro Arcas
?
Risk Chapter 11.pptx
Risk Chapter 11.pptxRisk Chapter 11.pptx
Risk Chapter 11.pptx
KareemBullard1
?
Chat Application [Full Documentation]
Chat Application [Full Documentation]Chat Application [Full Documentation]
Chat Application [Full Documentation]
Rajon
?
Event Management and Monitoring Strategy
Event Management and Monitoring StrategyEvent Management and Monitoring Strategy
Event Management and Monitoring Strategy
James Gingras
?
Big data
Big dataBig data
Big data
Prashant Navatre
?
Isms info
Isms infoIsms info
Isms info
Abhisek Gupta
?
MIL-STD-498:1994
MIL-STD-498:1994MIL-STD-498:1994
MIL-STD-498:1994
Massimo Talia
?
Project- Crop Disease Detection Using Convolutional Neural Network.pdf
Project- Crop Disease Detection Using Convolutional Neural Network.pdfProject- Crop Disease Detection Using Convolutional Neural Network.pdf
Project- Crop Disease Detection Using Convolutional Neural Network.pdf
Sanket Pawar
?
Information Security Incident Management.pdf
Information Security  Incident Management.pdfInformation Security  Incident Management.pdf
Information Security Incident Management.pdf
NahidHasan6141
?
IHST - SMS in Small Operations
IHST - SMS in Small OperationsIHST - SMS in Small Operations
IHST - SMS in Small Operations
IHSTFAA
?
Increasing the Probability of Success with Continuous Risk Management
Increasing the Probability of Success with Continuous Risk ManagementIncreasing the Probability of Success with Continuous Risk Management
Increasing the Probability of Success with Continuous Risk Management
Glen Alleman
?
Android pen test Checklist
Android pen test ChecklistAndroid pen test Checklist
Android pen test Checklist
Tanmoy Ray
?
pcnsa-blueprint_PAN-OS_v11.0-1__0012.pdf
pcnsa-blueprint_PAN-OS_v11.0-1__0012.pdfpcnsa-blueprint_PAN-OS_v11.0-1__0012.pdf
pcnsa-blueprint_PAN-OS_v11.0-1__0012.pdf
Azzeddine Salem
?
Literature survey andrei_manta_0
Literature survey andrei_manta_0Literature survey andrei_manta_0
Literature survey andrei_manta_0
darshanahiren
?
Mapaprocesospmbok5 131124115700-phpapp02
Mapaprocesospmbok5 131124115700-phpapp02Mapaprocesospmbok5 131124115700-phpapp02
Mapaprocesospmbok5 131124115700-phpapp02
Bryan Barrezueta
?
Mapa procesos pmbok 5
Mapa procesos pmbok 5Mapa procesos pmbok 5
Mapa procesos pmbok 5
Pedro Arcas
?
Chat Application [Full Documentation]
Chat Application [Full Documentation]Chat Application [Full Documentation]
Chat Application [Full Documentation]
Rajon
?
Event Management and Monitoring Strategy
Event Management and Monitoring StrategyEvent Management and Monitoring Strategy
Event Management and Monitoring Strategy
James Gingras
?
Project- Crop Disease Detection Using Convolutional Neural Network.pdf
Project- Crop Disease Detection Using Convolutional Neural Network.pdfProject- Crop Disease Detection Using Convolutional Neural Network.pdf
Project- Crop Disease Detection Using Convolutional Neural Network.pdf
Sanket Pawar
?
Information Security Incident Management.pdf
Information Security  Incident Management.pdfInformation Security  Incident Management.pdf
Information Security Incident Management.pdf
NahidHasan6141
?
IHST - SMS in Small Operations
IHST - SMS in Small OperationsIHST - SMS in Small Operations
IHST - SMS in Small Operations
IHSTFAA
?
Increasing the Probability of Success with Continuous Risk Management
Increasing the Probability of Success with Continuous Risk ManagementIncreasing the Probability of Success with Continuous Risk Management
Increasing the Probability of Success with Continuous Risk Management
Glen Alleman
?
Android pen test Checklist
Android pen test ChecklistAndroid pen test Checklist
Android pen test Checklist
Tanmoy Ray
?

FIRST SIRT services v2

  • 1. Services, Functions and Sub-functions 1 Incident Management 1.1 Incident Handling 1.1.1 Incident Validation and Classification 1.1.2 Incident Tracking 1.1.3 Information Collection 1.1.4 Coordination and reporting 1.1.5 Communication with news media 1.2 Incident Analysis 1.2.1 Impact Analysis 1.2.2 Mitigation Analysis 1.2.3 Recovery Analysis 1.3 Incident Mitigation and Recovery 1.3.1 Containment (self-spreading directed incidents) 1.3.2 Restore confidentiality, integrity, availability 2 Analysis 2.1 Artifact Analysis 2.1.1 Surface Analysis 2.1.2 Reverse Engineering 2.1.3 Run Time Analysis 2.1.4 Comparative Analysis 2.2 Media Analysis 2.3 Vulnerability / Exploitation Analysis 2.3.1 Technical (Malware) Vulnerability / Exploitation Path Analysis 2.3.2 Root Cause Analysis 2.3.3 Remediation Analysis 2.3.4 Mitigation Analysis 3 Information Assurance 3.1 Risk Management 3.1.1 Risk Assessment 3.1.1.1 Inventory of Critical Asset/Data 3.1.1.2 Standards Evaluation 3.1.1.3 Execute Assessment 3.1.1.4 Findings & Recommendations 3.1.1.5 Tracking 3.1.1.6 Testing 3.1.2 Risk Assessment Advice 3.2 Compliance Management 3.2.1 Manage Compliance Requirements/Standards 3.2.2 Compliance Assessment 3.3 Operating Policies Support 3.4 Business Continuity and Disaster Recovery Planning Support 3.5 Technical Security Support 3.6 Patch Management 6 Capability Building 6.1 Organizational Metrics 6.2 Training and Education 6.2.1 Knowledge, Skill, and Ability Requirements Gathering 6.2.2 Development of Educational and Training Materials 6.2.3 Delivery of Content 6.2.4 Mentoring 6.2.5 Professional Development 6.2.6 Skill Development 6.3 Conducting Exercises 6.3.1 Requirements Analysis 6.3.2 Format and Environment Development 6.3.3 Scenario Development 6.3.4 Executing Exercises 6.3.5 Exercise Outcome Review 6.4 Technical Advice 6.4.1 Infrastructure Design and Engineering 6.4.2 Infrastructure Procurement 6.4.3 Tools Evaluation 6.4.4 Infrastructure Resourcing 6.5 Lesson Learned Analysis 6.6 Development of Vulnerability Discovery/Analysis/ Remediation/Root Cause Analysis Methodologies 6.7 Development of processes for Gathering/Fusing/ Correlating Security Intelligence 6.8 Development of Tools 5 Outreach/Communications 5.1 Security Awareness Raising 5.2 Cybersecurity Strategic Policy Advisement 5.2.1 Function -Policy Consultancy 5.2.2 Legal Consultancy 5.3 Knowledge Sharing and Publications Dissemination 5.3.1 Public Service Announcements 5.3.2 Publication/Dissemination of Information 4 Situational Awareness 4.1 Sensor Operation 4.1.1 Requirements Analysis 4.1.2 Data Source Identification 4.1.3 Legitimizing Collection 4.1.4 Data Acquisition 4.1.5 Sensor Management 4.1.6 Results Management 4.2 Fusion and Correlation 4.2.1 Determine Fusion Algorithms 4.2.2 Fusion Analysis 4.3 Development and Curation of Security Intelligence 4.3.1 Source Identification and Inventory 4.3.2 Source Content Collection and Cataloging 4.3.3 Information sharing Forum of Incident Response and Security Teams, Inc. Security Incident Response Team (SIRT) Services Framework Version 2.0, 2016 10 12