|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T r
Length: 2123 (0x84b) Types: TextFile Names: »recovering.tex«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen └─⟦36857feb3⟧ »./papers/Security_Primer/primer.tar.Z« └─⟦5c5f5f2d8⟧ └─⟦this⟧ »recovering.tex«
\section{Recovering From Disasters} Incident recovery is the final portion of the of the incident handling process. Like the other portions of incident handling, it is not particularly difficult but is sufficiently intricate to allow for many errors. \begin{description} \item[Telling everyone that is over.] For a large incident, it is not unusual to have contacted people at a dozen or more sites. It is important to let everyone know that you are done and to be sure to give your colleagues the information that they need. It is also important that your staff knows that things are over so that they can return to normal work. Generally a lot of people need to thanked for the extra hours and effort that they have contributed. \item[Removing all Tools.] Many of the tools that were installed and using during an incident need to removed from the system. Some will interfere with performance. Others are worth stealing by a clever attacker. Similarly a future attacker that gets a chance to look at the tools will know a lot about how you are going to track him. Often extra accounts are added for handling the incident. These need to be removed. \item[File and Service Restoration.] Returning the file system to a ``known good state'' is often the most difficult part of recovery. This is especially true with long incidents. \item[Reporting Requirements.] Often, especially if law enforcement agencies have become involved, a formal report will be required. \item[History.] After everything is over, a final reconstruction of the events is appropriate. In this way, everyone on your staff is telling the same story. \item[Future Prevention.] It is important to make sure that {\em all\/} of the vulnerabilities that were used in or created the incident are secured. \end{description} Just after an incident, it is likely to be a good time to create sensible policies where they have not existed in the past and to request extra equipment or staffing to increase security. Similarly, it is a logical time for someone else to demand stricter (nonsensical) policies to promote security.