External/Removable Media
An attack executed from removable media (for example, flash drive, CD) or a peripheral device.
Attrition
An attack that employs brute force methods to compromise, degrade, or destroy systems, networks, or services.
Web
An attack executed from a website or a web-based application (for example, drive-by download).
Email
An attack executed via an email message or attachment (for example, malware infection).
Improper Usage
Any incident resulting from violation by an authorized user of the acceptable usage policies established by an organization, excluding the above categories.
Loss or Theft of Equipment
The loss or theft of a computing device or media used by the organization, such as a laptop or smart phone. Identify which pieces of equipment would cause the greatest risk to the company in the event of loss or theft. In most companies, the laptop belonging to the CFO would be included along with any server hard drive containing IP or other sensitive data.
Other
An attack that does not fit into any of the other categories.
An alert taxonomy can help you to order related alerts into a picture of a larger attack in progress, as the attacker does the following:
Intent | Attacker Goal |
---|---|
Reconnaissance & Probing |
|
Delivery & Attack |
|
Exploitation & Installation |
|
System Compromise |
|
Incident Type | Kill Chain Stage | Priority Level | Recommended Action |
---|---|---|---|
Port scanning | Reconnaissance & probing | Low | You can ignore these unless Sheriffhim OTX IP Reputation gives the IP responsible a bad score. OTX IP Reputation stores reports on any suspicious IP activity, which may or may not be malicious. See Open Threat Exchange® and Sheriff CSM. |
Malware infection | Delivery & attack | Low-Medium | Remediate malware infections as quickly as possible before they progress. Scan the rest of your system for related IoCs, for example, MD5 hashes. See Open Threat Exchange® and Sheriff CSM. |
Distributed denial of service | Exploitation & Installation | High | Configure web servers to protect against HTTP and SYN flood requests. Coordinate with your Internet service provider (ISP) during an attack to block the responsible IPs. |
Unauthorized access | Exploitation & Installation | Medium | Detect, monitor, and investigate unauthorized access attempts—with priority on those that are mission-critical and/or contain sensitive data. |
Insider breach | System compromise | High | Identify the privileged user accounts for all domains, servers, applications, and critical devices. Make sure that you enabled monitoring for all systems, and for all system events. Verify that your Sheriff CSM raw log infrastructure is actively recording all events. |
Unauthorized privilege escalation | Exploitation & installation | High | Through its built-in correlation directives, Sheriff CSM automatically records all privileged escalation events, and sends alarms for unauthorized attempts. Depending on requirements, you may also enhance your Sheriff CSM environment by adding custom correlation directives. |
Destructive attack on systems, data. | System compromise | High | Back up all critical data and systems; test, document, and update system recovery procedures. During a system compromise, capture evidence carefully. Document all recovery steps and all evidential data. |
Advanced persistent threat (APT) or multistage attack | Represents all stages from reconnaissance through system compromise | High | Any of the individual events illustrated could represent part of an APT, the most formidable type of security threat. For that reason, view each event as part of a larger context, incorporating the latest threat intelligence. Sheriff CSM correlation directives often look at how many events of a specific nature occurred before generating an alarm, thereby increasing its reliability. OTX pulses, on the other hand, require only one event to do so. |
False alarms | Represents all stages. | Low | Much of the job of an incident responder consists of eliminating irrelevant information and removing false positives. This process is continuous. For more information, see Establishing Baseline Network Behavior and also Policy Management. |
Other | All stages | High | Incident response never stops and provides a source for continuous improvement. Over time, as you see events turn into alarms, you gather knowledge that helps you discover new ways to categorize events and to prevent them from becoming alarms in the first place. |