Detection & Analysis Stage (Part 1)
1. Detection & Analysis Overview
Purpose: To detect security incidents effectively and conduct an initial investigation to establish context before escalating the response.
Why: Proper detection and analysis ensure that incidents are identified early, reducing the time to respond and minimizing potential damage. Contextual understanding prevents misinterpretation of events and ensures appropriate actions are taken.
2. Levels of Detection
Purpose: To implement a layered detection strategy by logically categorizing the network into different levels.
Why: A multi-layered detection approach ensures comprehensive visibility across the network, making it harder for threats to go unnoticed.
Technical Example:
Detection at the Network Perimeter:
Use firewalls, IDS/IPS, and DMZ configurations to monitor traffic entering and leaving the network:
Example firewall rule to log suspicious outbound traffic:
Configure IDS/IPS systems like Snort or Suricata to detect malicious activity:
Detection at the Internal Network Level:
Deploy host-based firewalls and HIDS/HIPS to monitor internal traffic:
Example Windows Defender Firewall rule to block workstation-to-workstation communication:
Use tools like OSSEC for host-based intrusion detection:
Detection at the Endpoint Level:
Leverage antivirus systems and EDR solutions to detect malicious activity on endpoints:
Example EDR query in Microsoft Defender for Endpoint:
Enable Attack Surface Reduction (ASR) rules to block common attack techniques:
Detection at the Application Level:
Analyze application and service logs for signs of compromise:
Example Splunk query to detect unusual login attempts in web server logs:
Monitor database logs for unauthorized queries:
3. Initial Investigation
Purpose: To gather sufficient information about a detected incident before escalating the response.
Why: Jumping to conclusions without proper context can lead to unnecessary escalations or missed critical details. A thorough initial investigation ensures accurate understanding and prioritization.
Technical Example:
Establish Context:
Investigate alerts by correlating multiple data sources:
Example SIEM query to correlate firewall logs with endpoint events:
Verify the system associated with an IP address and time zone:
Collect Information:
Gather details from various sources:
Employee Reports: Document abnormal behavior observed by employees.
Tool Alerts: Review alerts from EDR, IDS, firewalls, or SIEM systems.
Threat Hunting: Proactively search for indicators of compromise (IOCs):
Third-Party Notifications: Validate external reports of compromise.
4. Information Sharing and Threat Intelligence
Purpose: To leverage context-based threat intelligence and share knowledge across teams for faster and more effective responses.
Why: Threat intelligence provides valuable insights into emerging threats and attacker tactics, helping organizations stay ahead of adversaries.
Technical Example:
Integrate Threat Intelligence Feeds:
Use threat intelligence platforms like MISP, AlienVault OTX, or VirusTotal to enrich detection capabilities:
Example VirusTotal API query to check a suspicious file hash:
Feed IOCs into SIEM systems for real-time correlation:
Share Findings Across Teams:
Use collaboration tools like Slack, Microsoft Teams, or Jira to document and share findings:
Example Slack notification for a detected threat:
Conclusion
The detection and analysis phase is critical for identifying and responding to security incidents effectively. By implementing a layered detection strategy, conducting thorough initial investigations, and leveraging threat intelligence, organizations can improve their ability to detect and respond to threats.
Last updated