Start Now

In this article

Incident Response SANS: The 6 Steps in Depth


November 4, 2019
Last Updated: September 26, 2024
Share on:

Incident response helps organizations ensure that organizations know of security incidents and that they can act quickly to minimize damage caused. The aim is also to prevent follow on attacks or related incidents from taking place in the future.

The SANS Institute is a private organization, which provides research and education on information security. In this article, we’ll outline, in detail, six components of a SANS incident response plan including elements such as preparation, identification, containment, and eradication. Read on to learn more about Cynet’s 24/7 incident response team and how they can help your organization.

What Is Incident Response?

Incident response is a process that allows organizations to identify, prioritize, contain and eradicate cyberattacks. The goal of incident response is to ensure that organizations are aware of significant security incidents, and act quickly to stop the attacker, minimize damage caused, and prevent follow on attacks or similar incidents in the future.

Looking to automate
incident response?

Cynet is the Leading All-In-One Security Platform

  • 24/7 Managed Detection and Response
  • Security Automation, Orchestration and Response (SOAR)
  • Full-Featured EDR and NGAV

Achieved 100% detection in 2023

review stars

Rated 4.8/5

review stars

2024 Leader

What Is SANS?

The SANS Institute is a private organization established in 1989, which offers research and education on information security. It is the world’s largest provider of security training and certification, and maintains the largest collection of research about cybersecurity. SANS also operates the Internet Storm Center, an early warning system for global cyber threats.

Tips From the Expert

In my experience, here are tips that can help you better implement and optimize the SANS incident response framework:

  1. Use automated tools for real-time identification
    Integrate automated threat detection tools that can provide real-time alerts and contextual data. This enhances the identification phase by reducing response time and improving the accuracy of incident detection through correlation across multiple data sources.
  2. Leverage threat hunting during eradication
    During the eradication phase, conduct proactive threat hunting to uncover hidden threats or persistent backdoors that might have been missed. This helps ensure a thorough clean-up and reduces the likelihood of recurrence.
  3. Integrate forensic capabilities into your recovery process
    Ensure that your recovery phase includes forensic analysis to validate that systems are clean before bringing them back online. This can involve scanning for dormant malware, analyzing system logs, and verifying that no unauthorized changes have been made.
  4. Focus on root cause analysis during eradication
    Prioritize root cause analysis to not only remove immediate threats but also to address underlying vulnerabilities or weaknesses that allowed the incident to occur. This approach helps prevent similar incidents in the future.
  5. Use behavioral analytics for post-recovery monitoring
    Implement continuous monitoring using behavioral analytics tools to detect any anomalies post-recovery. This adds a layer of assurance that systems are functioning normally and have not been re-compromised.

Eyal Gruner is the Co-Founder and CEO of Cynet. He is also Co-Founder and former CEO of BugSec, Israel’s leading cyber consultancy, and Versafe, acquired by F5 Networks. Gruner began his career at age 15 by hacking into his bank’s ATM to show the weakness of their security and has been recognized in Google’s security Hall of Fame.

SANS Incident Response Plan

The SANS Institute published a 20-page handbook that lays out a structured 6-step plan for incident response. Below is a brief summary of the process, and in the following sections we’ll go into more depth about each step:

  1. Preparation—review and codify an organizational security policy, perform a risk assessment, identify sensitive assets, define which are critical security incidents the team should focus on, and build a Computer Security Incident Response Team (CSIRT).
  2. Identification—monitor IT systems and detect deviations from normal operations, and see if they represent actual security incidents. When an incident is discovered, collect additional evidence, establish its type and severity, and document everything.
  3. Containment—perform short-term containment, for example by isolating the network segment that is under attack. Then focus on long-term containment, which involves temporary fixes to allow systems to be used in production, while rebuilding clean systems.
  4. Eradication—remove malware from all affected systems, identify the root cause of the attack, and take action to prevent similar attacks in the future.
  5. Recovery—bring affected production systems back online carefully, to prevent additional attacks. Test, verify and monitor affected systems to ensure they are back to normal activity.
  6. Lessons learned—no later than two weeks from the end of the incident, perform a retrospective of the incident. Prepare complete documentation of the incident, investigate the incident further, understand what was done to contain it and whether anything in the incident response process could be improved.

Step 1: Preparation

The goal of the preparation stage is to ensure that the organization can comprehensively respond to an incident at a moment’s notice.

In a SANS incident response plan, these are critical elements that should be prepared in advance:

  • Policy—define principle, rules and practices to guide security processes. Ensure the policy is highly visible both to employees and users, for example by displaying a login banner that states all activities will be monitored, and clearly stating unauthorized activities and the associated penalties.
  • Response Plan/Strategy—create a plan for incident handling, with prioritization of incidents based on organizational impact. For example, organizational impact is higher the more employees are affected within the organization, the more an event is likely to impact revenues, or the more sensitive data is involved, such as salaries, financial or private customer data.
  • Communication—create a communication plan that states which CSIRT members should be contacted during an incident, for what reasons and when they can be contacted. For example, there may be operations staff on call at all hours, everyone in the organization should know, which incident responders to contact to help bring systems back up. The communication plan should state the policy for contacting law enforcement, and who should make contact.
  • Documentation—documentation is not optional and can be a life saver. If the incident is considered a criminal act, your documentation will be used to press charges against suspects. Any information you collect about the incident can also be used for lessons learned and to improve your incident response process. Documentation should answer the questions: Who, What, When, Where, Why, and How?.
  • Team—build a CSIRT team with all relevant skills, not just security. Include individuals with expertise in security but also IT operations, legal, human resources, and public relations—all of whom can be instrumental in dealing with and mitigating an attack.
  • Access control—make sure that CSIRT staff have the appropriate permissions to do their job. It is a good idea to have, as part of the incident response plan, network administrators add permissions to CSIRT member accounts, and then remove them when the incident is over.
  • Training—ensure initial and ongoing training for all CSIRT members on incident response processes, technical skills and relevant cyberattack patterns and techniques. Carry out drills at regular intervals to insure that everyone in the CSIRT knows what they need to do and is able to perform their duties during a real incident.
  • Tools—evaluate, select and deploy software and hardware that can help respond to an incident more effectively. All of the tools should be packaged in a “jump bag” that can be quickly accessed by CSIRT members when an incident occurs.

Leveraging an integrated breach protection platform for incident response

An integrated security platform like Cynet 360 is highly useful for incident response teams. This platform can automatically determine behavioral baselines, identify anomalies that indicate suspicious behavior, and collect all relevant data across endpoints, networks, and users to help the CSIRT explore the anomaly.

Cynet 360 can help your organization perform remote manual action to contain security events. These actions can include deleting files, stopping malicious processes, resetting passwords and restarting devices that have been affected. Cynet can also help your organization carry out measures such as preventing rapid encryption of files or automatically isolating endpoints that have been the target of malware.

Learn more about Cynet 360’s incident response capabilities.

Step 2: Identification

This step involves detecting deviations from normal operations in the organization, understanding if a deviation represents a security incident, and determining how important the incident is.

The SANS incident response identification procedure includes the following elements:

  • Setting up monitoring for all sensitive IT systems and infrastructure.
  • Analyzing events from multiple sources including log files, error messages, and alerts from security tools.
  • Identifying an incident by correlating data from multiple sources, and reporting it as soon as possible.
  • Notifying CSIRT members and establishing communication with a designated command center (for example this could be senior management, IT operations)
  • strong{Assigning at least two incident responders to a live incident, one as the primary handler who assesses the incident and makes the decision, and the other to help investigate and gather evidence.
  • Documenting everything that incident responders are doing as part of the attack—answering the Who, What, Where, Why, and How questions.
  • Threat prevention and detection capabilities across all main attack vectors.

Step 3: Containment

The goal of containment is to limit damage from the current security incident and prevent any further damage. Several steps are necessary to completely mitigate the incident, while also preventing destruction of evidence that may be needed for prosecution.

The SANS containment process involves:

  • Short-term containment—limiting damage before the incident gets worse, usually by isolating network segments, taking down hacked production server and routing to failover.
  • System backup—taking a forensic image of the affected system(s) with tools such as Forensic Tool Kit (FTK) or EnCase, and only then wipe and reimage the systems. This will preserve evidence from the attack that can be used in court, and also for further investigation of the incident and lessons learned.
  • Long-term containment—applying temporarily fixes to make it possible to bring production systems back up. The primary focus is removing accounts or backdoors left by attackers on the systems, and addressing the root cause—for example, fixing a broken authentication mechanism or patching a vulnerability that led to the attack.

Step 4: Eradication

Eradication is intended to actually remove malware or other artifacts introduced by the attacks, and fully restore all affected systems.

The SANS eradication process involves:

  • Reimaging—complete wipe and re-image of affected system hard drives to ensure any malicious content is removed.
  • Preventing the root cause—understanding what caused the incident preventing future compromise, for example by patching a vulnerability exploited by the attacker.
  • Applying basic security best practices—for example, upgrading old software versions and disabling unused services.
  • Scan for malware—use anti-malware software, or Next-Generation Antivirus (NGAV) if available, to scan affected systems and ensure all malicious content is removed.

Step 5: Recovery

The goal of recovery is to bring all systems back to full operation, after verifying they are clean and the threat is removed.

The SANS recovery procedure involves:

  • Defining time and date to restore operations—system owners should make the final decision on when to restore services, based on information from the CSIRT.
  • Test and verifying—ensuring systems are clean and fully functional as they go live.
  • Monitoring—ongoing monitoring for some time after the incident to observe operations and check for abnormal behaviors.
  • Do everything to prevent another incident—considering what can be done on the restored systems to protect them from recurrence of the same incident.

Step 6: Lessons Learned

No later than two weeks from the end of the incident, the CSIRT should compile all relevant information about the incident and extract lessons that can help with future incident response activity.

The SANS lessons learned process includes:

  • Completing documentation—it is never possible to document all aspects of an incident while it is going on, and achieving comprehensive documentation is very important to identify lessons for next time.
  • Publishing an incident report—the report should provide play-by-play review of the entire incident, and answer the Who, What, Where, Why, and How questions.
  • Identify ways to improve CSIRT performance—extract items from the incident report that were not handled correctly and can be improved for next time.
  • Establish a benchmark for comparison—derive metrics from the incident report that you can use to guide you in future incidents.
  • Lessons learned meeting—conduct a meeting with the CSIRT team and other stakeholders to discuss the incident and cement lessons learned that can be implemented immediately.

SANS suggests this general format for the incident report:

  • When was the problem first detected and by whom
  • The scope of the incident
  • How it was contained and eradicated
  • Worked performed during recovery
  • Areas where the CIRT teams were effective
  • Areas that need improvement

Follow the SANS IR Framework with Cynet

Cynet 360 provides powerful capabilities across the three first SANS stages:

  • Identification – Cynet EDR, network analytics, UEBA and deception technology capabilities form an integrated, multilayered detection fabric that unveils malicious activity across the entire environment – endpoint, network and users.
  • Containment – Cynet 360 response orchestration, a wide set of remediation tools to isolate infected endpoints, reset compromised user accounts, block attacker-controlled traffic and quarantine or delete malicious files.
  • Eradication – Cynet 360 provides complete visibility across all endpoint, user and network activity to accelerate and optimize investigations. It helps responders discover the root cause of an attack, understand its scope and impact, and eliminate malicious infrastructure and activity using its response orchestration module.

Contact Cynet for immediate help
For emergency assistance from Cynet’s security experts, call US 1-(347)-474-0048, International +44-203-290-9051, or complete this form.

Want to dive deep into EDR? Here are some resources
The Definitive RFP Template for EDR Projects image
RFP Template

The Definitive RFP Template for EDR Projects

Download next arrow icon
The Dark Side of EDR image
eBook

The Dark Side of EDR

Download next arrow icon

How would you rate this article?

Let’s get started!

Ready to extend visibility, threat detection and response?

Get a Demo

Search results for: