SHARE
Facebook X Pinterest WhatsApp

Five Considerations for Building an Effective Incident Response Framework

Although news headlines are consistently reporting that cyber threats are evolving into more targeted, sophisticated attacks, it may come as a surprise to some organizations that 75 percent of the security breaches that occur are opportunistic. According to a recent Verizon data breach report, these attacks are not targeted at any specific individual or organization. […]

Written By
thumbnail
ITBE Staff
ITBE Staff
Mar 12, 2014

Although news headlines are consistently reporting that cyber threats are evolving into more targeted, sophisticated attacks, it may come as a surprise to some organizations that 75 percent of the security breaches that occur are opportunistic. According to a recent Verizon data breach report, these attacks are not targeted at any specific individual or organization.

For organizations that fall victim to a security breach, there tends to be a large focus on reducing the breach buzz to repair earned reputation and rebuild customer trust. For IT teams within the company, this means the noise and buzz must be reduced by cutting down on the time and resources it takes to repair the network.

Building an effective incident response program is essential for organizations because it enables them to not only contain a single incident, but it also helps to start modeling the techniques of an attack. Incident response stems from an approach that detects and enumerates the steps taken by an attacker to compromise a system. This information is used by the incident response team, which drives future incident response activities.

In this slideshow, AlienVault, provider of Unified Security Management™ solutions and crowd-sourced threat intelligence, offers five considerations for building an effective framework for incident response in order to remediate the threat.

Five Considerations for Building an Effective Incident Response Framework - slide 1

Click through for five considerations for building an effective framework for incident response, as identified by AlienVault.

Five Considerations for Building an Effective Incident Response Framework - slide 2

Prevent, detect, investigate and respond

A traditional incident response cycle has four steps to remove the attackers’ advantage: prevent, detect, investigate and respond. Having a framework in place ahead of an incident will help streamline this cycle. This will allow companies to spend less time learning about the threat and more time overcoming it.

Five Considerations for Building an Effective Incident Response Framework - slide 3

Eliminate the noise

Organizations need to determine where the rogue hosts are located. A rogue host can be one that is not compliant with standard controls, not authorized to connect to the network, infected with low-impact malware or network worms, one with unauthorized or inappropriate software, or a host where antivirus has detected a known bad actor but could not remove it.

Five Considerations for Building an Effective Incident Response Framework - slide 4

Modify security controls

In the event of a broken policy, organizations may receive an alert that requires the security controls to be modified. Additionally, firewall rule sets may need to be tightened or AV and IDS signatures may require an update. In any case, security monitoring should be used to align policy intention with policy enforcement.

Five Considerations for Building an Effective Incident Response Framework - slide 5

Reconfigure

In the event of a network outage, organizations need to understand that some alerts get fired due to misconfigurations or honest mistakes as opposed to intentional abuse. Additionally, the noisy traffic that you are viewing from your Web server might have more to do with the latest change by your system administrator rather than from something nefarious.

Five Considerations for Building an Effective Incident Response Framework - slide 6

Respond rapidly to incident

If a breach occurs, you should know that not every incident will result in a threat, but for those that do, it is crucial to rapidly determine the who, what, where, why and how behind the threat. Dynamic threat intelligence, as well as specific guidance on how to mitigate each threat, is required for an organization’s incident response program to be successful.

Recommended for you...

How DeFi is Reshaping the Future of Finance
Kihara Kimachia
Aug 25, 2022
Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.