General Guidelines

Created: 28.07.2022

The fundamental notion of containment resides in reducing damage to the minimum. It is highly probable that, in an ongoing incident, complete avoidance of damage is unfeasible. However, at this stage, an opportunity exists to prevent severe damage. The primary aim is to diminish the abilities of the attacker.

If the attacker is particularly sophisticated, a hasty containment strategy, such as abruptly unplugging the computer, may inadvertently trigger an unintended consequence. Certain APT groups may realise they have been uncovered and lay low until they feel secure. In such scenarios, it would be prudent to have a kill switch readily accessible to activate at the onset of data exfiltration. In the meantime, it would be wise to segment the network, isolating it from other machines and vigilantly monitoring for any malicious activity.

Normal remediation events:

  1. Deny access to the environment.
  2. Don’t let the attacker respond to the remediation process.
  3. Remove the adversary.
  4. Degrade his ability to return.

Critical remediation steps:

  1. Disconnect the environment from the Internet.
  2. Implement strict network segmentation.
  3. Block IP and domains for C2 channels.
  4. Remove all infected and compromised nodes.
  5. Restrict access to compromised accounts.
  6. Restrict access to domain admin accounts.
  7. Validate.

References

Expand… Something here