Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.
Tag: cybersecurity
Navigating the National Cyber Incident Response Plan: A Summary
The National Cyber Incident Response Plan (NCIRP) is a crucial document outlining the U.S. government’s strategy for addressing cyber incidents. It serves as a blueprint for collaboration between federal agencies, private entities, and state, local, tribal, and territorial (SLTT) governments in the face of increasingly sophisticated cyber threats.
If you’d rather, here is a AI generated podcast summarizing the paper:
Key Objectives of the NCIRP
- Establish a coordinated national response to significant cyber incidents.
- Provide a framework for the roles and responsibilities of various stakeholders in incident detection and response.
- Outline the coordinating structures, key decision points, and priority activities throughout the cyber incident lifecycle.
- Promote a unified approach to incident response, ensuring efficient and effective action.
Four Lines of Effort
The NCIRP outlines four key Lines of Effort (LOEs) to manage cyber incidents:
- Asset Response: Led by the Cybersecurity and Infrastructure Security Agency (CISA), this LOE focuses on protecting assets, mitigating vulnerabilities, and minimizing incident impact.
- Threat Response: Spearheaded by the Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), this LOE involves investigating, attributing, and disrupting malicious cyber activity.
- Intelligence Support: Led by the Office of the Director of National Intelligence (ODNI) through the Cyber Threat Intelligence Integration Center (CTIIC), this LOE focuses on building situational awareness, analyzing threat trends, and identifying knowledge gaps.
- Affected Entity Response: This LOE involves managing the impact of a cyber incident, including maintaining operational continuity, protecting privacy, and complying with regulations. The lead agency varies depending on whether the affected entity is a federal agency or a private organization.
Cybersecurity Incident Response Phases
The NCIRP outlines two primary phases for incident response:
- Detection Phase: This phase involves continuous monitoring and analysis of cyber activity to identify potential incidents. Key decisions and activities in this phase include:
- Determining the severity of the incident based on its potential impact on national security, the economy, and public health and safety.
- Deciding if CISA should convene an incident-specific group of stakeholders through the Joint Cyber Defense Collaborative (JCDC) to coordinate asset response activities.
- Assessing the need for a Cyber Unified Coordination Group (Cyber UCG) to enhance interagency coordination.
- Response Phase: This phase focuses on containing, eradicating, and recovering from an incident. Key decisions and activities in this phase include:
- Identifying key private sector stakeholders to contribute to solution development and implementation.
- Establishing shared priorities for response efforts based on the scope and impact of the incident.
- Determining the appropriate timing and methods for implementing response activities.
- Evaluating resource needs and considering whether to utilize the Cyber Response and Recovery Fund (CRRF).
- Defining the criteria for concluding the incident response phase.
Coordinating Structures
The NCIRP leverages existing coordinating structures to enhance incident response, including:
- Cyber Response Group (CRG): Responsible for policy and strategy development and implementation regarding significant cyber incidents.
- Cyber UCG: The primary operational coordination mechanism for federal agencies during significant cyber incidents.
- Sector Risk Management Agencies (SRMAs): Provide sector-specific expertise and support to the Cyber UCG and affected entities within their respective sectors.
- Joint Cyber Defense Collaborative (JCDC): Fosters public-private partnerships to address cyber incidents through planning, information sharing, and development of mitigation guidance.
Preparedness and Implementation
The NCIRP emphasizes continuous preparedness and ongoing implementation efforts to ensure national readiness for cyber incidents. CISA plays a crucial role in these efforts, leading activities such as:
- Developing supplementary plans: CISA creates additional documents addressing specific issues and stakeholder communities to enhance national preparedness.
- Updating the NCIRP: CISA regularly updates the NCIRP to reflect changes in the cyber threat landscape, laws, and lessons learned from past incidents.
- Facilitating nationwide activities: CISA works with stakeholders to implement actions outlined in Annex B of the NCIRP, which focuses on preparing for cyber incidents.
The NCIRP is a living document, constantly evolving to address the ever-changing cyber threat landscape. It serves as a vital resource for all cybersecurity enthusiasts, providing insights into the nation’s strategic approach to managing cyber incidents.
TryHackMe | Advent of Cyber 2024 – Day 17
Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.
TryHackMe | Advent of Cyber 2024 – Day 16
Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.
Weekly Cybersecurity Wrap-up 12/9/24
Each week I publish interesting articles and ways to improve your understanding of cybersecurity.
Projects
- Linux Foundation – Introduction to Kubernetes (LF158) – In Progress
- TryHackMe – Splunk: Setting up a SOC Lab
- TryHackMe – Advent of Cyber – Playlist
Videos
Articles
- China’s Salt Typhoon recorded top American officials’ calls, says White House – Chinese cyberspies recorded “very senior” US political figures’ calls, according to White House security boss Anne Neuberger.
- Senior Dating data breach exposes more than 700,000 users – Information includes latitude and longitude coordinates
- “CP3O” pleads guilty to multi-million dollar cryptomining scheme – 45-year-old Charles O Parks III (who went by the moniker “CP30” online) pleaded guilty to wire fraud charges at a federal court in Brooklyn, New York, after defrauding two well-known providers of cloud computing services out of over US $3.5 million.
- U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls – The U.S. government on Tuesday unsealed charges against a Chinese national for allegedly breaking into thousands of Sophos firewall devices globally in 2020.
- FBI Busts Rydox Marketplace with 7,600 PII Sales, Cryptocurrency Worth $225K Seized – The U.S. Department of Justice (DoJ) on Thursday announced the shutdown of an illicit marketplace called Rydox (“rydox[.]ru” and “rydox[.]cc”) for selling stolen personal information, access devices, and other tools for conducting cybercrime and fraud.
- North Korea’s fake IT worker scam hauled in at least $88 million over six years – DoJ thinks it’s found the folks that ran it, and some of the ‘IT warriors’ sent out to fleece employers
- New IOCONTROL malware used in critical infrastructure attacks – Iranian threat actors are utilizing a new malware named IOCONTROL to compromise Internet of Things (IoT) devices and OT/SCADA systems used by critical infrastructure in Israel and the United States.
Podcasts
TryHackMe | Advent of Cyber 2024 – Day 15
Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.
TryHackMe | Advent of Cyber 2024 – Day 14
Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.
TryHackMe | Advent of Cyber 2024 – Day 13
Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.
TryHackMe | Advent of Cyber 2024 – Day 12
Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.
TryHackMe | Advent of Cyber 2024 – Day 11
Follow along as we crack open a new year of the Advent of Cyber from TryHackMe! This is always fun! Here is the playlist on youtube, but I’ll be posting them on this site as well.