NIST Releases Guide to Cyber Attacks 126
treerex writes "NIST (the US National Institute of Standards and Technology) has just released a 148 page report entitled Computer Security Incident Handling Guide (PDF). It covers the gamut, from setting up a response team to dealing with specific types of attacks: DoS, trojans, worms, malicious code, and unauthorized access. While written by a team from NIST and the contractor Booz-Allen Hamilton (BAH), they appear to have taken input from CERT and luminaries like Spafford. It is an interesting read."
Re:first post (Score:1, Interesting)
Like when Microsoft's Brazil site was hacked
Are these all the attacks? (Score:2, Interesting)
Are we so naive to believe that following such advice will make us secure?
Re:Are these all the attacks? (Score:1, Interesting)
If anything, everyone following the same practices and procedures when under attack will make us all less secure.
"OK, I just hit him with a SYN flood. Now he's going to do XXXX."
Re:Are these all the attacks? (Score:5, Insightful)
Speaking of Spafford.... (Score:4, Informative)
Description courtesy of Bruce Schneier's Crypto-gram [schneier.com]:
Re:Are these all the attacks? (Score:1)
Re:Are these all the attacks? (Score:1)
Re:Are these all the attacks? (Score:1)
Have you ever tried to educate Joe user into how to keep their machine secure? Sure you are okay to expect admins to put in the time to learn things but a large portion of Internet users have no technical clue and it would take alot of serious training to get each one of those users to learn. This isn't because they are unintelligent, they just haven't been brought up around technology and their minds don't know where to start
Re:Are these all the attacks? (Score:3, Interesting)
I don't think you could have read the article in the time it took to make your condemnation of its intentions.
I see only good things coming out of this. Especially in comparison to the SOP up until now. There is no accepted standardized stance but what is (probably) being proposed in this document. Publishing this is a positive step in that direction. It appears (based on a cursory glance through the contents) to be focused on i
Re:Are these all the attacks? (Score:5, Interesting)
another thing - the idea that uniform SOP means that things will be easier to hack is pure bullshit - what would anyone recommend to the unwashed vulnerable? Maybe it would sound like this:
- run only necessary services
- audit and change your passwords
- follow security news and patch accordingly
- use virus protection
- consider an IDS
etc.
sounds a hell of a lot like best practices / standard procedure to me. and NONE of that shit makes it "easier to hack." sheesh.
Re:Are these all the attacks? (Score:5, Funny)
Thank you for calling the US National Institute of Standards and Technology Security Hotline.
Please say "HOLA" now if you espanol...
Otherwise please select one of the following selections dealing with your security problem.
Press 1 if you have suffered a DOS attack
Press 2 if your network has been infected with a worm
Press 3 if your site is being slashdotted
Press 4 if 13 year olds have defaced your web site
Press 5 if you are running windows as your server
Press 666 if you are a missle silo control room and have realized that someone has gained root or administrative access on your control system
Have a nice day.
Re:Are these all the attacks? (Score:1)
What button do I press then!?
Re:Are these all the attacks? (Score:1)
Re:Are these all the attacks? (Score:2)
Re:Are these all the attacks? (Score:1, Insightful)
Many script kiddies and fresh rookie sysadmins only know about 'sploits and strangely named attacks and have no framework of 'security problem classes' to hang these ideas on. Encouraging a common vocabulary is a _good thing_ and generally goverment backed standards documents do the job.
Re:Are these all the attacks? (Score:4, Insightful)
I'm just going to leave it at that. Anything else is just going to be a derogatory rant. IHBT HAND
Interesting! (Score:5, Interesting)
1. Find out what happened
2. Close the breach
3. Report the breach.
If the sysadmin doesn't know how to do this, they also know where to seek help.
I'll probably get messages back saying this is just dumb and generic, but it's better than not knowing anything at all. A lot better. All too few people know how to handle situations like this, and they will need somewhere to start.
I'll give this thing a skim read (just read contents and some interesting paragraphs now) and get back to this
Re:Interesting! (Score:2, Interesting)
Re:Interesting! (Score:5, Informative)
Then again, looks like all the other threads below are mired in conversations about nukes, Amerika-bashing, and other offtopic stuff, so at least you're on topic.
Re:Interesting! (Score:3, Insightful)
"What are the basic things I should do in this particular situation?"
The idea is to write something that someone of an IQ of 100 can understand and implement without causing too many problems. Someone in another thread
Re:Interesting! (Score:2)
IJDE (Score:5, Informative)
Gleam Something From This (Score:5, Insightful)
BAH? (Score:4, Interesting)
Re:BAH? (Score:3, Insightful)
Re:BAH? (Score:2, Informative)
The people who took over his position didn't change the passwords. They have since been re-educated about security and best-practices. Nothing confidential was on the servers in question, but it looked bad for their web-team here in San Diego.
Re:BAH? (Score:2)
Just FYI.
NIST Research on I-Worms (Score:2)
-JT
Mirror (Score:1)
Mirror provided by Coded Networks [coded.net]
Sponsored by Dedicated Gamer [dedicatedgamer.com]
Corporate Incident Response Checklist (Score:5, Funny)
Guide for Sysadmins: Upon learning that your systems have been penetrated, proper incident response is as follows:
Does it say... (Score:5, Funny)
...what to do in case of a Slashdotting?
Re:Does it say... (Score:1)
Re:Does it say... (Simpsons sig) (Score:2, Informative)
I think Homer and Krusty look a like because originally, the Simpson's premise was about a boy who hated his father but was in awe with a clown who looked exactly like his father. Thus they look a like.
Looks like the Democrats could do with reading it (Score:3, Interesting)
Text Version (Score:4, Informative)
Computer Security Incident Handling Guide.zip (113K) [telus.net] (zipped text file)
A good idea (Score:5, Insightful)
If nothing else, it provides a good framework to start from, especially small companies/non-profits etc, where they don't have the resources to hire a full-time crack security team. This helps them set priorities and useful business things like that.
I'm really quite surprised people are being negative about it.
Re:A good idea (Score:3, Insightful)
After all, the government isn't just taking taxpayers money and spending it. They're taking our money and then giving it back to us (once we work for it).
Either they spend it on cool reports like this, or they spend it on something else and it goes to somebody else. Not only is it financially supporting the industry, it's also providing us with some useful information.
Why is it? (Score:4, Insightful)
I don't understand why people immediately dismiss a report coming from NIST as being worthless USG noise while many of the same "arguments" against this paper could be made against books like Incident Response: Investigating Computer Crime or Counter Attack or any of the other n+1 books on this topic that exist.
Harumph.
Re:Why is it? (Score:2)
Most of the slashdot readers are IT folks, and think they know everything. Those books exist to keep people out of hot water.
Unfortunately egos get in the way of learning sometimes.
Agreed. Security -- specifically -- is a maddengly complex issue. Anything that will get people to look and do the right thing is a good idea.
security?? (Score:1)
Standard response to standard attacks? Sounds like someone's played too much Mike Tyson's punchout. If he tries to do a stack overflow, I log it as a possible attack, then I give him a power punch and his pants fall down.
Seriously, though the vast majority of attacks are of a common variety. The av
7.2.2 INCIDENT PREVENTION (Score:1, Interesting)
Re:7.2.2 INCIDENT PREVENTION (Score:3, Insightful)
Egress filtering. Application-level firewalls. This is EXACTLY what they exist for.
application-level firewalls are pointless (Score:3, Insightful)
Sadly, they exist more to make a quick buck by giving ignorant admins a false sense of security.
Transports which tunnel through the HTTP application layer [ssimicro.com] (not just SSH on port 80) using fully obscured forms of encryption are prevalent and readily available to the non-technical PC user. Such applications are very popular in Saudi Arabia and China, for example, primarily because there are presently no proxies capable of
Re:application-level firewalls are pointless (Score:3, Insightful)
Tunnelling over HTTP is only useful if the remote system is capable of stripping HTTP headers then forwarding the data to the desired service, you couldn't connect direct to an ssh server like that. Setting this up is a bit beyond "the non-technical PC user", although its certainly not an impossible task. It would stop 99% of people right there.
HTTP application layer firewalls are not just used for blocking o
Re:application-level firewalls are pointless (Score:2)
They don't have to set up the HTTPort servers [htthost.com]. But if they wanted to, it's no more difficult than running an installer on their broadband-connected home PC.
The real problem is that when you don't block things like SSH, you can log when and where such connections are going. When you do, determined users migrate to something like HTTPort, and now you loose the ability to track such connections.
Re:7.2.2 INCIDENT PREVENTION (Score:1)
"Contact information for team memebers and others within and outside the orgazination
The crap only gets crapier.
Limit outbound encrypted traffic? Damn straight! (Score:5, Interesting)
Apparently, somebody who knows how smart slacker geeks get their porn, and wants to put a stop to it.
No really, blocking SSH/ESP and tracking HTTPS is a reasonable suggestion -- if anything, I'd say the above doesn't go far enough. The excerpted paragraph doesn't mention the more serious risks of SSH (port forwarding, tunneling, etc).
I'm not particularly worried about a smart internal user establishing an SSH session to the Internet and downloading "illegal materials",
I'm worried about the airhead secretary who brings in a floppy provided by her uberhacker boyfriend, and runs a rootkit, setting up an outbound SSH session providing him with a command prompt on her workstation...
That's just one risk of permitting outbound crypto channels...
Re:Limit outbound encrypted traffic? Damn straight (Score:3, Informative)
Reasonable? Pointless.
Applications which tunnel through the HTTP application layer [ssimicro.com] (not just SSH o port 80) using fully obscured forms encryption are prevalent and readily available to the non-technical PC user. Such applications are very popular in Saudi Arabia and China, for example. Primarily because there are, at this time, no proxies capable of blocking them.
And as
Re:Limit outbound encrypted traffic? Damn straight (Score:1)
The point is to reduce exposure in cases where it cannot be completely removed. This limits the focus of where you need to manually apply the use logs, IDS's, leaps of inspiration, etc.
Forcing everyone out the same few, comparatively unusual gates is far better than leaving them all open.
Re:Limit outbound encrypted traffic? Damn straight (Score:2)
The more you make people go through things that don't appear to be gates, the less you can keep track of what is coming and going.
If you have SSH ports open, at least you can log the traffic. If you force users to rely on an HTTP application layer tunnel like HTTPort, then you'll never know what they are doing or where they are doing it.
Re:Limit outbound encrypted traffic? Damn straight (Score:2)
Blocking SSH/ESP and tracking HTTPS is reasonable, in part because it catches the "low hanging fruit", users and automated attack tools not smart enough to try less alarm-triggering channels first.
Like restrictive
Re:Limit outbound encrypted traffic? Damn straight (Score:1, Insightful)
Re:7.2.2 INCIDENT PREVENTION (Score:2)
Reread what you just posted and think about what it is saying instead of just reacting to the suggestion that you should limit encrypted connections.
Encyrpted communication. (Score:3, Insightful)
Re:7.2.2 INCIDENT PREVENTION (Score:2)
I got laid off from a contract recently because of this. "You made an SSH connection to an outside machine" they said. Well, yeah, I checked my mail with Pine. I never signed anything saying that I couldn't do this, it merely because an arbitrary policy designed to get rid of anybody that might threaten the dominance of "management."
It was really lame.
Re:7.2.2 INCIDENT PREVENTION (Score:2)
Issues on accuracy (Score:2, Informative)
Typical Booz-Allen crud. We hated these guys when I worked in the gov. Our command once paid over 250k for a 2" high report that simply re-hashed the interviews they conducted
There's one HUGE thing missing here. (Score:3, Insightful)
If you put all these policies, processes, and procedures into place and don't have a Mock intrusion or emergency, you won't know how good or bad your incident response will be.
Dolemite
____________________
Re:There's one HUGE thing missing here. (Score:2, Informative)
Page ES-4:
See also appendix B, "Incident Handling Scenarios".
Re:There's one HUGE thing missing here. (Score:2)
Dolemite
________________
Better send this to the Democrats (Score:2, Funny)
It's simple but that's what you need. (Score:3, Informative)
Better than nothing (Score:2)
Re:Better than nothing (Score:2)
Did ppl forget about the NSA guides? (Score:2)
The ones that really interests me are the "Security Recommendation Guides" supposedly by that "Three Letter Agency" [nsa.gov]
Re:Why? (Score:3, Interesting)
No...It's FOR federal agencies (Score:4, Informative)
This if for federal agency use, and anyone elses.
This also effectively says "You WILL do it like this" to the federal agencies.
There will be a quiz.
Re:No...It's FOR federal agencies (Score:1)
First of all: the word is "shall", and second: no, it doesn't say that at all. It's a guide, and quite clear about it. Recent FISMA requirements are causing CSIRTs to spring up in many government agencies, and the guide was created to assist new CSIRTs in devising procedures and policies that are more or less consistent with best practices. Believe it or not, developing a security program can be a pretty complex task, not only
Re:No...It's FOR federal agencies (Score:1)
First of all: the word is "shall", and second: no, it doesn't say that at all. It's a guide, and quite clear about it. Recent FISMA requirements are causing CSIRTs to spring up in many government agencies, and the guide was created to assist new CSIRTs in devising procedures and policies that are more or less consistent with best practices. Believe it or not, developing a security program can be a pretty complex task, not only
Re:DoS, trojans, worms, malicious code.... (Score:3, Informative)
Ummm... They do. If you've ever worked anywhere involving classified information, you'd know that EXTREME measures and controls are normally in place in order to completely eliminate possible bleeding between classified and unclassified networks...
Re:DoS, trojans, worms, malicious code.... (Score:2)
So true. It's not just unplugging the network cables, this can in fact go to the extremes like having no windows in the rooms and having some level of protection against electromagnetic spying, such as entire rooms being faraday cages...