Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
6 views61 pages

Cert Introduction

The document provides an overview of Computer Emergency Response Teams (CERT), detailing their definitions, types, history, and organizational models. It discusses the services CERTs offer, their funding strategies, and the importance of policies and procedures in their operations. Additionally, it outlines the staffing needs and roles within CERTs, emphasizing the collaborative nature of incident response across different organizations and regions.

Uploaded by

Carlos Alvarez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views61 pages

Cert Introduction

The document provides an overview of Computer Emergency Response Teams (CERT), detailing their definitions, types, history, and organizational models. It discusses the services CERTs offer, their funding strategies, and the importance of policies and procedures in their operations. Additionally, it outlines the staffing needs and roles within CERTs, emphasizing the collaborative nature of incident response across different organizations and regions.

Uploaded by

Carlos Alvarez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 61

COMPUTER EMERGENCY RESPONSE TEAM

(CERT)
INTRODUCTION
AfNOG
9th June 2013 – 14th June 2013
Lusaka, Zambia

By
Marcus K. G. Adomey
OUTLINE
Definition of CERT
Acronyms of CERT
Types of CERT
History of CERT
CERT in the World
CERT Services
CERT Framework
CERT Organizational Model
CERT Staff
CERT Creation
DEFINITION OF CERT

It is an organization or team that provides, to a defined


constituency, services and support for both preventing
and responding to computer security incidents
ACRONYMS OF CERT
Various acronyms and titles have been given to CERT organizations over the years.
These titles include
CSIRT - Computer Security Incident Response Team
CSIRC - Computer Security Incident Response Capability or Center
CIRC - Computer Incident Response Capability or Center
CIRT - Computer Incident Response Team
IHT - Incident Handling Team
IRC - Incident Response Center or Incident Response Capability
IRT - Incident Response Team
SERT - Security Emergency Response Team
SIRT - Security Incident Response Team
HISTORY OF CERT

Morris is accompanied by his mother, Anne, left, and his father, Robert Sr., at
right rear, after a day of jury selection in his trial on charges of infiltrating a
nationwide computer network in Nov. 1988
CERT HISTORY

 Robert Tappan Morris then student


at Cornell University launched on
November 2, 1988 from MIT the first
and fast self-replicating computer
worms via the Internet
 Crippled almost 10% (6000) of the
computer connected to the Internet
in Nov 1988.
CERTs IN THE WORLD
CERTs IN THE WORLD
In Africa
Africa CERT

In Africa, few countries have started their security project and


fulfilled some good steps; other countries have now started
implementing national mechanisms for combating cybercrime
and other related threats; however, a sizeable number of
African countries still do not have a strategic plan and are
unable to start their first actions.

Africa CERT: The African response to capacity development on


cyber security in Kigali, 30th of May 2010
What about your country???
CERT SERVICES
TYPES OF CERT
There could be some of the following CERT:
 GovCERT
 Military CERT
 Police CERT
 Finance CERT
 Health CERT
 Academic CERT
 ISP CERT
 Bank CERT
 Industry CERT

 ----
CERT FRAMEWORK
 Constituency
 Mission
 Funding and Cost
 CERT Authority
 CERT Organizational Placement
 Policy and procedures
 Models and Legal Basis of Cooperation
CERT FRAMEWORK
Constituency
The constituency is the organization (or group of organizations) and/or people
whose incidents CERT handles (or co-ordinates)
There are several different ways for defining constituency. It can be defined by:
 range of IP addresses
 AS (autonomous system) number(s)
 domain name(s)
 free text description

 ------
CERT FRAMEWORK
CERT Mission

 A mission statement is a statement that defines the essence or purpose of a

company or organization. It answers the question, "Why do we exist?“

 Consist of at least three or four sentences used by an organization to explain, in

simple and concise terms, their purposes for being.


CERT FRAMEWORK
CERT Mission statement should

 be non-ambiguous

 be imperative to enable the CERT to establish a service and quality


framework, including the nature and range of services provided, the
definition of its policies and procedures, and the quality of service.

If the team is housed within a large organization or is funded from an


external body, the CERT mission statement must complement the mission
of those organizations
CERT FRAMEWORK
Example of Mission Statement

SingCERT’s Mission Statement:


“One Point of Trusted Contact
Facilitate Security Threats Resolution
Increase National Competency in IT Security”

Fictitious CERT mission statement:


“Fictitious CERT provides information and assistance to the staff of its
hosting company to reduce the risks of computer security incidents as
well as responding to such incidents when they occur.”
CERT FRAMEWORK
Costs and Funding
CERTs are most often funded by a parent organization, whether it is a university,
commercial organization, military organization, or government entity.

Question
“How much does it cost to start and operate a CERT?”

There is no one figure that can be given for what a CERT will cost to
set up and operate.

The costs for setting up a team depend on the circumstances and environment in
which the team is established.
CERT FRAMEWORK
Type of Costs
Start-Up Costs Sustainment Costs
o Software o ongoing facilities maintenance
o Computing equipment o support of equipment upgrades
o Capital furniture expenditures supplies o supplies
o Internet domain registration fees o travel
o Facilities costs Personnel Costs
o Phones o raises
o Fax machines o professional development
Personnel Costs o training
o salaries
o benefits
CERT FRAMEWORK
CERT Funding Strategies
STRATEGY DESCRIPTION
Membership subscriptions Time-based subscription fees for delivery of a range of
services
Contract services or fee- Payment for services as delivered
based services
Government sponsorship A government department funds the CERT

Academic or research A university or research network funds the CERT


sponsorship
Parent organization funding A parent organization establishes and funds the CERT
Consortium sponsorship Group of organizations, government entities, universities,
etc. pool funding
A combination of the above For example, funding is provided through government
funding and private contract
CERT FRAMEWORK
CERT Authority
There are three levels of authority or relationships that a CERT can have with its
constituency
 Full authority: The CERT can make decisions, without management approval,
to direct response and recovery actions.
 Shared authority: The CERT participates in the decision process regarding
what actions to take during a computer security incident, but can only
influence, not make the decision.
 No authority: The CERT cannot make any decisions or take any actions on its
own. The CERT can only act as an advisor to an organization, providing
suggestions, mitigation strategies, or recommendations.
CERT FRAMEWORK
CERT Organizational Placement

 The place that a CERT holds in its parent organization is tightly coupled to its
stated mission, its constituency and to its Organizational model.

 There is no clear standard or consistent placement or location of a CERT


within the organizational reporting structure of a host or parent organization.
CERT FRAMEWORK
Policies and Procedures
All services and CERT functions should be supported by well-defined
policies and procedures.
A documented set of policies and procedures is vital to
 ensure that team activities support the CSIRT mission
 set expectations for confidentiality
 provide the framework for day-to-day operational needs
 maintain consistency and reliability of service
CERT FRAMEWORK
Example Policies
 security policy
 open reporting environment policy
 incident reporting policy
 incident handling policy
 external communications policy
 media relations policy
 information disclosure policy
 information distribution policy
 human error policy
 training and education policy
 CSIRT acceptable use policy
CERT FRAMEWORK
Example Procedures
 standard operating procedures (SOPs)
 accepting and tracking incident reports
 answering the hotline
 incident and vulnerability handling
 gathering, securing, and preserving evidence
 configuration of CSIRT networks and systems
 system and network monitoring and intrusion detection
 backing up and storing incident data
 notification processes (how information is packaged, distributed,
archived, etc.)
 training and mentoring
CERT FRAMEWORK
Relationship to Other Teams

 The realm of CERTs is the Internet, and therefore the world

 There are many constituencies and CERT around the world

 At some level these CERTs have to inter-operate in order to get their job done.

 This cooperation and coordination effort is at the very heart of the CERT

framework
CERT FRAMEWORK
Models of cooperation
Bilateral team-team cooperation
 This is a model of a bilateral cooperation between two teams only.
 It is based on the trust between particular teams and their members, usually
built over years, for example through joined participation in security projects.
 This kind of cooperation is often stimulated by common goals for future
development and similar team missions.
CERT FRAMEWORK
Models of cooperation
Association
CERT FRAMEWORK
Models of cooperation
Association
 The association is a model of cooperation between many teams which have
common interests and goals.
 The framework for this kind of cooperation might be set by a common
geographical area (like in the national cooperation activities), common sets of
services, similar constituencies, sector of operations etc.
 The association model comes with different names: forum, taskforce, group,
coalition, alliance etc.
CERT FRAMEWORK
Models of cooperation
Cooperation between associations
CERT FRAMEWORK
Models of cooperation
Cooperation between associations

 This model depicts cooperation among two or more associations.


 It is usually based on the common goals of both organisations and
shared benefits.
 This kind of cooperation is very often realised by exchanging
experiences (for example delegates on the organisation’s meetings)
and formulation of common goals and rules of cooperation (for
example Memorandum of Understanding)
CERT FRAMEWORK
Legal basis for cooperation
Non-disclosure agreement
 A non-disclosure agreement (NDA), sometimes also called a confidential
disclosure agreement (CDA), confidentiality agreement or secrecy agreement, is
a legal contract between at least two parties which outlines confidential
materials or knowledge the parties wish to share with one another for certain
purposes, but wish to restrict from generalized use.
 In other words, it is a contract through which the parties agree not to disclose
information covered by the agreement.
 An NDA creates a confidential relationship between the parties to protect any
type of trade secret.
 As such, an NDA can protect non-public business information.
CERT FRAMEWORK
Legal basis for cooperation
Memorandum of Understanding
A Memorandum of Understanding (MOU) is a legal document describing a
bilateral agreement between parties. It expresses a convergence of will between
the parties, indicating an intended common line of action, rather than a legal
commitment. It is a more formal alternative to a gentlemen's agreement, but
generally lacks the binding power of a contract.
CERT FRAMEWORK
Legal basis for cooperation
Contract
A contract is a "promise" or an "agreement" made of a set of promises. Breach
of this contract is recognized by the law and legal remedies can be provided. In
civil law, contracts are considered to be part of the general law of obligations.
The law generally sees performance of a contract as a duty
CERT FRAMEWORK
Legal basis for cooperation
Terms of Reference
Creating a detailed Terms of Reference is critical to the success of an association, as it
defines its purpose of existence:
 Vision, objectives, scope and deliverables (i.e. what has to be achieved)
 Stakeholders, roles and responsibilities (i.e. who will take part in it)
 Resource, financial and quality plans (i.e. how it will be achieved)
 Work breakdown structure and schedule (i.e. when it will be achieved)
CERT ORGANIZATIONAL MODEL
Organizational Models for CERT

 Security Team

 Internal Distributed CERT

 Internal Centralized CERT

 Combined Distributed & Centralized CERT

 Coordinating CERT
CERT ORGANIZATIONAL MODEL
Security Team
CERT ORGANIZATIONAL MODEL
Security Team
In this model

 CSIRT has not been established

 No group or section of the organization has been given the formal


responsibility for all incident handling activities

 Incident response efforts are not necessarily coordinated or standardized


across the organization

 Network or security administrators at the local or division level handle


security events on an ad hoc and sometimes isolated basis as part of their
overall responsibilities or job assignments
CERT ORGANIZATIONAL MODEL
Internal Distributed CSIRT
CERT ORGANIZATIONAL MODEL
Internal Distributed CSIRT
In this model
 The organization utilizes existing staff to provide a “virtual” distributed CSIRT,
which is formally chartered to deal with incident response activities
 The distributed team members can perform CSIRT duties in addition to their
regular responsibilities or could be assigned to CSIRT work on a full-time basis
 Across the organization, individuals are identified as the appropriate points of
contact for working as part of the distributed team based on their or based on
their geographic location or functional responsibilities.
 There is a manager who oversees and coordinates activities for the distributed
team.
 The CSIRT serves as the single point of contact into the organization in relation
to incident or vulnerability reports or activity for both internal and external
parties.
CERT ORGANIZATIONAL MODEL
Internal Centralized CSIRT
CERT ORGANIZATIONAL MODEL
Internal Centralized CSIRT
 This model is a fully staffed, dedicated CSIRT that provides the incident
handling services for an organization.
 In many cases team members spend 100% of their time working for the CSIRT;
 There is a CSIRT manager who reports to high-level management such as a
chief information officer (CIO), chief security officer (CSO), or even chief risk
officer (CRO) or some other equivalent manager.
 The team is centrally located in the organization and is responsible for all
incident handling activities across the constituency or enterprise.
 The CSIRT serves as the single point of contact into the organization in relation
to incident or vulnerability reports or activity for both internal and external
parties.
CERT ORGANIZATIONAL MODEL
Internal Combined Distributed and Centralized CSIRT
CERT ORGANIZATIONAL MODEL
Internal Combined Distributed and Centralized CSIRT
 This model represents a combination of the distributed CSIRT and the
centralized CSIRT.

 It maximizes the utilization of existing staff in strategic locations throughout


the organization with the centrally located coordinating capabilities of the
dedicated team to provide a broader understanding of the security threats and
activity affecting the constituency within the enterprise.

 The CSIRT serves as the single point of contact into the organization in relation
to incident or vulnerability reports or activity for both internal and external
parties.
CERT ORGANIZATIONAL MODEL
Coordinating CERT
CERT ORGANIZATIONAL MODEL
Coordinating CERT
Coordinating CERTs usually have a broader scope and a more diverse constituency.
There are two types:
 Non-authoritative
 Authoritative
Authoritative
Coordinate incident and vulnerability handling activities across organization or
governing boundary
Non-authoritative
Facilitate incident and vulnerability handling activities for external
constituency
CERT ORGANIZATIONAL MODEL
Examples of Coordinating CERT
Non-authoritative
 FIRST (www.first.org)
 CERT Coordination Center (www.cert.org)
 US CERT (www.us-cert.gov)
 Japan CERT Coordination Center (www.jpcert.or.jp)
Authoritative
 Siemens-CERT (Munich, Germany)
 US NAVCIRT (www.ncdoc.navy.mil)
 NYS CSCIC IRT (www.cscic.ny.us)
 Korea National CERT (www.ncsc.go.kr)
CERT STAFFING
 CERT with capable incident handling needs people with a certain set of personal
skills and technical expertise
 The composition of CSIRT staff varies from team to team and depends on a
number of factors, such as
 Mission and goals of the CSIRT
 Nature and range of services offered
 Available staff expertise
 Constituency size and technology base
 Anticipated incident load
 Severity or complexity of incident reports
 Funding
CERT STAFFING
What type of staff will you need?
How will you staff your CSIRT?
Options
 Hire dedicated CSIRT staff.
 Use existing staff.
 full-time - part-time
 rotation - ad hoc
 Hire contractors.
 Outsource.
CERT STAFFING
Types of CSIRT Roles
Core Staff Extended Staff
 manager or team lead  support staff
 assistant managers, supervisors, or  technical writers
group leaders  network or system administrators for
 hotline, help desk, or triage staff CSIRT infrastructure
 incident handlers  programmers or developers (to build
 vulnerability handlers CSIRT tools)
 artifact analysis staff  web developers and maintainers
 forensic analysts  media relations
 platform specialists  legal or paralegal staff or liaison
 Trainers  law enforcement staff or liaison
 technology watch  auditors or quality assurance staff
 marketing staff
CERT STAFFING
Staff Skills
Personality
 people skills
 communication skills
Technical Skills
 system and network administration experience
 platform expertise: UNIX/Linux, Windows, Mac
 basic understanding of Internet protocols
 programming experience
Security Training
 incident handling experience
 problem solving abilities
 basic understanding of common computer attacks and vulnerabilities
Be aware of
 any requirements you might have regarding obtaining security clearances
 the need for service level agreements and data protection agreements
with contractors and managed service providers
CERT: to do list
1. Identify Stakeholders and participants
2. Obtain management support and sponsorship
3. Develop a CERT project plan
4. Gather Information
5. Identify the CERT Constituency
6. Defined the CERT mission
7. Secure funding for CERT operations
8. Decide on the range and level of services the CERT will offer
9. Determine the CERT reporting structure, authority and
organizational model
CERT: to do list
10. Identify required resources such as staff equipment and
infrastructure
11. Define interaction and interfaces
12. Define roles responsibilities and the corresponding authority
13. Document the workflow
14. Develop policies and corresponding procedures
15. Create and implementation plan and solicit feedback
16. Announce the CERT when it becomes operational
17. Define methods for evaluating the performance of the CERT
18. Have a backup plan for every element of the CERT
19. BE FLEXIBLE
STEPS FOR CREATING A CSIRT

Steps for Creating a CSIRT


 Stage 1 – Educate stakeholders about the
development of CERT
 Stage 2 – Plan the CERT
 Stage 3 – Implement the CERT
 Stage 4 – Operate the CERT
 Stage 5 – Collaboration
STEPS FOR CREATING A CSIRT

Timeline
Depending on the resources that are provided and “buy-in”
from its key stakeholders and constituency, a CSIRT can take
anywhere from 18-24 months to become fully operational (see
the projected timeline below). This timeline can be extended or
compressed, depending on a number of factors and decision
points that are made. These are indicated at the bottom of the
picture.
QUESTIONS
58
59

You might also like