What follows is my attempt to apply a framework to the problem. If anyone wants to point me to existing work, please feel free. This is not an attempt to put a flag in the ground. We're trying to figure out how to talk about post-compromise activities in a world where scoring vulnerabilities receives far more attention.
This is a list of factors which influence the severity of an incident. It is written mainly from the intrusion standpoint. In other words, an unauthorized party is somehow interacting with your asset. I have ordered the options under each category such that the top items in each sub-list is considered worst, and the bottom is best. Since this is a work in progress I put question marks in many of the sub-lists.
- Level of Control
- Domain or network-wide SYSTEM/Administrator/root
- Local SYSTEM/Administrator/root
- Privileged user (but not SYSTEM/Administrator/root
- User
- None?
- Level of Interaction
- Shell
- API
- Application commands
- None?
- Nature of Contact
- Persistent and continuous
- On-demand
- Re-exploitation required
- Misconfiguration required
- None?
- Reach of Victim
- Entire enterprise
- Specific zones
- Local segment only
- Host only
- Nature of Victim Data
- Exceptionally grave damage if destroyed/altered/disclosed
- Grave damage if destroyed/altered/disclosed
- Some damage if destroyed/altered/disclosed
- No damage if destroyed/altered/disclosed
- Degree of Friendly External Control of Victim
- None; host has free Internet access inbound and outbound
- Some external control of access
- Comprehensive external control of access
- Host Vulnerability (for purposes of future re-exploitation
- Numerous severe vulnerabilities
- Moderate vulnerability
- Little to no vulnerability
- Friendly Visibility of Victim
- No monitoring of network traffic or host logs
- Only network or host logging (not both)
- Comprehensive network and host visibility
- Threat Assessment
- Highly skilled and motivated, or structured threat
- Moderately skilled and motivated, or semi-structured threat
- Low skilled and motivated, or unstructured threat
- Business Impact (from continuity of operations plan)
- High
- Medium
- Low
- Onsite Support
- None
- First level technical support present
- Skilled operator onsite
Based on this framework, I would be most worried about the following -- stated very bluntly so you see all eleven categories: I worry about an incident where the intruder has SYSTEM control, with a shell, that is persistent, on a host that can reach the entire enterprise, on a host with very valuable data, with unfettered Internet access, on a host with lots of serious holes, and I can't see the host's logs or traffic, and the intruder is a foreign intel service, and the host is a high biz impact system, and no one is on site to help me.
What do you think?
Tidak ada komentar:
Posting Komentar