CSIRT Case Classification (Example for Enterprise CSIRT)
I. Scope
It is critical that the CSIRT provide consistent and timely response to the customer, and that sensitive information is handled appropriately. This document provides the guidelines needed for CSIRT Incident Managers (IM) to classify the case category, criticality level, and sensitivity level for each CSIRT case. This information will be entered into the Incident Tracking System (ITS) when a case is created. Consistent case classification is required for the CSIRT to provide accurate reporting to management on a regular basis. In addition, the classifications will provide CSIRT IMs with proper case handling procedures and will form the basis of SLAs between the CSIRT and other Company departments.
II. Incident Categories
All incidents managed by the CSIRT should be classified into one of the categories listed in the table below.
Incident Category | Sensitivity* | Description |
Denial of service | S3 |
|
Forensics | S1 |
|
Compromised Information | S1 |
|
Compromised Asset | S1, S2 |
|
Unlawful activity | S1 |
|
Internal Hacking | S1, S2, S3 |
|
External Hacking | S1, S2, S3 |
|
Malware | S3 |
|
S3 |
| |
Consulting | S1, S2, S3 |
|
Policy Violations | S1, S2, S3 |
|
* - Sensitivity will vary depending on circumstances. Guidelines are provided. |
III. Criticality Classification
The criticality matrix defines the minimal customer response time and ongoing communication requirements for a case. The criticality level should be entered into the ITS when a case is created, and it should not be altered at any point during the case lifecycle except when it was incorrectly classified in the first place. Typically the IM will determine the criticality level. In some cases it will be appropriate for the IM to work with the customer to determine the criticality level.
Criticality Classification | ||||||||||||||||||
Criticality Level | Criticality Level Definition | Typical Incident Categories | Initial Response Time | Ongoing Response (Critical Phase) | Ongoing Response (Resolution Phase) | Ongoing Communication Requirement | ||||||||||||
1 | Incident affecting critical systems or information with potential to be revenue or customer impacting. | - Denial of service - Compromised Asset (critical) - Internal Hacking (active) - External Hacking (active) - Virus / Worm (outbreak) - Destruction of property (critical) | 60 Minutes | CSIRT Incident Manager assigned to work case on 24x7 basis. | CSIRT Incident Manager assigned to work on case during normal business hours. | Case update sent to appropriate parties on a daily basis during critical phase. If CSIRT involvement is necessary to restore critical systems to service then case update will be sent a minimum of every 2 hours.
Case update sent to appropriate parties on a weekly basis during resolution phase. | ||||||||||||
2 | Incident affecting non-critical systems or information, not revenue or customer impacting. Employee investigations that are time sensitive should typically be classified at this level. | - Internal Hacking (not active) - External Hacking (not active) - Unauthorized access. - Policy violations - Unlawful activity. - Compromised information. - Compromised asset. (non-critical) - Destruction of property (non-critical) | 4 Hours | CSIRT Incident Manager assigned to work case on 24x7 basis. | CSIRT Incident Manager assigned to work on case during normal business hours. | Case update sent to appropriate parties on a daily basis during critical phase.
Case update sent to appropriate parties on a weekly basis during resolution phase. | ||||||||||||
3 | Possible incident, non-critical systems. Incident or employee investigations that are not time sensitive. Long-term investigations involving extensive research and/or detailed forensic work. | - Forensics Request - Inappropriate use of property. - Policy violations. | 48 Hours | Case is worked as CSIRT time/resources are available. | Case is worked as CSIRT time/resources are available. | Case update sent to appropriate parties on a weekly basis. | ||||||||||||
Definitions:
|
IV. Sensitivity Classification
CSIRT IMs should always apply the need to know principle when communicating case details with other parties. The sensitivity matrix below helps to define need to know by classifying cases according to sensitivity level. The Required column defines the parties that need to know for a given sensitivity level. The Optional column defines the other parties that may be included on communications, if necessary. Typically the IM will determine the sensitivity level. In some cases it will be appropriate for the IM to work with the customer to determine the sensitivity level.
Sensitivity Classification | |||||
Sensitivity Level | Sensitivity Level Definition | Typical Incident Categories | Required On Case Communications ** | Optional On Case Communications ** | ITS Access *** |
1 | Extremely Sensitive. | - Global Investigations Initiated. - Forensics Request - Destruction of property. - Compromised asset. - Compromised information. - Unlawful activity. - Inappropriate use of property. - Policy violations | CSIRT, CPOC | CSIRTM | CSIRT, CSIRTM |
2 | Sensitive. | - External Hacking - Internal Hacking - Unauthorized Access | CSIRT, CPOC | Security Operations, OWNERS | Security Operations |
3 | Not Sensitive. | - Denial of service. - Virus / Worm | CSIRT, CPOC | ANY | ALL Agents in ITS |
Definitions:
Notes: ** Case Communications include the following: Initial email from CSIRT to customer, periodic case reports to customer, and final case report to customer. It is not necessary to include these parties on all interim communications that occur throughout the life of a case, just the case updates and summary. | |||||
|
Author: Dustin Schieber dschiebe@cisco.com Gavin Reid gavreid@cisco.com