CERT Coordination Center
HomeSite IndexSearchContactFrequently Asked Questions
Incidents, Quick fixes, and VulnerabilitiesSecurity Practices and EvaluationsSurvivability Research and AnalysisTraining and Education
 

Establish a policy and procedures that prepare your organization to detect signs of intrusion.

A security policy defines the rules that regulate how your organization manages and protects its information and computing resources to achieve security objectives. One of the policy’s primary purposes in detecting signs of intrusion is to document important information assets1 and the threats2 to those assets that your organization chooses to address3.

Preparation procedures include the actions necessary to observe systems and networks for signs of unexpected behavior, including intrusion. Observation can take the form of monitoring, inspecting, and auditing4. From these procedures, all concerned parties are able to determine the operational steps they need to take to comply with your policy. These steps will thereby uphold the security of your organization’s information and networked systems.

Security policies and procedures that are documented, well known, and visibly enforced establish expected user behavior and serve to inform users of their obligations for protecting computing assets. Users include all those who access, administer, and manage your systems and have authorized accounts on your systems. They play a vital role in detecting signs of intrusion.

This practice describes the topics your policy and procedures should address. They need to be tailored to reflect the specific business objectives and security requirements of your organization and its computing environment.


 

Why this is important

Having policy language and procedures in place that prepare you to detect signs of intrusion lets you use your procedures in a timely, managed, and controlled way and eliminates potential errors or omissions in advance of an attack. You do not want to be caught trying to determine what actions to take, what data to gather and preserve, and how to protect your systems from further damage while under attack or after the fact. With advance planning, documentation, and education, trained staff members are able to more effectively coordinate their activities when detecting suspicious activity, an intrusion, or an intrusion attempt. Without the proper knowledge and skills, users may inadvertently expose parts of the organization to security threats


 

How to do it

Include language in your organization’s networked systems security policy that prepares you to detect signs of intrusion.

Document the important and critical information assets and the level of protection (confidentiality, availability, integrity) required for each. Designations for the level may range from “cannot be compromised under any circumstances” (maximum protection) to “contains no sensitive information and can be easily restored” (minimal protection).

Document the types of threats or events that indicate possible signs of intrusion and also document how you intend to respond to them if they are detected. Types of threats may include5

Recognize that there are threats that are difficult to protect against if your systems are connected to the Internet. You need to determine what actions you will take if these occur. Threats of this type include

Document the requirement to establish and maintain secure, reliable configuration information for all assets that represent your known, expected state. This includes taking inventory and tagging all physical computing resources. Periodically compare this information with your current state to determine if anything has been altered in an unexpected way.

Document the roles, responsibilities, and authority of system administrators, security personnel, and users regarding the use and administration of all assets when they participate in detecting signs of suspicious behavior, including intrusions.

Document the roles, responsibilities, authority, and conditions for the testing of intrusion detection tools, the execution of intrusion detection procedures, and the examination of assets suspected of having been compromised. We strongly recommend that your policy requires that all such activity be conducted in a test environment isolated from production systems and networks.

Document procedures and take actions that implement your intrusion detection policy.

In general terms, document what data you plan to collect6, why you want to collect it, and where and when you will collect it.

Document any special handling procedures for each type of collected data. This is particularly important for data that may be used as evidence in subsequent legal proceedings9.

Document how you plan to conduct your review of all collected data. Because there is a large volume of system and network data that can be collected, and because there are increasing demands on an administrator’s time, you need to carefully determine

In particular

Document the procedure for the acquisition and secure installation, configuration, and maintenance of all tools11 necessary to implement your monitoring, inspection, auditing, and integrity checking procedures.

For each procedure and procedure step, document the roles, responsibilities, and authority of system administrators, security personnel, and users. Identify who performs each procedure activity, when, and under what conditions.

Conduct a legal review of your policy and procedures.

This should be performed by your organization’s legal counsel. It is intended to ensure that your policy and procedures

Train the users who have authorized accounts on your systems.

During the training process, users should learn

Create and conduct periodic training on your intrusion preparation and detection policy and procedures. This training should be mandatory for all new employees and should cover aspects that are relevant to the employee’s knowledge and responsibilities.

Test the effectiveness of the training and each employee’s readiness. Conduct practice drills (e.g., detecting break-ins and viruses) that test procedures and execute operational activities, making sure all staff members are aware of their roles and responsibilities. Conduct post-mortem meetings with trainees. Provide remedial training as required.

Regularly conduct mandatory security awareness refresher training. Highlight recent changes to policy or procedures and summarize recent attack methods and counter measures. Make this subject a recurring topic at executive and management level staff meetings to maintain awareness.

To keep pace with the rapid rate of technological change, ensure that system and network administration staff have time set aside to maintain their knowledge, skills, and currency in technical topics required to implement your policy and procedures.

Keep your intrusion detection policy and all related procedures and training current.

Periodically review your policy, procedures, and training. Take into account

If your organization suffers an intrusion, review your policy, procedures, and training to determine if revisions are necessary to ensure that future intrusion attempts of the same type can be more readily detected and controlled, if not prevented.14


 

Other Information

The most common sources of current information about security problems are the web sites of vendors, computer security organizations, and network security organizations. For example, you can find many advisories, incident notes, vulnerability notes, and tech tips at the CERT/CC web site. Refer to the implementation Maintaining currency by periodically reviewing public and vendor information sources.

There are also mailing lists (such as those maintained by the SANS Institute with subscriptions available at http://www.sans.org/), some of which are sponsored by vendors, and USENET news groups. Because lists and web sites appear, disappear, change frequently, or cease to be updated regularly, you need to ensure that the sources you consult are up-to-date.


 

Implementation Details

Maintaining currency by periodically reviewing public and vendor information sources


 

Footnotes

  1. Assets generally include information, hardware, software, and people. Asset values are determined based on the impact to the organization if the asset is lost. Critical assets are those that are essential to meeting an organization's mission and business objectives. [Alberts 00] For this module, assets include information, hardware, and software that reside on and comprise the information technology infrastructure of an organization.

  2. Threat is defined here as anything that may compromise an asset. This could be a person, such as an employee or a hacker, or it could be a competitor or anyone else with deliberate intention to compromise an asset. Threats also include anything which results in accidental disruption to an asset (such as a natural disaster), the means of access to do so, or any outcome or consequence that results in an unwanted effect such as disclosure, modification, destruction, loss, or interruption. [Alberts 00]

  3. Systematic methods of information security risk analysis and assessment are emerging. These methods help an organization identify important assets, threats against these assets, security requirements for these assets, and weaknesses or vulnerabilities in current practice that increase the likelihood of these assets being compromised. Refer to Operationally Critical Threat, Assets, and Vulnerability EvaluationSM(OCTAVESM) Framework, Version 1.0 [Alberts 99], Secure Computing [Summers 97], Network Intrusion Detection: An Analyst's Handbook [Northcutt 99], and "Web of Worries" [Kessler 00] for more information on this subject.

  4. Monitoring is the observation of data streams for specific events. Inspection is the examination of a data resource or process. Auditing is the systematic examination of data against documented expectations of form or behavior. Refer to An Approach for Selecting and Specifying Tools for Information Survivability [Firth 97].

  5. Refer also to CERT/CC summaries, advisories, incident notes, and vulnerability notes available at http://www.cert.org/ and refer to How To Eliminate The Ten Most Critical Internet Security Threats: The Experts Consensus [SANS 00].

  6. Refer to the practice "Identify data that characterize systems and aid in detecting signs of suspicious behavior"

  7. A reasonable starting point might be one to two weeks, but this depends on your operation, review schedule, and data storage capacity.

  8. Refer to the practice "Manage logging and other data collection mechanisms," specifically the step "Document your management plan for handling log files."

  9. Refer to the module Responding to Intrusions [Kossakowski 99], specifically the practice "Collect and protect information associated with an intrusion"

  10. Refer to the module Responding to Intrusions [Kossakowski 99], specifically the practice "Analyze all available information to characterize an intrusion."

  11. One list of such tools is contained in the implementation Identifying tools that aid in detecting signs of intrusion. Many of these tools can be downloaded from the Center for Education, Research, and Information Assurance Security [CERIAS] (formerly known as Computer Operations, Audit, and Security [COAST]).

  12. Refer to the module Responding to Intrusions [Kossakowski 99], specifically the practice "Collect and protect information associated with an intrusion."

  13. Refer to http://www.sans.org/ for more information on the five worst security mistakes committed by the average user.

  14. Refer to the module Responding to Intrusions [Kossakowski 99], specifically the practice "Identify and implement security lessons learned."

Copyright 2000 Carnegie Mellon University.

CERT® and CERT Coordination Center® are registered in the U.S. Patent and Trademark office.

See the conditions for use, disclaimers, and copyright information.

This page was last updated on October 18, 2000.