File Name: Six-tabletop-exercises-FINAL.pdf
File Size: 468.46 KB
File Type: Application/pdf
Last Modified: 4 years
Status: Available
Last checked: 24 days ago!
This Document Has Been Certified by a Professional
100% customizable
Language: English
We recommend downloading this file onto your computer
Tabletop ExercisesSix Scenarios to Help Prepare YourCybersecurity Team October 18, 2018 Tabletop Exercises: Six Scenarios to Help Prepare Your Cybersecurity TeamContents Contents .................................................................................................................i Introduction ........................................................................................................... 1 Getting started ....................................................................................................... 1 How to use these tabletop exercises .................................................................................. 1 Exercise 1 ............................................................................................................... 2 The Quick Fix........................................................................................................................ 2 Exercise 2 ............................................................................................................... 3 A Malware Infection ............................................................................................................ 3 Exercise 3 ............................................................................................................... 4 The Unplanned Attack ......................................................................................................... 4 Exercise 4 ............................................................................................................... 5 The Cloud Compromise ....................................................................................................... 5 Exercise 5 ............................................................................................................... 6 Financial Break-in ................................................................................................................ 6 Exercise 6 ............................................................................................................... 7 The Flood Zone .................................................................................................................... 7 Additional Information ........................................................................................... 8 Resources - Free .................................................................................................................. 8 Resources - Free for U.S. State, Local, Tribal, and Territorial (SLTT) Government Entities 8 Resources - Paid................................................................................................................... 8 About CIS ............................................................................................................................. 9 i Tabletop Exercises: Six Scenarios to Help Prepare Your Cybersecurity TeamIntroductionAt CIS® (Center for Internet Security, Inc.®), we believe everyone deserves a secure onlineexperience. We recognize that security is a shared responsibility between users,administrators, and technical professionals. We developed this white paper about tabletopexercises to help cybersecurity teams develop tactical strategies for securing their systems
This guide is organized so that the exercises and discussion questions become morechallenging and difficult as the white paper moves forward. However, you can easily jump tothe section or exercise that most interests you. For more information about cybersecuritybest practices, visit our website: https://www.cisecurity.org/
Getting startedHow to use these tabletop exercisesTabletop exercises are meant to help organizations consider different risk scenarios andprepare for potential cyber threats. All of the exercises featured in this white paper can becompleted in as little as 15 minutes, making them a convenient tool for putting your team inthe cybersecurity mindset. In addition, each scenario will list the processes that are tested,threat actors that are identified, and the assets that are impacted
Tips and tricks • Designate a single individual to facilitate the exercise
• Break the scenario into meaningful learning points
• Read the scenario aloud to the group and ensure their understanding
• Facilitate a conversation about how your organization would handle the scenario, focusing on key learning points as you discuss
• Include applicable members of other business units
• Be sure to follow up on any gaps identified during the exercise
1 Tabletop Exercises: Six Scenarios to Help Prepare Your Cybersecurity TeamExercise 1The Quick FixSCENARIO: Joe, your network administrator, is overworked and underpaid. His bags arepacked and ready for a family vacation to Disney World when he is tasked with deploying acritical patch. In order to make his flight, Joe quickly builds an installation file for the patchand deploys it before leaving for his trip. Next, Sue, the on-call service desk technician, beginsreceiving calls that nobody can log in. It turns out that no testing was done for the recently-installed critical patch
What is your response?Discussion questions • What is Sue’s response in this scenario? o Does your on-call technician have the expertise to handle this incident? If not, are there defined escalation processes? • Does your organization have a formal change control policy? o Are your employees trained on proper change control? o Does your organization have disciplinary procedures in place for when an employee fails to follow established policies? • Does your organization have the ability to “roll back” patches in the event of unanticipated negative impacts?Processes tested: Patch ManagementThreat actor: InsiderAsset impacted: Internal NetworkApplicable CIS Controls™: CIS Control 2: Inventory and Control of Software Assets, CISControl 5: Secure Configuration for Hardware and Software on Mobile Devices, Laptops,Workstations and Servers, CIS Control 6: Maintenance, Monitoring, and Analysis of AuditLogs 2 Tabletop Exercises: Six Scenarios to Help Prepare Your Cybersecurity TeamExercise 2A Malware InfectionSCENARIO: An employee within your organization used the company’s digital camera forbusiness purposes. In the course of doing so, they took a scenic photograph that they thenloaded onto their personal computer by inserting the SD card. The SD card was infected withmalware while connected to the employee’s personal computer. When re-inserted into acompany machine, it infected the organization’s system with the same malware
What is your response?Discussion questions • Who within the organization would you need to notify? • How would your organization identify and respond to malware infecting your system through this vector? o What is the process for identifying the infection vector? • What other devices could present similar threats? • What should management do? • How can you prevent this from occurring again? o Does your organization have training and policies in place to prevent this? o Do policies apply to all storage devices?Processes tested: Detection ability/User awarenessThreat actor: Accidental insiderAsset impacted: Network integrityApplicable CIS Controls: CIS Control 8: Malware Defenses, CIS Control 9: Limitation andControl of Network Ports, Protocols, and Services, CIS Control 12: Boundary Defense 3 Tabletop Exercises: Six Scenarios to Help Prepare Your Cybersecurity TeamExercise 3The Unplanned AttackSCENARIO: A hacktivist group threatens to target your organization following an incidentinvolving an allegation of use of excessive force by law enforcement. You do not know thenature of the attack they are planning. How can you improve your posture to best protectyour organization?What is your response?Discussion questions• What are the potential threat vectors?• Have you considered which attack vectors have been most common over the past month? o Are there other methods you can use to prioritize threats?• Have you checked your patch management status?• Can you increase monitoring of your IDS and IPS? o If you don’t have the resources to do so, is there another organization that could be called upon to assist?• What organizations or companies could assist you with analyzing any malware that is identified?• How do you alert your help desk?• Do you have a way of notifying the entire organization of the current threat (bulletin board, etc.)?• Does your Incident Response Plan account for these types of situations?Processes tested: PreparationThreat actor: HacktivistAsset impacted: UnknownApplicable CIS Controls: CIS Control 8: Malware Defenses, CIS Control 12: BoundaryDefense, CIS Control 17: Implement a Security Awareness and Training Program, CISControl 19: Incident Response and Management 4 Tabletop Exercises: Six Scenarios to Help Prepare Your Cybersecurity TeamExercise 4The Cloud CompromiseSCENARIO: One of your organization’s internal departments frequently uses outside cloudstorage to store large amounts of data, some of which may be considered sensitive. You haverecently learned that the cloud storage provider that is being used has been publiclycompromised and large amounts of data have been exposed. All user passwords and datastored in the cloud provider’s infrastructure may have been compromised
What is your response?Discussion questions • Does your organization have current polices that consider 3rd party cloud storage? • Should your organization still be held accountable for the data breach? • What actions and procedures would be different if this was a data breach on your own local area network? • What should management do? • What, if anything, do you tell your constituents? o How/when would you notify them?Processes tested: Incident responseThreat actor: External threatAsset impacted: CloudApplicable CIS Controls: CIS Control 10: Data Recovery Capabilities, CIS Control 13:Data Protection, CIS Control 19: Incident Response and Management 5 Tabletop Exercises: Six Scenarios to Help Prepare Your Cybersecurity TeamExercise 5Financial Break-inSCENARIO: A routine financial audit reveals that several people receiving paychecks are not,and have never been, on payroll. A system review indicates they were added to the payrollapproximately one month prior, at the same time, via a computer in the financialdepartment
What is your response?INJECT: You confirm the computer in the payroll department was used to make the additions
Approximately two weeks prior to the addition of the new personnel, there was a physicalbreak-in to the finance department in which several laptops without sensitive data weretaken
OPTIONAL INJECT: Further review indicates that all employees are paying a new "fee" of $20each paycheck and that money is being siphoned to an off-shore bank account
Having this additional information, how do you proceed?Discussion questions • What actions could you take after the initial break in? • Do you have the capability to audit your physical security system? • Who would/should be notified? • Would you able to assess the damages associated from the break in? • Would you be able to find out what credentials may have been stored on the laptop? • How would you notify your employees of the incident? • How do you contain the incident? o Optional Inject question: How do you compensate the employees?Processes tested: Incident ResponseThreat actor: External ThreatAsset impacted: HR/Financial dataApplicable CIS Controls: CIS Control 4: Controlled Use of Administrative Privileges, CISControl 16: Account Monitoring and Control, CIS Control 19: Incident Response andManagement 6 Tabletop Exercises: Six Scenarios to Help Prepare Your Cybersecurity TeamExercise 6The Flood ZoneSCENARIO: Your organization is located within a flood zone. Winter weather combined withwarming temperatures has caused flooding throughout the area. Local authorities havedeclared a state of emergency. In the midst of managing the flooding, a ransomware attackoccurs on your facility, making computer systems inoperable
What is your response?Discussion questions • Do you have a COOP (Continuity of Operations Plan) or DRP (Disaster Recovery Plan)? o If so, do you carry out an annual simulation to ensure the COOP or DRP is sufficient and running smoothly? • Do you have an Incident Response Plan (IRP) that specifically details ransomware steps? o What steps will you take if restoring from backup is not an option? o Does your IRP only take into account the financial implications of a cybersecurity incident, or does it consider the severity of the situation as well? o Do you have a plan in place for how to acquire bitcoin? o Have you considered that a targeted ransomware attack may require more bitcoin than is easily accessible on the market? • Do you have a backup for completing Emergency Operations Center (EOC) processes without a computer system? o Can you route emergency communications/processes through a neighboring entity? • Who do you need to notify, and how will you do so? o Consider that increased phone traffic may be congesting the lines
Processes tested: Emergency responseThreat actor: External threatAsset impacted: Emergency Operations Center ProcessesApplicable CIS Controls: CIS Control 7: Email and Web Browser Protections, CIS Control 19:Incident Response and Management 7 Tabletop Exercises: Six Scenarios to Help Prepare Your Cybersecurity TeamAdditional InformationInterested in cybersecurity best practices? CIS is here to help! Check out the resources belowto take the next step towards security and compliance:Resources - FreeCIS Benchmarks: https://www.cisecurity.org/cis-benchmarks/CIS Controls: https://www.cisecurity.org/controls/CIS-CAT Lite: https://learn.cisecurity.org/cis-cat-landing-pageSample Remediation Kit: https://learn.cisecurity.org/remediation-kitsWebinar: CIS-CAT Pro Demo: https://www.cisecurity.org/cis-benchmarks/cis-benchmarks-webinar/Resources - Free for U.S. State, Local, Tribal, and Territorial(SLTT) Government EntitiesMS-ISAC Membership (for U.S. SLTTs): https://learn.cisecurity.org/ms-isac-registrationEI-ISAC Membership (for U.S. SLTTs supporting elections): https://www.cisecurity.org/ei-isac/Resources - PaidCIS SecureSuite Membership: https://www.cisecurity.org/cis-securesuite/CIS Hardened Images: https://www.cisecurity.org/services/hardened-virtual-images/ 8 Tabletop Exercises: Six Scenarios to Help Prepare Your Cybersecurity TeamAbout CISCIS® (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity that harnessesthe power of a global IT community to safeguard private and public organizations againstcyber threats. The CIS Controls™ and CIS Benchmarks™ are the global standard andrecognized best practices for securing IT systems and data against the most pervasiveattacks. These proven guidelines are continuously refined and verified by a volunteer, globalcommunity of experienced IT professionals. Our CIS Hardened Images are virtual machineemulations preconfigured to provide secure, on-demand, and scalable computingenvironments in the cloud. CIS is home to both the Multi-State Information Sharing andAnalysis Center® (MS-ISAC®), the go-to resource for cyber threat prevention, protection,response, and recovery for U.S. State, Local, Tribal, and Territorial government entities, andthe Elections Infrastructure Information Sharing and Analysis Center™ (EI-ISAC™), whichsupports the cybersecurity needs of U.S. State, Local and Territorial elections offices
Contact InformationCIS31 Tech Valley DriveEast Greenbush, NY 12061518.266.3460[email protected] 9
Tabletop Exercises: Six Scenarios to Help Prepare Your Cybersecurity Team 1 Introduction At CIS® (Center for Internet Security, Inc.®), we believe everyone deserves a secure online
Tabletop exercises are meant to help organizations consider different risk scenarios and prepare for potential cyber threats. All of the exercises featured in this white paper can be completed in as little as 15 minutes, making them a convenient tool for putting your team in the cybersecurity mindset.
Cyber security incident preparedness tabletop exercises are an essential part of an organizational training strategy when it comes to getting your team members and personnel ready for an actual security incident.
An incident response tabletop exercise is an important form of organizational training about security incident preparedness, taking participants through the process of conducting incident simulation scenarios and providing hands-on training for participants that can then highlight flaws in incident response planning.
CISA Tabletop Exercise Packages (CTEPs) are a comprehensive set of resources designed to assist stakeholders in conducting their own exercises. Partners can use CTEPs to initiate discussions within their organizations about their ability to address a variety of threat scenarios.