Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation

被引:0
|
作者
Gurabi, Mehdi Akbari [1 ,2 ]
Nitz, Lasse [1 ,2 ]
Bregar, Andrej [3 ]
Popanda, Jan [1 ]
Siemers, Christian [4 ]
Matzutt, Roman [1 ]
Mandal, Avikarsha [1 ]
机构
[1] Fraunhofer FIT, St Augustin, Germany
[2] Rhein Westfal TH Aachen, Aachen, Germany
[3] Informat Doo, Maribor, Slovenia
[4] Airbus Protect GmbH, Munich, Germany
来源
关键词
Cybersecurity playbooks; response and recovery; machine-readability; THREAT INTELLIGENCE;
D O I
10.1145/3688810
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybersecurity playbooks assume an increasingly important role as threat-specific documents for guiding operators in the context of cyber incident response. However, these playbooks are mostly unstructured or semi-structured, which significantly limits their utility when it comes to automating response and reporting steps, complying with cybersecurity directives, or sharing best practices for incident response across organisations. We thus argue that cybersecurity playbooks must transition to interoperable and machine-readable formats from generation, via management and utilisation to cross-organisational sharing. In this work, we identify and structure key requirements based on expert interviews as a first step toward this transition. From these requirements, we derive a framework for further guidance during the transition to structured security playbooks and their utilisation in a tool-assisted fashion. We discuss the implications of our framework and lessons learned before outlining directions for future research.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Playbook Oriented Cyber Response
    Applebaum, Andy
    Johnson, Shawn
    Limiero, Michael
    Smith, Michael J.
    2018 NATIONAL CYBER SUMMIT: RESEARCH TRACK (NCS 2018), 2018, : 8 - 15
  • [2] Factors Effecting Cyber Incident Occurrence: Mediating Role of Cyber Incident Reporting Mechanism
    Bhatti, Muhammad Awais
    Jamil, Saima
    INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2023, 17 (02): : 112 - 133
  • [3] Information Sharing Requirements and Framework Needed for Community Cyber Incident Detection and Response
    Harrison, Keith
    White, Gregory
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 463 - 469
  • [4] Control system cyber incident reporting protocol
    Hennin, Simon
    2008 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, VOLS 1 AND 2, 2008, : 463 - 468
  • [5] DOT revises incident reporting requirements
    不详
    CHEMICAL ENGINEERING PROGRESS, 2001, 97 (09) : 24 - 24
  • [6] Transforming Cyber Incident Response
    Murdoch S.
    ITNOW, 2019, 61 (01) : 34 - 35
  • [7] Conceptualizing the cyber incident & event statistics reporting standards
    Lee, Sang-Oun
    Seo, H. J.
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 672 - 675
  • [8] Dynamic Cyber-Incident Response
    Mepham, Kevin
    Louvieris, Panos
    Ghinea, Gheorghita
    Clewley, Natalie
    2014 6TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON 2014), 2014, : 121 - 136
  • [9] Regulating Cyber Incidents: A Review of Recent Reporting Requirements
    Marotta, Angelica
    Madnick, Stuart
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 410 - 416
  • [10] Opportunities for incident reporting. Response to: 'The problem with incident reporting' by Macrae et al
    Williams, Huw
    Cooper, Alison
    Carson-Stevens, Andrew
    BMJ QUALITY & SAFETY, 2016, 25 (02) : 133 - U76