Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation

被引:0
|
作者
Gurabi, Mehdi Akbari [1 ,2 ]
Nitz, Lasse [1 ,2 ]
Bregar, Andrej [3 ]
Popanda, Jan [1 ]
Siemers, Christian [4 ]
Matzutt, Roman [1 ]
Mandal, Avikarsha [1 ]
机构
[1] Fraunhofer FIT, St Augustin, Germany
[2] Rhein Westfal TH Aachen, Aachen, Germany
[3] Informat Doo, Maribor, Slovenia
[4] Airbus Protect GmbH, Munich, Germany
来源
关键词
Cybersecurity playbooks; response and recovery; machine-readability; THREAT INTELLIGENCE;
D O I
10.1145/3688810
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybersecurity playbooks assume an increasingly important role as threat-specific documents for guiding operators in the context of cyber incident response. However, these playbooks are mostly unstructured or semi-structured, which significantly limits their utility when it comes to automating response and reporting steps, complying with cybersecurity directives, or sharing best practices for incident response across organisations. We thus argue that cybersecurity playbooks must transition to interoperable and machine-readable formats from generation, via management and utilisation to cross-organisational sharing. In this work, we identify and structure key requirements based on expert interviews as a first step toward this transition. From these requirements, we derive a framework for further guidance during the transition to structured security playbooks and their utilisation in a tool-assisted fashion. We discuss the implications of our framework and lessons learned before outlining directions for future research.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Patient-Assisted Incident Reporting: Including the Patient in Patient Safety
    Millman, E. Anne
    Pronovost, Peter J.
    Makary, Martin A.
    Wu, Albert W.
    JOURNAL OF PATIENT SAFETY, 2011, 7 (02) : 106 - 108
  • [32] Hypervisor Assisted Forensics and Incident Response in the Cloud
    Urias, Vincent E.
    Stout, William M. S.
    Loverro, Caleb
    Young, John W.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2016, : 768 - 775
  • [33] Organisational, Political and Technical Barriers to the Integration of Safety and Cyber-Security Incident Reporting Systems
    Johnson, Chris W.
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2015, 2015, 9337 : 400 - 409
  • [34] Assisted Design for Automation Systems - from Formal Requirements to Final Designs
    Moriz, Natalia
    Boettcher, Bjoern
    Niggemann, Oliver
    Lackhove, Josef
    2014 IEEE EMERGING TECHNOLOGY AND FACTORY AUTOMATION (ETFA), 2014,
  • [35] Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach Attorneys
    Woods, Daniel W.
    Boehme, Rainer
    Wolff, Josephine
    Schwarcz, Daniel
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2259 - 2273
  • [36] Malware incident response (IR) informed by cyber threat intelligence (CTI)
    He, Ying
    Inglut, Ellis
    Luo, Cunjin
    SCIENCE CHINA-INFORMATION SCIENCES, 2022, 65 (07)
  • [37] Cyber Threats and Incident Response Capability- A Case Study of Pakistan
    Tariq, Muhammad
    Aslam, Baber
    Rashid, Imran
    Waqar, Adeela
    2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 15 - 20
  • [38] A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective
    Schlette, Daniel
    Caselli, Marco
    Pernul, Gunther
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04): : 2525 - 2556
  • [39] Malware incident response(IR) informed by cyber threat intelligence(CTI)
    Ying HE
    Ellis INGLUT
    Cunjin LUO
    ScienceChina(InformationSciences), 2022, 65 (07) : 256 - 258
  • [40] Malware incident response (IR) informed by cyber threat intelligence (CTI)
    Ying He
    Ellis Inglut
    Cunjin Luo
    Science China Information Sciences, 2022, 65