OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

cacao message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Re: [cacao] Preventative Action


Thank you all. This is not a hill I will die on. Was just asking for clarification.



On Thu, Feb 6, 2020 at 8:18 AM Ghosh, Anup A. <anup.a.ghosh@accenture.com> wrote:

Agree with the sentiment of letâs not get hung up on category labels. In practice youâll have playbooks that do two or more of these categories anyway.

Â

From: cacao@lists.oasis-open.org <cacao@lists.oasis-open.org> On Behalf Of Allan Thomson
Sent: Thursday, February 6, 2020 11:04 AM
To: Vasileios Mavroeidis <vasileim@ifi.uio.no>; Andrew Storms <storms@newcontext.com>
Cc: Bret Jordan <bret.jordan@broadcom.com>; cacao@lists.oasis-open.org
Subject: [External] Re: [cacao] Preventative Action

Â

This message is from an EXTERNAL SENDER - be CAUTIOUS, particularly with links and attachments.


Â

I suggest mitigation is not just a retroactive action.

Â

Mitigation embodies the active engagement of a threat or threats. Retroactive implies the threat already took place and you are âreactingâ to the threat.

Â

Regardless of what the decision is, I feel that this is debatable and not that important in the scheme of work we have to do.

Â

Whether you label a playbook preventative or mitigative, it matters more what the playbook actually does.

Â

And we are not stopping anyone from defining a playbook that has multiple categories of actions. In many cases, playbooks will start with an investigation before taking a preventative or mitigative step next based on the investigation.

Â

So I suggest we focus on the details of how a playbook is constructed and let the label/categorization just be informational at best. Weâre not going to stop people from mislabeling or mischaracterizing their playbooks to share. Most people who will consider using a playbook in their environment would look at the details of what it does not just a label. Then they can consider whether its valuable or not from that.

Â

Allan Thomson

CTO (+1-408-331-6646)

LookingGlass Cyber Solutions

Â

From: <cacao@lists.oasis-open.org> on behalf of Vasileios Mavroeidis <vasileim@ifi.uio.no>
Date: Thursday, February 6, 2020 at 7:54 AM
To: Andrew Storms <storms@newcontext.com>
Cc: Vasileios Mavroeidis <vasileim@ifi.uio.no>, Bret Jordan <bret.jordan@broadcom.com>, "cacao@lists.oasis-open.org" <cacao@lists.oasis-open.org>
Subject: Re: [cacao] Preventative Action

Â

Very good point.

Â

A Prevention playbook should be considered a pro-active mechanism.

Â

Mitigation for me is retroactive, But we can talk about risk mitigation which in this case would be considered a proactive mechanism. On the other hand, risk mitigation can be defined as a preventive mechanism as long as the playbook can control potential side-effects ( such as loss of data ). So even though that you cannot patch a machine (for a, b reason) you have still control over your machines and your networks, such as the case that the machine is isolated.Â

Â

Maybe we can just include one extra word in the description of each terms (proactive vs retroactive)

Â

-Vasileios

Â

On 4 Feb 2020, at 23:06, Andrew Storms <storms@newcontext.com> wrote:

Â

HeyÂBret

Â

I read those in the doc and was the source of my question. I read that definition of Preventative Action and asked myself what is the difference between prevention and mitigation. Harking back to my CISSP days, we typically used risk managementÂterms of: accept, mitigate or remediate.

Â

So I attempted to find the uniquenessÂofÂPreventative by making a quick matrix which used the examples in the docs. I was hoping it would help to better defineÂPreventative.

Â

I just want to be more clear withÂPreventative Action and see if we can provide some clarification. I think an example would be helpful. If we say that Mitigative and Remediative essentially happen after we learn of a potential attack method. AndÂPreventative is more like a hygiene/best practice/configuration change/pro active steps? Is that inline with what youÂare thinking?

Â

Â

Â

Â

Â

On Tue, Feb 4, 2020 at 11:40 AM Bret Jordan <bret.jordan@broadcom.com> wrote:

Andrew,

Â

I think it is important that we all use the same definitions for things. I have called these out the documents to help in this regards. I have heard many seasoned security analysts and security architects use these terms incorrectly. Â

Â

From the requirements document:

Investigative Action - This is an action that is used to gather information relevant to the construction or modification of cyber security playbooks. This includes gathering of information about a possible incident, problem, attack, or compromise. In some cases, an investigative action could require changes to the systems, networks or application behaviors in order to facilitate a deeper understanding of the investigation and resultant potential response.

Â

Mitigative Action - This is an action that is used to respond to problems that can occur from an incident, problem, attack, or compromise. This is often done when a remediative action is not currently possible. For example, when a system patch is not yet available, one might deploy compensating controls such as moving the system into a sandbox virtual lan (vlan) or deploying more stringent firewall rules.Â

Â

Remediative Action - This is an action that is often used with a goal of eradicating an issue, problem, attack, or compromise on one or more systems that have been determined to be compromised or involved in the particular event.


Preventative Action - This is an action that is used to help ensure that an issue, problem, attack, or compromise does not happen in the first place. In some cases, preventative actions may overlap with certain mitigative and remediation actions.

Â

Â

So a preventativeÂaction could be likeÂdeploying the CIS Top20 security controls. Or could be deploying a block on the firewall for theÂnext HeartBleed before you getÂcompromised.Â

Â

Thanks,

Bret

PGP Fingerprint:Â63B4 FC53 680A 6B7D 1447 ÂF2C0 74F8 ACAE 7415 0050

"Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."

Â

Â

On Feb 4, 2020, at 10:46 AM, Andrew Storms <storms@newcontext.com> wrote:

Â

I'd like some help in better understanding the Preventative action type.


What is unique to a Preventative action that is different from Remediative or Mitigative? I recognize that there is some overlap, however it would be great to have 1 example to demonstrateÂthe uniquenessÂofÂPreventative that would qualify it as needing its own action type.

Â

In order to try and get my head around this, I did a quick matrix of the current examples and mapped them to each action type. What I'm not seeing is a use case where Preventative would not have already been categorized as either mitigative or preventative.

Â

Does anyone have a good and unique example for Preventative?

Â

Known Threat

Blocking Rules

Affect Policies

Blackhole

Sinkhole

Blacklist

Patch

Investigative

Maybe

N

N

N

N

N

N

Mitigative

Y

Y

Y

Y

Y

Y

Y

Remediative

Y

Y

Y

Y

Preventative

Y

Y

Y

Y

Y

Y

Y

Â

Â

Â

Â

Thanks

-A

Â

--Â

<image.png>

ANDREW STORMS

VP of Security Services

Â707-477-4335

Error! Filename not specified.ÂÂError! Filename not specified.

Â


Â

--Â

<image.png>

ANDREW STORMS

VP of Security Services

Â707-477-4335

Â




This message is for the designated recipient only and may contain privileged, proprietary, or otherwise confidential information. If you have received it in error, please notify the sender immediately and delete the original. Any other use of the e-mail by you is prohibited. Where allowed by local law, electronic communications with Accenture and its affiliates, including e-mail and instant messaging (including content), may be scanned by our systems for the purposes of information security and assessment of internal compliance with Accenture policy. Your privacy is important to us. Accenture uses your personal data only in compliance with data protection laws. For further information on how Accenture processes your personal data, please see our privacy statement at https://www.accenture.com/us-en/privacy-policy.
______________________________________________________________________________________

www.accenture.com


--
image.png
Andrew Storms
VP of Security Services
Â707-477-4335
ÂÂ


[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]