Events
Take the Microsoft Learn Challenge
Nov 19, 11 PM - Jan 10, 11 PM
Ignite Edition - Build skills in Microsoft security products and earn a digital badge by January 10!
Register nowThis browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Use this table as a checklist to prepare your Security Operations Center (SOC) to respond to cybersecurity incidents.
Done | Activity | Description | Benefit |
---|---|---|---|
Table top exercises | Conduct periodic table top exercises of foreseeable business-impacting cyber incidents that force your organization's management to contemplate difficult risk-based decisions. | Firmly establishes and illustrates cybersecurity as a business issue. Develops muscle memory and surfaces difficult decisions and decisions rights issues across the organization. | |
Determine pre-attack decisions and decision-makers | As a complement to table top exercises, determine risk-based decisions, criteria for making decisions, and who must make and execute those decisions. For example: Who/when/if to seek assistance from law enforcement? Who/when/if to enlist incident responders? Who/when/if to pay ransom? Who/when/if to notify external auditors? Who/when/if to notify privacy regulatory authorities? Who/when/if to notify securities regulators? Who/when/if to notify board of directors or audit committee? Who has authority to shut down mission-critical workloads? |
Defines the initial response parameters and contacts to involve that streamline the response to an incident. | |
Maintaining privilege | Typically, advice can be privileged, but facts are discoverable. Train key incident leaders in communicating advice, facts and opinions under privilege so that privilege is preserved and risk is reduced. | Maintaining privilege can be a messy process when considering the multitude of communications channels, including e-mail, collaboration platforms, chats, documents, artifacts. For example, you can use Microsoft Teams Rooms. A consistent approach across incident personnel and supporting external organizations can help reduce any potential legal exposure. | |
Insider trading considerations | Contemplate notifications to management that should be taken to reduce securities violations risk. | Boards and external auditors tend to appreciate that you have mitigations that will reduce the risk of questionable securities trades during periods of turbulence. | |
Incident roles and responsibilities playbook | Establish basic roles and responsibilities that allow various processes to maintain focus and forward progress. When your response team is remote, it can require other considerations for time zones and proper handoff to investigators. You might have to communicate across other teams that might be involved, such as vendor teams. |
Technical Incident Leader – Always in the incident, synthesizing inputs and findings and planning next actions. Communications Liaison – Removes the burden of communicating to management from the Technical Incident Leader so they can remain involved in the incident without loss of focus. This activity should include managing executive messaging and interactions with other third parties such as regulators. Incident Recorder – Removes the burden of recording findings, decisions, and actions from an incident responder and produces an accurate accounting of the incident from beginning to end. Forward Planner – Working with mission-critical business process owners, formulates business continuity activities and preparations that contemplate information system impairment that lasts for 24, 48, 72, 96 hours, or more. Public Relations – In the event of an incident that is likely to garner public attention, with Forward Planner, contemplates and drafts public communication approaches that address likely outcomes. |
|
Privacy incident response playbook | To satisfy increasingly strict privacy regulations, develop a jointly owned playbook between SecOps and the privacy office. This playbook will allow rapid evaluation of potential privacy issues that might arising out of security incidents. | It's difficult to evaluate security incidents for their potential to impact privacy because most security incidents arise in a highly technical SOC. The incidents must quickly get surfaced to a privacy office (often with a 72-hour notification expectation) where regulatory risk is determined. | |
Penetration testing | Conduct point-in-time simulated attacks against business-critical systems, critical infrastructure, and backups to identify weaknesses in security posture. Typically, this activity is conducted by a team of external experts focused on bypassing preventative controls and surfacing key vulnerabilities. | In light of recent human-operated ransomware incidents, penetration testing should be conducted against an increased scope of infrastructure, particularly the ability to attack and control backups of mission-critical systems and data. | |
Red Team / Blue Team / Purple Team / Green Team | Conduct continuous or periodic simulated attacks against business-critical systems, critical infrastructure, backups to identify weaknesses in security posture. Typically, this activity is conducted by internal attack teams (Red teams) who are focused on testing the effectiveness of detective controls and teams (Blue teams). For example, you can use Attack simulation training in Microsoft Defender XDR for Office 365 and Attack tutorials & simulations for Microsoft Defender XDR for Endpoint. |
Red, Blue, and Purple team attack simulations, when done well, serve a multitude of purposes:
The Green Team implements changes in IT or security configuration. |
|
Business continuity planning | For mission-critical business processes, design and test continuity processes that allow the minimum viable business to function during times of information systems impairment. For example, use an Azure backup and restore plan to protect your critical business systems during an attack to ensure a rapid recovery of your business operations. |
|
|
Disaster recovery | For information systems that support mission-critical business processes, you should design and test hot/cold and hot/warm backup and recovery scenarios, including staging times. | Organizations that conduct bare metal builds often find activities that are impossible to replicate or don't fit into the service level objectives. Mission-critical systems running on unsupported hardware many times can't be restored to modern hardware. Restore of backups is often not tested and experiences issues. Backups may be further offline such that staging times haven't been factored into recovery objectives. |
|
Out-of-band communications | Prepare for how you would communicate in the the following scenarios:
|
Although it's a difficult exercise, determine how to store important information immutably in off-line devices and locations for distribution at scale. For example:
|
|
Hardening, hygiene, and lifecycle management | In line with Center for Internet Security (CIS) Top 20 security controls, harden your infrastructure and perform thorough hygiene activities. | In response to recent human-operated ransomware incidents, Microsoft has issued specific guidance for protecting every stage of the cyberattack kill chain. This guidance applies to Microsoft capabilities or the capabilities of other providers. Of particular note are:
|
|
Incident response planning | At the outset of the incident, decide on:
|
There's a tendency to throw all available resources at an incident in the beginning, in the hope of a quick resolution. Once you recognize or anticipate that an incident will go for an extended period of time, take on a different posture that with your staff and suppliers that allows them to settle in for a longer haul. | |
Incident responders | Establish clear expectations with one another. A popular format of reporting ongoing activities includes:
|
Incident responders come with different techniques and approaches, including dead box analysis, big data analysis, and the ability to produce incremental results. Starting with clear expectations will facilitate clear communications. |
Resource | Description |
---|---|
2021 Microsoft Digital Defense Report | A report that encompasses learnings from security experts, practitioners, and defenders at Microsoft to empower people everywhere to defend against cyberthreats. |
Microsoft Cybersecurity Reference Architectures | A set of visual architecture diagrams that show Microsoft's cybersecurity capabilities and their integration with Microsoft cloud platforms such as Microsoft 365 and Microsoft Azure and third-party cloud platforms and apps. |
Minutes matter infographic download | An overview of how Microsoft's SecOps team does incident response to mitigate ongoing attacks. |
Azure Cloud Adoption Framework security operations | Strategic guidance for leaders establishing or modernizing a security operation function. |
Microsoft security best practices for security operations | How to best use your SecOps center to move faster than the attackers targeting your organization. |
Microsoft cloud security for IT architects model | Security across Microsoft cloud services and platforms for identity and device access, threat protection, and information protection. |
Microsoft security documentation | Additional security guidance from Microsoft. |
Events
Take the Microsoft Learn Challenge
Nov 19, 11 PM - Jan 10, 11 PM
Ignite Edition - Build skills in Microsoft security products and earn a digital badge by January 10!
Register now