You will explore the importance of incident prioritization and escalation. You’ll learn how the decisions security professionals make help to keep business operations safe.
Learning Objectives
- Define incident escalation from a security analyst perspective.
- Explore the various security incident classification types.
- Recognize the impact various security incidents have on business operations.
- Determine when and how to escalate a security incident.
Escalation in cybersecurity
Video: Welcome to module 2
This section focuses on the crucial skill of escalating security incidents:
Key takeaways:
- Importance of escalation: Recognizing and addressing potential threats promptly prevents smaller issues from escalating into major problems.
- Decisions matter: Your everyday choices contribute to the security team’s overall objective of protecting data and assets.
- Familiarize yourself with “escalation”: This term will be recurrent throughout your cybersecurity career.
Upcoming topics:
- Entry-level analyst perspective on escalation: Learn how to handle incident escalation effectively as a beginner.
- Incident classification types: Understand different categories of security incidents.
- Business impact: Recognize how various incidents can disrupt business operations.
- Escalation guidelines: Get practical tips on when and how to escalate effectively.
Overall: This section introduces the concept of incident escalation and its importance in preventing small issues from turning into major threats. It prepares you for deeper exploration of the process and its nuances in the following videos.
I’m excited that you
could join me today! Previously, you learned about the importance of
various asset types. You also learned about
the relationship between incidents and events. Now, we’ll focus on
escalating those incidents and events to the right people. Protecting the
data and assets of an organization is the primary
goal of a security team. The decisions you
make every day are important for helping the security team
achieve that goal. Recognizing when and how to escalate security
incidents is crucial. It helps ensure simple issues don’t become larger problems
for an organization. Escalation is a term you should familiarize
yourself with. It’s likely to resurface
often as you continue your journey into
the security profession. In the following videos, we’ll discuss incident
escalation from an entry-level
analyst’s perspective. Then, we’ll explore various incident
classification types and the impacts
security incidents can have on business operations. Finally, we’ll share some general guidelines
for escalating incidents. Coming up, we’ll start by focusing on incident escalation and how it can be
used to prevent a seemingly small
issue from becoming a bigger problem.
Let’s get started!
Video: The importance of escalation
Security Incident Escalation for Entry-Level Analysts: A Summary
Key takeaways:
- Definition: Incident escalation is identifying potential security threats, triaging them, and handing them to more experienced team members (if necessary).
- Not All Incidents Get Escalated: Learn to discern which incidents require escalation based on organization guidelines.
- Essential Skills:
- Attention to detail: Identify anomalies that don’t seem right within the network or systems.
- Following escalation guidelines: Ensure proper protocol for raising the issue to the right individual or team.
- Security Team Roles: Larger organizations have various teams (CISO, engineers, PR, legal) to address different aspects of an incident.
- Timely Escalation Matters: Ignoring minor incidents can lead to major consequences like financial losses, data exposure, and reputational damage.
- Your Role: As an entry-level analyst, you play a crucial part in identifying issues, escalating them within the process, and ultimately protecting the organization from harm.
- Upcoming: Learn about different security incident levels to determine the proper urgency for escalation based on the incident type.
Overall: This section emphasizes the importance of proper incident escalation for security analysts, especially highlighting the skills needed, the impact of timely escalation, and the analyst’s vital role in the overall security process.
Security Incident Escalation for Entry-Level Analysts: A Practical Guide
Welcome, new analysts! This tutorial equips you with the knowledge and skills to confidently navigate the crucial process of security incident escalation. Protecting an organization’s data and assets begins with recognizing and addressing potential threats promptly, and escalation plays a key role in this.
Understanding the Basics:
- What is Incident Escalation?: It’s the identifying, assessing, and (if necessary) transferring a potential security incident to a more experienced team member or higher level of authority within the security organization.
- Why is it Important?: Timely escalation prevents minor issues from spiraling into major crises. It ensures the right expertise tackles the problem efficiently, minimizing damage and optimizing response.
- Not All Incidents Need Escalation: Learn to differentiate between anomalies and true security threats. Over-escalation consumes valuable resources and can disrupt workflows.
Essential Skills for Effective Escalation:
- Attention to Detail: Hone your eagle eye to spot even subtle anomalies in network behavior, system logs, or user activity that might indicate a potential security incident.
- Understanding Escalation Guidelines: Every organization has defined procedures for incident reporting and escalation. Familiarize yourself thoroughly with your company’s specific escalation process, including whom to contact and when.
- Clear and Concise Communication: When escalating an incident, accurately and concisely communicate the details, including the nature of the incident, observed symptoms, time of occurrence, and any initial assessment.
Demystifying Security Team Roles:
Larger organizations have dedicated teams with specialized skills to handle different aspects of an incident. These may include:
- Incident Response Team: Leads the investigation, containment, and eradication of the threat.
- Security Operations Center (SOC): Monitors systems and infrastructure for suspicious activity and alerts analysts to potential incidents.
- Engineering Team: Provides technical expertise for troubleshooting and patching vulnerabilities.
- Public Relations Team: Manages communications with stakeholders and the public in case of a major incident.
- Legal Team: Provides legal guidance and compliance support during incident response.
The Domino Effect of Delayed Escalation:
Remember, even the smallest security incident, if left unchecked, can snowball into a significant crisis. Imagine a minor malware infection:
- Delayed escalation: The infection spreads, compromising sensitive data and causing system disruptions.
- Potential consequences: Financial losses due to downtime, data breaches exposing customer information, and reputational damage.
Playing Your Part as an Entry-Level Analyst:
As a frontline analyst, you’re the first line of defense. Your keen observation and timely escalation contribute significantly to the organization’s overall security posture. Think of yourself as the first domino in a chain reaction. Your accurate and responsible escalation triggers the right responses, preventing the dominoes from falling and causing widespread damage.
What’s Next:
- Deep dive into different security incident classifications to understand the severity levels and appropriate escalation paths.
- Explore practical tactics for effective communication and collaboration with various security teams during incident response.
- Analyze real-world case studies to apply your newly acquired knowledge and hone your escalation skills.
Remember: Effective incident escalation is an acquired skill. Be patient, practice consistently, and don’t hesitate to seek guidance from senior analysts or your mentor. You are a vital part of the security team, and your responsible escalation decisions play a crucial role in keeping your organization safe from harm.
Additional Resources:
- SANS Institute: https://www.sans.org/cyber-security-courses/
- NIST Cybersecurity Framework: https://www.nist.gov/cyberframework
- OWASP Top 10 Web Application Security Risks: https://owasp.org/www-project-top-ten/
Stay vigilant, escalate wisely, and together, we can build a fortress-like security posture for your organization!
Security analysts are hired to protect company assets and data, including knowing when and how to escalate
security incidents. In this video, we’ll define security incident
escalation and discuss your role in making
decisions that help protect your organization’s
data and assets. So what is incident escalation? And why is it so important for
security professionals? Incident escalation
is the process of identifying a potential
security incident, triaging it, and (if appropriate) handing it off to a more
experienced team member. It’s important to
also recognize that not every incident
needs to be escalated. In this video, we’ll cover what types of incidents
should be escalated. As an entry-level analyst,
it’s unlikely that you’ll be responding to security
incidents independently. However, it’s important that
you know how to evaluate and escalate incidents to
the right individual or team when necessary. Let’s discuss the
essential skills needed to properly escalate
security incidents. There are two essential
skills that will help you identify security incidents
that need to be escalated: attention to detail and
an ability to follow an organization’s escalation
guidelines or processes. Attention to detail will help
you quickly identify when something doesn’t
seem right within the organization’s
network or systems. Following a company’s escalation
guidelines or processes will help you know
how to properly escalate the issue
you’ve identified. Larger organizations’
security teams have many levels, and each level, or member, of that team plays a major role in protecting the
company’s assets and data. However, smaller and
medium sized companies have only one or two people responsible for the
organization’s security. For now, we’ll focus on the roles in bigger
organizations. From the Chief Information
Security Officer, also known as the CISO, to the engineering team,
public relations team, and even the legal team, every member of the
security team matters. Each team member’s
role depends on the nature and scope
of the incident. These roles are
highlighted within a company’s escalation process. Even the smallest
security incident can become a much larger
issue if not addressed. And that’s where you come in! Imagine you’re
working at your desk and notice what appears
to be a minor incident, but you decide to take a break before addressing
or escalating it. This decision could have
major consequences. If a small issue goes
unescalated for too long, it has the potential to become a larger problem that
costs the company money, exposes sensitive customer data, or damages the
company’s reputation. However, with a high-level of attention to detail, and
an ability to follow your organization’s
escalation guidelines and processes, it may be possible to avoid exposing the business, and its customers,
to harmful incidents. As an entry-level analyst, you play an important role. You help the security
team identify issues within the network and systems and help make sure the right person on the team is alerted when incidents occur. Think about an assembly line. Would the final step in the
line be negatively impacted if the first step were done
incorrectly, or not at all? Of course it would! Every decision you make helps the entire security team protect an organization’s
assets and data. Knowing when and how to
escalate security incidents is one of many
important decisions you’ll need to make
on a daily basis. Later in this course, we’ll discuss the various
levels of security incidents. Knowing those levels will help
you determine the level of urgency needed to escalate
different incident types.
Reading: Escalate with a purpose
Reading
You previously learned about security incident escalation and the skills needed to help you escalate incidents. In this reading, you’ll learn the importance of escalating security issues and the potential impact of failing to escalate an issue.
Incident escalation
Security incident escalation is the process of identifying a potential security incident. During this process, potential incidents are transferred to a more experienced department or team member. As a security analyst, you’ll be expected to recognize potential issues, such as when an employee excessively enters the wrong credentials to their account, and report it to the appropriate person. When you join a new organization, you’ll learn about the specific processes and procedures for escalating incidents.
Notification of breaches
Many countries have breach notification laws, so it’s important to familiarize yourself with the laws applicable in the area your company is operating in. Breach notification laws require companies and government entities to notify individuals of security breaches involving personally identifiable information (PII). PII includes personal identification numbers (e.g., Social Security numbers, driver’s license numbers, etc.), medical records, addresses, and other sensitive customer information. As an entry-level security analyst, you’ll need to be aware of various security laws, especially because they are regularly updated.
Low-level security issues
Low-level security issues are security risks that do not result in the exposure of PII. These issues can include the following and other risks:
- An employee having one failed login attempt on their account
- An employee downloading unapproved software onto their work laptop
These issues are not significant security challenges, but they must be investigated further in case they need to be escalated. An employee typing in a password two to three times might not be of concern. But if that employee types in a password 15 times within 30 minutes, there might be an issue that needs to be escalated. What if the multiple failed login attempts were a malicious actor attempting to compromise an employee’s account? What if an employee downloads an internet game or software on their work laptop that is infected with malware? You previously learned that malware is software designed to harm devices or networks. If malware is downloaded onto an organization’s network, it can lead to financial loss and even loss of reputation with the organization’s customers. While low-level security issues are not considered significant security threats, they should still be investigated to ensure they result in minimal impact to the organization.
The escalation process
Every company has different protocols and procedures, including unique escalation policies. These policies detail who should be notified when a security alert is received and who should be contacted if the first responder is not available. The policy will also determine how someone should specifically escalate an incident, whether it’s via the IT desk, an incident management tool, or direct communication between security team members.
Key takeaways
Incident escalation is essential for protecting an organization’s data. Every organization might have a different way of escalating security incidents. A security analyst should be aware of the escalation protocols that are in place at their organization. Both small and large security issues should be escalated to the appropriate team or team member.
To escalate or not to escalate
Video: Prepare to escalate through security recognition
Summary: Security Incident Classification for Entry-Level Analysts
Key takeaways:
- 3 Major Incident Types:
- Malware infection: Malicious software affecting networks, disrupting operations (phishing, ransomware are examples).
- Unauthorized access: Someone gaining unauthorized access to systems or applications (often via brute force attacks).
- Improper usage: Employees violating company policies, either unintentionally (accessing unauthorized software) or intentionally (misusing company resources).
- Escalation Importance: All incidents require escalation, but prioritize based on:
- Malware: Impactful due to sensitive data storage, urgent escalation needed.
- Unauthorized access: Evaluate criticality of accessed system before escalating.
- Improper usage: Always escalate to supervisor for further investigation, regardless of intent.
- Remember: As an analyst, knowing different incident types and when to escalate is crucial for effective security response.
Overall: This section highlights three common security incident types, emphasizing the importance of escalation while considering the urgency based on specific scenarios and potential impact on the organization.
Security Incident Classification: A Roadmap for Entry-Level Analysts
Welcome, future security heroes! This tutorial equips you with the knowledge and skills to navigate the critical world of security incident classification, the foundation for effective response and escalation. As an entry-level analyst, understanding different incident types will empower you to make informed decisions about when and how to raise the alarm.
Demystifying the Types:
- Malware Infections: Malicious software infiltrating systems and networks, causing disruptions and compromise. Malware comes in many flavors, from simple phishing attempts to complex ransomware attacks that encrypt critical data.
- Unauthorized Access: Unpermitted access to systems or applications, often achieved through brute force attacks or stolen credentials. This access can enable data theft, system manipulation, and other malicious activities.
- Improper Usage: Employees violating company policies regarding technology usage. This can be unintentional (installing unauthorized software) or intentional (misusing company resources for personal gain).
Classification Matters:
Accurately classifying incidents is key to triggering the right response and minimizing damage. Consider these factors:
- Impact: How significantly does the incident affect the organization’s operations, data, or reputation? A ransomware attack crippling entire systems demands immediate escalation, while unintentional software installation might require a less urgent approach.
- Urgency: Does the incident require immediate action to prevent further damage, or can it be investigated and addressed later? Time becomes critical in scenarios like data breaches or ongoing system attacks.
- Intent: Was the incident deliberate malicious activity or an unintentional mistake? Understanding the intent behind an incident can guide your escalation response and potential disciplinary actions.
The Escalation Equation:
Remember, not every incident necessitates a frantic alarm. Analyze the situation using the classification framework above to determine the appropriate escalation path:
- High-Impact Incidents: Malware infections targeting critical systems, major data breaches, and confirmed unauthorized access by malicious actors fall under this category. Immediate escalation to senior analysts or incident response teams is crucial.
- Medium-Impact Incidents: Unintentional improper usage, suspicious network activity, or minor malware infections warrant further investigation and potential escalation depending on the observed severity and potential threats.
- Low-Impact Incidents: Isolated cases of unintentional policy violations or minor suspicious activity might require documentation and internal reporting, but not immediate escalation.
Beyond the Basics:
As you progress in your security journey, explore:
- Advanced Incident Classification Frameworks: NIST Cybersecurity Framework and MITRE ATT&CK offer in-depth frameworks for categorizing and analyzing incidents.
- Threat Intelligence: Utilize threat intelligence feeds and analysis tools to stay updated on emerging threats and vulnerabilities.
- Scenario-Based Practicing: Test your classification skills through simulated incidents, honing your decision-making and escalation judgment.
Remember: Accurate incident classification is a powerful tool in your security arsenal. By understanding the different types, assessing their impact, and applying your knowledge to escalate effectively, you contribute significantly to your organization’s security posture.
Together, let’s build a safe and secure digital world, one classified incident at a time!
Additional Resources:
- NIST Cybersecurity Framework: https://www.nist.gov/cyberframework
- MITRE ATT&CK: https://attack.mitre.org/
- SANS Institute: https://www.sans.org/
Stay sharp, classify wisely, and escalate confidently! You’re a vital part of the security team, and your classification skills play a crucial role in keeping your organization safe.
Previously, we defined what it means to escalate
an incident. We also discussed
the skills needed to properly escalate incidents
when the time comes. In this video, we’re
going to cover a few incident classification
types to be aware of: malware infection, unauthorized access,
and improper usage. A malware infection
is the incident type that occurs when malicious
software designed to disrupt a system infiltrates an organization’s
computers or network. As discussed in a
previous course, malware infections can
come in many forms. Some are simple and others
are a bit more complex. One example is a
phishing attempt. These are relatively
simple malware infections. Another example is a
ransomware attack, which is considered
much more complex. Malware infections can cause a system’s network to run
an unusually low speeds. Attackers can even prevent an organization from
viewing critical data, unless the organization pays the attacker a ransom
to unlock the data. This incident type is especially impactful to an
organization because of the amount of sensitive
data stored on an organization’s
network and computers. Escalating malware infections is an important aspect of protecting the organization
that you work for. But wait, there’s more. The second incident type we’ll discuss is unauthorized access. This is an incident type that occurs when an individual gains digital or physical access to a system or application
without permission. As you may recall, earlier in the program, we
discussed brute force attacks, which use trial and error
to compromise passwords, login credentials,
and encryption keys. These attacks are often
used to help attackers gain unauthorized access to an organization’s systems
or applications. All unauthorized
access incidents are important to escalate. However, the urgency of that
escalation depends on how critical that system is to the organization’s
business operations. We’ll explore this idea in more detail later
in this course. The third incident we’ll
discuss is improper usage. This is an incident type that
occurs when an employee of an organization violates the organization’s
acceptable use policies. This one can be a
bit complicated. There are instances when
improper usage is unintentional. For an example, an employee may attempt to access
software licenses for personal use or even use a company’s system to access a
friend’s or coworker’s data. Maybe the employee
wasn’t aware of the policy they were violating, or maybe the policy
wasn’t properly defined and communicated
to employees. But there are other times when improper usage is
an intentional act. So how do you know if an
improper usage incident is accidental or intentional? That can be a difficult
decision to make. That’s why improper
usage incidents should always be escalated
to a supervisor. As a member of an
organization’s security team, it’s likely that
you’ll encounter a variety of incident
types while on the job. So it’s important to know what they are and how to escalate them.
Reading: Recognize roles and responsibilities during escalation
Reading
You previously learned about various incident classification types and how those incidents can impact an organization.
This reading will discuss the roles of the various team members who are a part of the incident escalation process. Keep in mind that not all organizations are alike, and some roles and responsibilities may be identified using different terminology and definitions.
Data owners
A data owner is the person that decides who can access, edit, use, or destroy their information. Data owners have administrative control over specific information hardware or software and are accountable for the classification, protection, access, and use of company data. For example, consider a situation where an employee gains unauthorized access to software they do not need to use for work. This kind of security event would be escalated to the data owner of that software.
Data controllers
Data controllers determine the procedure and purpose for processing data. This role largely focuses on collecting the personal information of customers. The data controller determines how that data is used. The data controller also ensures that data is used, stored, and processed in accordance with relevant security and privacy regulations. If sensitive customer information was at risk, that event would be escalated to data controllers.
Data processors
Data processors report directly to the data controller and are responsible for processing the data on behalf of the data controller. The data processor is typically a vendor and is often tasked with installing security measures to help protect the data. Data processing issues are typically escalated to the individual who oversees the third-party organization responsible for data processing.
Data custodians
Data custodians assign and remove access to software or hardware. Custodians are responsible for implementing security controls for the data they are responsible for, granting and revoking access to that data, creating policies regarding how that data is stored and transmitted, advising on potential threats to that data, and monitoring the data. Data custodians are notified when data security controls need to be strengthened or have been compromised.
Data protection officers (DPOs)
Data protection officers are responsible for monitoring the internal compliance of an organization’s data protection procedures. These individuals advise the security team on the obligations required by the organization’s data protection standards and procedures. They also conduct assessments to determine whether or not the security measures in place are properly protecting the data as necessary. DPOs are notified when set standards or protocols have been violated.
Key takeaways
Incident escalation requires various members of a security team to act as one. Entry-level analysts should be familiar with the roles and responsibilities of different team members on the security team. As an entry-level analyst, you will typically escalate incidents to your direct supervisor. However, it’s still important to have an understanding of the different team members as you move forward in your security career because it will help you recognize which incidents should be reported to whom.
Practice Quiz: Test your knowledge: To escalate or not to escalate
Fill in the blank: A malware infection is an incident type that occurs when _____.
malicious software designed to disrupt a system infiltrates an organization’s computers or network
A malware infection is an incident type that occurs when malicious software designed to disrupt a system infiltrates an organization’s computers or network.
Fill in the blank: Improper usage is an incident type that occurs when _____.
an employee of an organization violates the organization’s acceptable use policies
Improper usage is an incident type that occurs when an employee of an organization violates the organization’s acceptable use policies.
When should you escalate improper usage to a supervisor?
Improper usage incidents should always be escalated out of caution.
Improper usage should always be escalated.
Fill in the blank: Unauthorized access is an incident type that occurs when _____.
an individual gains digital or physical access to a system, data, or an application without permission
Unauthorized access is an incident type that occurs when an individual gains digital or physical access to a system, data, or an application without permission.
Timing is everything
Video: From simple activity to major data breach
Summary: The Domino Effect of Unescalated Incidents
Key takeaways:
- Unescalated incidents, even minor ones, can snowball into major problems: Ignoring suspicious activity like the banned app’s log activity ultimately led to a costly data breach.
- Incident criticality evolves: Initially, it might be unclear and require further investigation (medium), but a senior analyst might later reassess it as high or low based on findings.
- Urgency depends on impacted assets: Critical assets like manufacturing plants or PII databases demand higher urgency compared to less critical incidents like forgotten passwords.
- Remember: Every incident matters, but prioritize based on potential impact and asset criticality.
Overall: This section emphasizes the cascading consequences of unaddressed incidents and highlights the importance of accurate assessment and prioritization based on impacted assets and potential risks.
The Domino Effect of Unescalated Incidents: A Security Analyst’s Guide
Welcome, future security champions! This tutorial unpacks the domino effect of unescalated incidents, empowering you to understand the potential consequences of delaying action and equipping you with skills to prioritize and escalate effectively.
The Ripple Begins:
Imagine a seemingly minor anomaly: unusual log activity in a recently banned app. Left uninvestigated, this ripple can turn into a tsunami of trouble. This scenario exemplifies the domino effect – a small incident, when ignored, triggers a chain reaction of increasingly severe consequences.
From Small Snags to Major Disruptions:
Let’s dissect the potential dominoes:
- Initial Incident: Unnoticed suspicious activity in the banned app.
- Missed Escalation: The analyst forgets to report the activity during the supervisor meeting.
- Data Breach: Days later, a data breach cripples a manufacturing site, halting operations and causing financial losses.
- Root Cause Discovery: Investigation reveals the breach originated from the banned app.
Lessons Learned:
- Every incident matters: Ignoring seemingly small anomalies can pave the way for larger issues.
- Timely escalation is crucial: Early intervention often prevents minor incidents from escalating into major incidents.
- Criticality evolves: Incident criticality might be unclear initially, requiring investigation and reassessment for effective prioritization.
Prioritizing Like a Pro:
Not all incidents require immediate escalation. Learn to assess urgency based on factors like:
- Impacted assets: Critical assets like manufacturing plants or PII databases demand higher urgency compared to less critical incidents.
- Potential damage: Consider the extent of potential harm the incident could cause if left unchecked.
- Available information: As you gather more information, the criticality and urgency may change, necessitating reassessment and adjusted escalation.
Mastering the Escalation Flow:
Develop a robust escalation procedure:
- Clearly document incidents: Maintain detailed logs of observed anomalies, even seemingly minor ones.
- Understand escalation paths: Know who to contact and when based on your organization’s specific protocol.
- Communicate effectively: Clearly convey the observed anomaly, potential impact, and urgency to ensure appropriate action.
Remember: You, the analyst, are the first line of defense. Your vigilance and timely escalation play a critical role in preventing the domino effect of unaddressed incidents. Embrace your responsibility, prioritize effectively, and escalate swiftly to keep your organization safe.
Additional Resources:
- NIST Cybersecurity Framework: https://www.nist.gov/cyberframework
- MITRE ATT&CK: https://attack.mitre.org/
- SANS Institute: https://docs.broadcom.com/doc/proactive-approach-incident-response
Stay vigilant, escalate wisely, and prevent the dominoes from falling! Together, we can build a robust security posture that withstands even the smallest tremors.
When should an incident handler escalate a high-level security incident?
It should be escalated immediately.
High-level security incidents should be escalated and handled immediately. The more time that passes before an incident is escalated, the higher the risk.
So far, we’ve discussed
different incident types and the importance of escalating those incidents to
the right person. But what happens if an incident goes unescalated for too long? In this video, we’ll discuss
the potential impact that even the smallest
incident can have on an organization, if it goes
unnoticed. Are you ready? Great! Now let’s take a journey into a day in the life of an
organization’s security team. It’s been a quiet day
for the security team. Suddenly, you notice
there’s been unusual log activity in an app that was recently banned
from the organization. You make a note to mention this activity during the next meeting with
your supervisor. But you forget, and
never mention it. Following this same scenario, let’s fast forward
to a week later. You and your supervisor
are meeting again. But now, the supervisor indicates that a data
breach has occurred. This breach has impacted one of the manufacturing sites
for the organization. Now, all operations at the manufacturing site
have been put on hold. This causes the company to
lose money and precious time. Days later, the security team discovers that the data breach began with suspicious
activity in the app that was recently
banned from the organization. What we’ve learned from
this scenario is that a simple incident can lead to a much larger issue, if
not escalated properly. Incident criticality is also
important to note here. Initially an incident can be escalated with a medium
level of criticality if the analyst doesn’t
have enough information to determine the amount of damage done to the organization. Once an experienced
incident handler reviews the incident, the incident may be increased or decreased to a high or
low criticality level. Every security incident you encounter is important
to an organization, but some incidents are certainly
more urgent than others. So, what’s the best way to determine the urgency of a
security incident? It really depends on the asset or assets that the
incident affects. For example, if an employee forgets their login password
for their work computer, a low-level security
incident may be prompted if they have repeated
failed login attempts. This incident needs
to be addressed, but the impact of this
incident is likely minimal. In other instances, assets are critical to an organization’s
business operations, such as a manufacturing plant or database that stores PII. These types of assets need to be protected with a higher
level of urgency. The impact of an
attacker gaining unauthorized access to a
manufacturing application or PII is far greater than a forgotten password,
because the attacker could interfere with the
manufacturing processes or expose private
customer data. I hope this video has helped you understand the importance of knowing the relationship between assets and security incidents. Later in this
course, we’ll share some new concepts related to escalation timing
and why your role in that process matters.
Video: When and how to escalate a security incident
Summary: Practical Guide to Incident Escalation
Key takeaways:
- No One-Size-Fits-All: Each organization has its unique escalation policy outlining who and when to notify about incidents.
- Challenges Exist: Be prepared for situations like supervisor absence and adapt your escalation approach accordingly.
- Knowledge is Power: Familiarize yourself with your organization’s escalation policy (no memorizing required, just save it for easy access).
- Protect with Precision: Following the policy protects your organization and its people from malicious actors.
- Attention to Detail Matters: Pay close attention to the specifics of your escalation policy to ensure proper escalation and prioritization.
Overall: This section emphasizes the importance of understanding and following your organization’s unique escalation policy for effective incident response and minimizing potential damage.
Conquering the Challenge: A Practical Guide to Incident Escalation
Welcome, future security guardians! This tutorial equips you with the essential knowledge and skills to navigate the critical world of incident escalation, the cornerstone of swift and effective security response. As an analyst, knowing when and how to raise the alarm protects your organization from unforeseen threats.
Navigating the Policy Landscape:
Each organization is a unique security ecosystem, and so are its escalation policies. These policies provide the roadmap for reporting incidents, outlining who to contact and when depending on the severity and nature of the threat. Forget a one-size-fits-all approach – embrace the dynamism of individual policies.
Knowing Your Course:
While memorization isn’t your goal, thoroughly acquaint yourself with your organization’s escalation policy. Consider these steps:
- Location, Location, Location: Locate the policy within your company network or intranet.
- Bookmark for Easy Access: Save the policy as a handy reference on your work device.
- Dive into the Details: Don’t skip the specifics! Understand the different notification tiers, contact information, and procedures for various incident types.
Facing the Unexpected:
Be prepared for challenges that might disrupt the smooth flow of escalation:
- Supervisor Unavailable: Don’t let an absent supervisor halt your response. Follow the policy’s alternative escalation paths, ensuring someone is notified.
- Unclear Scenarios: If an incident falls outside the clear-cut categories, use your judgment and consult senior analysts for guidance. Remember, timely action is crucial, even in uncertain situations.
Precision in Every Step:
Your adherence to the escalation policy plays a vital role in protecting your organization:
- Following the Protocol: Proper escalation ensures the right people are notified at the right time, enabling swift response and minimizing damage.
- Prioritization Power: The policy helps you prioritize incidents based on their severity and potential impact, focusing your efforts on the most critical threats.
- Trust and Transparency: Following the policy demonstrates your commitment to organizational security and builds trust with your team.
Remember: Mastering incident escalation is an ongoing journey. As you gain experience, delve deeper into your organization’s specific procedures, actively participate in security training, and don’t hesitate to seek clarification from senior analysts.
By embracing the intricacies of your organization’s escalation policy and applying these practical tips, you become a champion of effective security response. Together, let’s build a resilient digital wall against any threat, one escalated incident at a time!
Additional Resources:
- NIST Cybersecurity Framework: https://www.nist.gov/cyberframework
- SANS Institute: https://www.sans.org/
- MITRE ATT&CK: https://attack.mitre.org/
Stay informed, escalate wisely, and stand guard against the digital shadows! You are a vital cog in the security machine, and your responsible escalation decisions safeguard your organization’s digital well-being.
We’ve shared quite a bit about the
importance of your role when it comes to escalating incidents. We’ve even discussed a few incident
types that you may encounter. But what are the actual steps you need to
take to properly escalate an incident? The answer to that question actually
depends on the organization you’re working for. There isn’t a set standard or process for incident escalation that
all organizations use. Every security team has
their own processes and procedures when it comes
to handling incidents. In this video, we’re going to
discuss general guidelines for incident escalation and
how to apply them on the job. Let’s get started! Each organization has its own process for
handling security incidents. That process is known as
an escalation policy, which is a set of actions that
outline who should be notified when an incident alert occurs and
how that incident should be handled. Ideally, the escalation process
would go smoothly every time. But in the workplace, challenges to
that process can happen unexpectedly. For example, what if your immediate
supervisor is out of office? If an incident occurs that day,
it still needs to be escalated to someone. This is one example of why understanding
your organization’s escalation policy is important. You don’t need to memorize your
organization’s escalation policy, but it is wise to save or
bookmark it on your work device. This way, you’ll always have
access to it when you need it. Following an organization’s escalation
policy is essential, because the actions you take help
protect the organization and the people it serves
from malicious actors. The escalation policy for an organization
can be an extensive document. So it’s up to you to pay
attention to the small details within the escalation policy
of your organization. Attention to detail can make the
difference between escalating an incident to the right or wrong person. It can also help you prioritize
which incidents need to be escalated with more or less urgency. Every organization handles incident
escalation differently, but analysts need to ensure that
incidents are handled correctly. Great work expanding
your security mindset!
Reading: Escalation timing
Reading
You previously learned about the potential impact even the smallest incident can have on an organization if the incident is not escalated properly. You also discovered just how important your role as an entry-level analyst will be to the effectiveness of an organization’s escalation process.
This reading will go into more detail about the role you’ll play in protecting an organization’s data and assets when it comes to escalating incidents.
Your decisions matter
Security is a fast-paced environment with bad actors constantly trying to compromise an organization’s systems and data. This means security analysts must be prepared to make daily decisions to help keep a company’s data and systems safe. Entry-level security analysts help the security team escalate potential security incidents to the right team members. A big part of your role as a security analyst will be making decisions about which security events to escalate before they become major security incidents.
Trust your instincts and ask questions
Confidence is an important attribute for a security analyst to have, especially when it comes to the escalation process. The security team will depend on you to be confident in your decision-making. You should be intentional about learning the organization’s escalation policy. This will help you gain confidence in making the right decisions when it comes to escalating security events. But remember to ask questions when necessary. It shows that you’re committed to constantly learning the right way to do your job.
All security events are not equal
An important part of escalation is recognizing which assets and data are the most important for your organization. You can determine this information by reading through your onboarding materials, asking your supervisor directly about which assets and data are most important, and reviewing your company’s security policies. When you have that type of understanding, it allows you to recognize when one incident should be given a higher priority over others. You previously learned about the following incident classification types:
- Malware infections: Occur when malicious software designed to disrupt a system infiltrates an organization’s computers or network
- Unauthorized access: Occurs when an individual gains digital or physical access to a system, data, or application without permission
- Improper usage: Occurs when an employee of an organization violates the organization’s acceptable use policies
Identifying a specific incident type allows you to properly prioritize and quickly escalate those incidents. Remember, an incident which directly impacts assets that are essential to business operations should always take priority over incidents that do not directly impact business operations. For example, an incident where unauthorized access has been gained to a manufacturing application should take priority over an incident where malware has infected a legacy system that does not impact business operations. As you gain experience in the cybersecurity field, you will learn how to quickly assess the priority levels of incident types.
Quick escalation tips
A big part of your role in cybersecurity will be determining when to escalate a security event. Here are a few tips to help with this:
- Familiarize yourself with the escalation policy of the organization you work for.
- Follow the policy at all times.
- Ask questions.
Key takeaways
Incident escalation will be an important part of your role within a security team. Entry-level analysts are expected to identify and escalate incidents related to their daily work. Reading and understanding your organization’s escalation policy will be helpful in this responsibility. The escalation policy will describe how and to whom you should escalate incidents. When in doubt, never be afraid to ask a supervisor about the escalation process. This will help you stay knowledgeable about your job and make informed decisions.
Reading: Juliana’s story: Attention to detail
Reading
This is the second reading in the scenario about Juliana Soto, a cybersecurity analyst who was recently hired by Right-On-Time Payment Solutions. In the reading about asset protection, Juliana identified important assets to her organization and came up with a plan for how to protect them. In this reading, you will review how Juliana used her company’s escalation policy and her attention to detail to deal with security issues she encountered on the job.
Focus on the details
As she prepares to go into the office this morning, Juliana reflects on the previous day’s accomplishments:
- Read through company information to learn about the most important assets she is tasked with protecting
- Learned that her company deals with PII data from customers
- Put together an information security lifecycle strategy for the organization’s data
- Began monitoring security systems on her work laptop
It was an exciting first day full of new information for Juliana! She wonders what today will bring.
Juliana is at her desk monitoring data logs and responding to emails. Suddenly, her system alerts her of suspicious log activity. It appears that an employee’s account has been locked due to 10 failed login attempts. She finds this concerning because the escalation policy states that 10 failed login attempts should be escalated to the password protection team.
Juliana is excited about her first chance to escalate a security event. As she prepares to go through the escalation process, she is suddenly alerted to another event that has happened. She clicks on the alert and learns that an unknown source has attempted to compromise a system that stores bank account information for the company’s customers. She views this as a major concern. She recalls the importance of sensitive financial information from her previous security training. She learned the previous day that her company stores a large amount of sensitive customer data. Hundreds of customers will be impacted if a system storing this kind of important data is compromised.
Juliana decides that the unknown source attempting to compromise the system that stores the bank information of customers is the more urgent of the two events and needs to be handled immediately. She references the company’s escalation policy to find the best way to handle the escalation process for this type of incident.
Juliana carefully follows the process outlined in the escalation policy, making sure to be attentive to all of the details in the process. This allows her to notify the appropriate team members of what has happened. She completes all the steps outlined in the escalation policy for an event dealing with customer PII.
Next, she decides to escalate the lower-priority event. Once again, she follows the company guidelines to escalate that event.
Juliana’s supervisor is impressed with her initiative and ability to follow the escalation guidelines. Juliana is off to a great start in her security career!
Key takeaways
Attention to detail is important for an entry-level security analyst. It helps the analyst monitor data logs and effectively follow an escalation policy. It’s also critical for the analyst to recognize what assets are most important to an organization. This helps the analyst prioritize how quickly certain incidents should be escalated.
Practice Quiz: Test your knowledge: Timing is everything
All security incidents should be equally prioritized.
False
Not all security incidents should be equally prioritized. Incidents that impact assets essential to business operations should take priority over other incidents.
You’ve recently been hired as a cybersecurity analyst for an office supply organization. Which incident can have the most impact on the organization’s operations?
The organization’s manufacturing network is compromised
A manufacturing network is a major part of an organization’s business operations. If it is compromised, it can lead to major financial loss.
Fill in the blank: A(n) _____ is a set of actions that outlines who should be notified when an incident alert occurs and how that incident should be handled.
escalation policy
An escalation policy is a set of actions that outlines who should be notified when an incident alert occurs and how that incident should be handled.
Which incident classification type occurs when an employee violates an organization’s acceptable use policy?
Improper usage
The improper usage incident classification type occurs when an employee violates the organization’s acceptable use policy.
Review: Escalate incidents
Video: Wrap-up
Reviewing the Essentials of Incident Escalation:
Recap:
- Incident Escalation Defined: Identifying, assessing, and transferring potential security threats to the appropriate authority within the security organization.
- Essential Skills: Attention to detail, understanding escalation guidelines, clear communication.
- Incident Classification: Malware infections, unauthorized access, improper usage, each with varying urgency and impact.
- Domino Effect: Unaddressed incidents, even minor ones, can snowball into significant breaches and disruptions.
- Escalation Guidelines: Each organization has its own process, familiarity and proper procedure are crucial.
- Key Takeaway: Attention to detail in understanding incident impact and following escalation protocols is vital for effective security response.
Moving Forward:
- Stakeholder Communication: Learn how to effectively communicate incident details and updates to various stakeholders within the organization.
Overall: This section emphasized the importance of responsible incident escalation as a cornerstone of effective security response, highlighting the value of careful assessment, adhering to organizational guidelines, and clear communication throughout the process.
Now you’ve had an opportunity to learn
about the essential role you’ll be playing by escalating incidents. Let’s review what we covered
in this section of the course. We started off by defining
incident escalation and discussing useful traits needed
to properly escalate incidents. We also explored a few incident
classification types and their potential impacts to an organization. From there, we discussed how small
security incidents can become bigger problems if not properly addressed. Finally, we covered some
general guidelines for the actual process of incident escalation. This process varies depending on
the organization you work for, but one thing should always remain
the same: Your attention to detail! Understanding how each
incident affects the data and assets of an organization
is really important, because the decisions you make can affect
the entire security team and organization. Are you ready to continue
your security journey?! Coming up we’ll discuss stakeholders and
how to communicate effectively with them.
Reading: Glossary terms from module 2
Terms and definitions from Course 8, Module 2
Data controller: A person that determines the procedure and purpose for processing data
Data processor: A person that is responsible for processing data on behalf of the data controller
Data protection officer (DPO): An individual that is responsible for monitoring the compliance of an organization’s data protection procedures
Escalation policy: A set of actions that outlines who should be notified when an incident alert occurs and how that incident should be handled
Improper usage: An incident type that occurs when an employee of an organization violates the organization’s acceptable use policies
Incident escalation: The process of identifying a potential security incident, triaging it, and handing it off to a more experienced team member
Malware infection: An incident type that occurs when malicious software designed to disrupt a system infiltrates an organization’s computers or network
Unauthorized access: An incident type that occurs when an individual gains digital or physical access to a system or an application without permission
Quiz: Module 2 challenge
What security term describes the identification of a potential security event, triaging it, and handing it off to a more experienced team member?
Incident escalation
Which skills will help you identify security incidents that need to be escalated? Select two answers.
Attention to detail. Ability to follow an organization’s escalation guidelines or processes
As a security analyst, you might be asked to escalate various incidents. Which of the following are common incident classification types? Select two answers.
Unauthorized access. Malware infection
Improper usage can be intentional; other times it can be accidental. How should you decide which acts of improper usage should be escalated to a supervisor?
Improper usage incidents should always be escalated as a precaution.
Fill in the blank: Security incidents involving the PII of customers should be escalated with a ____ level of urgency compared to incidents that do not involve customer PII.
higher
A security analyst for an organization notices unusual log activity in an app that was recently banned from the organization. However, the analyst forgets to escalate this activity to the proper personnel. What potential impact can this small incident have on the organization?
It can become a bigger threat.
Fill in the blank: An escalation policy is a set of actions that outlines _____.
how to handle a security incident alert
Why is it important for analysts to follow a company’s escalation policy? Select two answers.
- An escalation policy instructs analysts on the right person to contact during an incident.
- An escalation policy can help analysts prioritize which security events need to be escalated with more or less urgency.
Fill in the blank: An entry-level analyst helps the security team make sure the _____ person on the team is alerted when incidents occur.
correct
Which of the following security incidents is likely to have the most negative impact on an organization?
Unauthorized access to a manufacturing application