We finally managed to publish our great new (in fact, refreshed) document on preparing for incident response, “How to Implement a Computer Security Incident Response Program”.
Some interesting pieces from this guidance document:
Organizations that practice their incident response program find gaps and areas for improvement. Certain exercises also make the computer security incident response team (CSIRT) more comfortable and better equipped when an incident occurs.
Include all the locations and services where your assets and data reside in the plan. This includes SaaS and company-controlled cloud assets. Many high-profile breaches involve elements outside the organization’s perimeter
Detections that must be addressed are inevitable. Organizations are often forced into a response mode by attackers and third-party breach notifications.
As usual, we are always looking for detailed feedback on our papers. Feel free to drop some comments here if you read the doc.