IT-Sicherheitsvorfall/IT-Notfall | A-Z | Kontakt/Beratung
The measures listed should be carried out by IT specialists. Measures taken and results of the incident analysis must be documented and communicated to the ISB/RUB Cert team.
An infected system must not be operated on the RUB network!
Information on continued operation or resumption can be found under the following points Data recovery, Elimination, Forensics.
The entire process of incident analysis and handling must be documented (see Documentation).
Informing superiors about the security incident
Even if findings are available, there is no guarantee that all unauthorised modifications can be identified and automatically corrected.
Data recovery must be carried out by IT specialists..
When you have finished all the steps, send the the complete set of documents to the ISB/RUB-Cert team (Email Contact).
The entire incident analysis and handling process must be documented for each asset.
To be documented by IT support:
The measures for elimination must be carried out by IT specialists. They should be chosen in relation to the type of finding.
If the finding suggests an APT actor, the system's motherboard and internal disks should be subjected to a forensic investigation (see Forensik). If forensics are not to be carried out, the motherboard and disks must be disposed of and replaced with new components.
If there are no strong indications of an APT actor, the motherboard firmware should be renewed and the internal disks of the system completely erased. This can be done using low-level format programmes or by completely overwriting the disks with random numbers, including any host-protected areas.
Whether a forensic investigation must or should be carried out on an infected system at RUB is determined by the Information Security office and RUB-Cert. The decision depends on the initial report of findings by IT support and the nature and severity of the incident.
External service providers are called in for a forensic investigation. In this case, the infected system should not be shut down. At the very least, firmware and disks must not be deleted, overwritten or even disposed of.
However, normally, no forensic investigation is carried out on individual infected workstation systems.
In any case, the infected system must be disconnected from the RUB network and no longer used!