说明:收录25万 73个行业的国家标准 支持批量下载
TLP:WHITE m o c . 5 b u h t i g Cybersecurity Incident & Vulnerability Response Playbooks Operational Procedures for Planning and Conducting Cybersecurity Incident and Vulnerability Response Activities in FCEB Information Systems Publication: November 2021 Cybersecurity and Infrastructure Security Agency DISCLAIMER: This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol, see https://www.cisa.gov/tlp/. TLP:WHITE TLP:WHITE CONTENTS Introduction ............................................................................................................................................ 3 Overview ............................................................................................................................................ 3 Scope ................................................................................................................................................. 3 Audience ............................................................................................................................................ 4 Incident Response Playbook .................................................................................................................. 5 Incident Response Process ................................................................................................................ 5 Preparation Phase.............................................................................................................................. 6 Detection & Analysis ........................................................................................................................ 10 Containment ..................................................................................................................................... 14 m o Eradication & Recovery .................................................................................................................... 15 Post-Incident Activities ..................................................................................................................... 16 c . 5 Coordination ..................................................................................................................................... 17 Vulnerability Response Playbook ......................................................................................................... 21 Preparation....................................................................................................................................... 21 b u Vulnerability Response Process ....................................................................................................... 22 Identification ..................................................................................................................................... 22 h t i g Evaluation ........................................................................................................................................ 23 Remediation ..................................................................................................................................... 24 Reporting and Notification ................................................................................................................ 24 Appendix A: Key Terms ....................................................................................................................... 25 Appendix B: Incident Response Checklist ............................................................................................ 27 Appendix C: Incident Response Preparation Checklist ........................................................................ 35 Appendix E: Vulnerability and Incident Categories ............................................................................... 38 Appendix F: Source Text...................................................................................................................... 39 Appendix G: Whole-of-Government Roles and Responsibilities ........................................................... 41 TLP:WHITE CISA | Cybersecurity and Infrastructure Security Agency 2 TLP:WHITE INTRODUCTIO

pdf文档 Federal Government Cybersecurity Incident and Vulnerability Response Playbooks 英文版

文档预览
中文文档 43 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共43页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
Federal Government Cybersecurity Incident and Vulnerability Response Playbooks 英文版 第 1 页 Federal Government Cybersecurity Incident and Vulnerability Response Playbooks 英文版 第 2 页 Federal Government Cybersecurity Incident and Vulnerability Response Playbooks 英文版 第 3 页
下载文档到电脑,方便使用
本文档由 路人甲 于 2022-07-02 03:14:55上传分享
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。