Digital Leaders Exchange January 2024
NCDPI K-12 Cybersecurity Program
PSU Incident Response
Timothy Wease, NCDPI
Jason Shirley, MCNC�
https://sci.fi.ncsu.edu/cybersecurity/
January 29 - February 1, 2024
Agenda
2
NCDPI K-12 Cybersecurity Program Overview
3
Cybersecurity Program Purpose and Goal
NCDPI established the K-12 Cybersecurity Program with a purpose of organizing and aligning business and technical cybersecurity functions holistically across the state so that PSU and NCDPI stakeholders have greater visibility into the people, processes, and technologies deployed and have a measurable way to determine whether those efforts are sufficient and correct for current and future needs.
The goal is to help all PSUs achieve essential cyber hygiene
4
Program Management
The K-12 Cybersecurity Program is composed of cross-functional heterogeneous teams to work on tasks and deliverables of the program.
5
Program Strategy
The K-12 Cybersecurity Program Governance aligns with the following three major components:�
The goal is to help all PSUs achieve essential cyber hygiene
6
Program Services and Resources
7
Program Services and Resources
8
IR Partner Services and Resources
9
Key Program Contact information
Tim Wease
Phone: (984) 236-2269
Email: timothy.wease@dpi.nc.gov
Calendar: Book time with my calendar
Team outreach:
k12cybersecteam@dpi.nc.gov��Program Website:
10
Incident Response Management
11
Incident Response Purpose
Incident response aims to minimize damage, reduce downtime, and restore normal operations as quickly as possible after an incident occurs.
12
PSU Incident Response Toolkit
NCDPI and the K-12 Cybersecurity Program partners have assembled an IR Toolkit that includes four essential components to equip PSUs with the tools and knowledge to effectively detect, respond to, and recover from cyber incidents.�
13
Incident Response Plan
14
Incident Response Plan - Elements
15
Incident Response IT Roles & Responsibilities
IR Team Leader (IR Team Administrator Delegate)
IR Team Lead Investigator
16
Incident Response Procedures
17
Incident Response Procedures
Reporting Process for NCDIT
Compromise Questionnaire
18
Incident Response Procedures
IR Network and System Inventory
IR Handling Checklist
19
Incident Response Procedures
Communication and Coordination
IR Investigation Ledger
20
Incident Response Procedures
Evidence Preservation and Safeguarding
IR Reporting Elements
21
Incident Response Procedures
Lessons Learned Checklist
22
Tabletop Exercise
Free TTX Resources in IR Plan Template - Appendix B
23
Incident Response Playbook
24
Ransomware Playbook
DESCRIPTION
Ransomware is malware that encrypts a user or organization’s data denying access to files, databases, or applications until a ransom is paid (typically paid using a form of e-currency, e.g. Bitcoin). A ransomware incident will have the following characteristics:
25
Ransomware Playbook
26
PREPARATION
Cyber Hygiene Safeguards
Ransomware Playbook
27
DETECTION
Ransomware
Confirmed
Activate CIRT
Notify PSU Leadership
Notify NCDPI, NCDIT, JCTF
Notify Cyber Insurance
Containment
Ransomware Confirmed
Activate CIRT
Notify PSU Leadership
Ransomware Playbook
28
CONTAINMENT
Identify Affected Hosts
Detection
Identify Affected Hosts
Isolate Affected Hosts
Analysis
Reset Impacted User/Host Credentials
Isolate Affected Hosts
Ransomware Playbook
29
ANALYSIS
Preserve Evidence
Containment
Preserve Evidence
Identify Ransomware Strain
Remediation
Establish Infection Vector
Validate Backup Availability
Identify Ransomware Strain
Ransomware Playbook
30
REMEDIATION
Add IoC to Threat Platform
Analysis
Add IoC to Threat Platform
Run Full Anti-Virus/
Anti-Malware Scan
Recovery
Submit Samples to Vendors
Run Full Anti-Virus/
Anti-Malware Scan
Submit Samples to Vendors
Ransomware Playbook
31
RECOVERY
Restore/
Replace Infected Hosts to Known Good State
Remediation
Restore/
Replace Infected Hosts to Known Good State
Patch Known Vulnerabilities
Incident Postmortem
Restore Affected Files
Patch Known Vulnerabilities
Restore Affected Files
Ransomware Playbook
32
RESPONSE
Detection
Containment
Analysis
Remediation
Recovery
Questions and Answers
k12cybersecteam@dpi.nc.gov
33