CHAIRMAN OF THE JOINT CHIEFS OF STAFF MANUAL J-6 DISTRIBUTION A B C J S CJCSM 6510 01A 24 June 2009 INFORMATION ASSURANCE IA AND COMPUTER NETWORK DEFENSE CND VOLUME I INCIDENT HANDLING PROGRAM References See Enclosure H 1 Purpose This manual describes the DOD Incident Handling Program the major processes that take place within the incident handling program and the interactions with related U S government CND activities The manual provides high-level guidance for implementing the DOD Incident Handling Program 2 Cancellation CJCSM 6510 01 25 March 2003 CH 2 26 January 2006 CH 3 8 March 2006 “Defense-in-Depth Information Assurance IA and Computer Network Defense CND is canceled 3 Applicability This manual applies to the Joint Staff Services combatant commands Defense agencies DOD field activities and joint and combatant activities 4 Procedures See Enclosures A through G 5 Summary a This manual is the first of two volumes and is focused on the DOD Incident Handling Program b The manual will be reviewed and updated as USSTRATCOM incident handling tools and processes are refined and users provide comments over the next 12 months During this 12-month period as new reporting vehicles incident handling tools processes and procedures are identified a draft update to the manual will be coordinated with the Joint Staff Services combatant commands Defense agencies DOD field activities and joint and combatant activities CJCSM 6510 01A 24 June 2009 c Unauthorized DISN Use and Information Security Incidents This manual does not provide guidance on information security incidents related to the protection of classified information Reference a provides guidance on handling and reporting incidents involving the actual or potential compromise of classified information In addition this manual does not provide guidance on unauthorized DISN use that may not be security related Examples of unauthorized DISN use can be found in reference b Further examples of inappropriate use that may be prohibited by C S A or field activity policy can be found in reference c These incidents will be handled and reported IAW with C S A and field activity policies guidance and processes 6 Releasability This manual is approved for public release distribution is unlimited DOD components to include the combatant commands other Federal agencies and the public may obtain copies of this manual through the Internet from the CJCS Directives Home Page--http www dtic mil cjcs_directives 7 Effective Date This manual is effective immediately B E GROOMS RDML USN Vice Director Joint Staff Enclosures A – Incident Handling Program B – Incident Handling Methodology C – Incident Reporting D – Incident Analysis E – Incident Response F – Collaboration with Other Strategic Communities G – CND Incident Handling Tools H – References 2 CJCSM 6510 01A 24 June 2009 DISTRIBUTION Distribution A B C and J plus the following Copies Assistant Secretary of Defense for Networks and Information Integration Chief Information Officer 2 i 6510 01A 24 June 2009 INTENTIONALLY BLANK ii CJCSM 6510 01A 24 June 2009 LIST OF EFFECTIVE PAGES The following is a list of effective pages for Use this list to verify the currency and completeness of the document An O indicates a page in the original document PAGE 1 thru 2 i thru x A-1 thru A-8 B-1 thru B-30 B-A-1 thru B-A-4 C-1 thru C-18 C-A-1 thru C-A-4 C-B-1 thru C-B-6 C-C-1 thru C-C-6 D-1 thru D-24 D-A-1 thru D-A-4 CHANGE O O O O O O O O O O O PAGE D-B-1 thru D-B-2 D-C-1 thru D-C-8 E-1 thru E-16 F-1 thru F-6 F-A-1 thru F-A-4 F-B-1 thru F-B-6 G-1 thru G-6 H-1 thru H-4 GL-1 thru GL-8 iii CHANGE O O O O O O O O O 6510 01A 24 June 2009 INTENTIONALLY BLANK iv CJCSM 6510 01A 24 June 2009 TABLE OF CONTENTS Page ENCLOSURE A INCIDENT HANDLING PROGRAM Introduction A-1 Roles and Responsibilities A-3 CND Overview A-5 CND Services A-6 ENCLOSURE B INCIDENT HANDLING METHODOLOGY Introduction B-1 Incident Handling Process and Life Cycle B-2 Submit Initial Report B-13 Preliminary Response Actions B-14 Incident Analysis B-16 Response and Recovery B-22 Post-Incident Analysis B-25 First Responder Guidelines B-26 APPENDIX A TO ENCLOSURE B INCIDENT AND REPORTABLE EVENT CATEGORIZATION Introduction B-A-1 Categories B-A-1 Comparison of DOD and Department of Homeland Security DHS Categories B-A-3 ENCLOSURE C INCIDENT REPORTING Introduction C-1 Reporting Structures C-3 Operational Reporting Practices C-11 Reporting Vehicles C-12 Reporting Timelines C-14 Reporting Formats C-14 Reporting Considerations C-15 Exercise Reporting C-17 APPENDIX A TO ENCLOSURE C REPORTING TIMELINES Introduction C-A-1 Reporting Timelines C-A-3 APPENDIX B TO ENCLOSURE C GENERAL INCIDENT REPORT FORMAT General Incident Report Format C-B-1 Initial Impact Assessment Matrix C-B-5 v CJCSM 6510 01A 24 June 2009 Page APPENDIX C TO ENCLOSURE C INCIDENT REPORTING DIAGRAMS High-Level Overview of Reporting C-C-1 Event Detected by Installation C-C-2 Event Detected within Combatant Command C-C-3 Event Detected by External CND Group C-C-4 Event Detected by Computer Network Defense Services Provider CNDSP C-C-5 ENCLOSURE D INCIDENT ANALYSIS Introduction D-1 Incident Analysis Framework D-2 Computer Forensics Analysis D-3 System Analysis D-7 Malware Analysis D-10 Network Analysis D-17 Analysis and Correlation of Event and Incident Data D-21 Legal Issues D-21 APPENDIX A TO ENCLOSURE D ATTACK VECTORS Introduction D-A-1 Attack Vector Categories D-A-1 APPENDIX B TO ENCLOSURE D SYSTEM WEAKNESSES Introduction D-B-1 Determining System Weaknesses D-B-1 APPENDIX C TO ENCLOSURE D IMPACT ASSESSMENT MATRIX Impact Assessment D-C-1 Levels of Impact D-C-1 Determining Technical and Operational Impact D-C-2 Incident Impact Table D-C-3 Incident and Event Potential Impact D-C-4 ENCLOSURE E INCIDENT RESPONSE Introduction E-1 Types of Responses E-1 Developing and Implementing Courses of Action COA E-2 Recovering without Performing Technical Analysis E-4 Containment E-4 Eradication E-9 Recovery E-11 Post-Incident Activity E-13 vi CJCSM 6510 01A 24 June 2009 Page ENCLOSURE F COLLABORATION WITH OTHER STRATEGIC COMMUNITIES Introduction F-1 Operational Cooperation with LE CI F-1 International Coordination F-4 Intelligence Community F-5 National Cyber Response Coordination Group NCRCG F-6 APPENDIX A TO ENCLOSURE F COORDINATION AND DECONFLICTION Introduction F-A-1 Types of Operations F-A-1 APPENDIX B TO ENCLOSURE F INTELLIGENCE SUPPORT TO INCIDENT REPORTING Introduction F-B-1 Joint Threat Intelligence Database JTID F-B-1 Intelligence Reporting Procedures F-B-2 Product Dissemination F-B-5 Writing For Release F-B-5 JTF-GNO “Smart Book” F-B-6 ENCLOSURE G CND INCIDENT HANDLING TOOLS CND User-Defined Operational Picture UDOP G-1 Joint CERT Database JCD G-1 Joint Malware Catalog JMC G-2 CND Intelligence Analysis Tools G-2 DOD Protected Traffic List G-3 DOD Enterprise Incident Sets G-3 DOD Network Deception Projects G-4 Information Operations Condition INFOCON G-5 ENCLOSURE H REFERENCES GLOSSARY PART I - ABBREVIATIONS AND ACRONYMS GL-1 PART II - DEFINITIONS GL-5 FIGURES B-1 B-2 B-3 B-4 B-5 B-6 B-7 B-8 Incident Life Cycle B-3 Relationship of Incident Handling Phases B-3 Detection of Event s B-6 Preliminary Analysis and Identification of Incidents B-10 Preliminary Response Actions B-14 Incident Analysis B-17 Response and Recovery B-23 Post-Incident Analysis B-26 vii CJCSM 6510 01A 24 June 2009 C-C-1 C-C-2 C-C-3 C-C-4 C-C-5 D-1 D-2 TABLES A-1 B-1 B-A-1 B-A-2 B-A-2 C-1 C-A-1 C-B-1 C-B-2 D-1 D-A-1 D-C-1 D-C-2 D-C-3 F-B-1 Page High-Level Overview of Reporting C-C-1 Event Detected by Installation C-C-2 Event Detected within Combatant Command C-C-3 Event Detected by External CND Group C-C-4 Event Detected by CNDSP C-C-5 Incident Analysis Relationship to Preserving Data and Recovering Systems D-2 Levels of Depth for Malware Analysis D-12 Computer Network Defense CND Framework A-6 Relationship of Incident Handling Process and Ongoing Supporting Activities B-6 Category Precedence B-A-1 Incident and Reportable Event Categories B-A-2 Comparison of DOD and DHS Incident and Reportable Event Categories B-A-4 Reporting Vehicles C-13 Reporting Timelines C-A-2 General Incident Report Format C-B-1 Initial Impact Assessment C-B-6 Levels of Analysis for Requesting Malware Analysis D-16 Attack Vectors Categories D-A-1 Incident Impact Table D-C-4 Technical Impact Examples D-C-5 Operational Impact Examples D-C-7 NIR Report Format F-B-4 viii CJCSM 6510 01A 24 June 2009 CJCSM 6510 01A Incident Handling Program – Overview of Manual with Hyperlinks Encl A Encl B Encl C Encl D Encl E Incident Handling Program Incident Handling Methodology Incident Reporting Incident Analysis Incident Response Introduction Introduction Introduction Introduction Roles Responsibilities CND Overview Incident Handling Process Life Cycle Submit Initial Report CND Services Preliminary Response Incident Analysis Response Recovery Post Incident Analysis First Responder Guidelines Reporting Structures Operational Reporting Reporting Vehicles Reporting Timelines Reporting Formats Reporting Considerations Exercise Reporting Incident Analysis Framework Computer Forensic Analysis System Analysis Malware Analysis Encl F Strategic Collaboration LECI UDOP Types of Response Operational Cooperation with LE CI Joint CERT Database JCD Developing Implementing COA International Coordination Joint Malware Catalogue JMC Recovery w o Technical Analysis Intelligence Community NCRCG CND Intel Analysis Tools Containment DoD Protected Traffic List Eradication Legal Issues CND IH Tools Introduction Network Analysis Analysis Correlation of Incident Data Encl G DoD Enterprise Incident Sets Recovery Post Incident Activity DoD Network Deception Projects INFOCON Annexes A Incident Categorization A Reporting Timelines A Attack Vectors A Coordination Deconfliction B General Incident Report B System Weaknesses B Intelligence Support C Reporting Diagrams C Impact Assessment Matrix References Glossary Acronyms ix Glossary Definitions 6510 01A 24 June 2009 INTENTIONALLY BLANK CJCSM 6510 01A 24 June 2009 ENCLOSURE A INCIDENT HANDLING PROGRAM 1 Introduction a Purpose 1 The Department of Defense maintains a comprehensive incidenthandling program 2 This program will ensure an integrated capability to continually improve the Department of Defense’s ability to rapidly identify and respond to incidents that adversely affect the Department of Defense’s systems and networks It will do so in a way that is consistent repeatable quality driven measurable and understood broadly across DOD organizations 3 This enclosure provides guidance and methodology for establishing operating and maintaining a robust DOD incident handling capability for routine response to information system security events and incidents within the Department of Defense Additional guidance for incident handling for a crisis or in case of active hostilities will be issued by USSTRATCOM Joint Task Force-Global Network Operations JTF-GNO as required b Background 1 DOD networks face a full range of internet threats including advanced and persistent threats that can evade commercially available security tools and defeat generic security best practices 2 In this dynamic environment it is critical that those responsible for building operating defending maintaining and ensuring the continuity of these systems and networks maintain a unified and resilient capability to minimize the impact of these threats on mission operations This capability must be able to adapt over time to changes in the threat environment 3 The threat from adversaries to DOD information adversely affects the Department of Defense’s ability to maintain current and future warfighting capabilities 4 This threat also severely hinders the ability to maintain a high level of confidence in net-centric operations relied upon by all levels of personnel from generals to Soldiers on the ground A-1 Enclosure A CJCSM 6510 01A 24 June 2009 5 While this threat cannot be completely eliminated and will likely evolve over time it is crucial to maintain a proactive progressive and coordinated approach to detecting and responding to events and incidents that can adversely affect DOD networks and systems This coordinated approach to incident handling will improve the overall DOD CND and IA posture and in turn improve the security of the DOD Global Information Grid GIG 6 Federal guidance mandates establishment of an incident response capability Reference e requires federal agencies to have in place incident detection and reporting mechanisms Appendix III to reference f directs agencies to establish formal incident response mechanisms 7 Reference g requires CND Service Providers CNDSPs to provide three CND services 1 Protect 2 Monitor Analyze and Detect and 3 Respond a These services must be sustained at an acceptable level of quality for their subscribers b In the past the Department of Defense has assigned responsibility for managing incidents to each combatant command Service Agency C S A and field activity Each identified its own techniques and processes with USSTRATCOM having oversight and providing higher guidance The different techniques and processes complicated the ability to assess the impact of incidents across the Department of Defense in a timely manner 8 To address these issues the Department of Defense developed the Incident Handling Program to provide specific guidance for C S As and field activities regarding the requirements for incident handling and reporting c Scope 1 The Department of Defense is a global presence composed of multiple agencies organizations and functions that must coordinate manage and respond to information and technology threats attacks and incidents – any of which without proper controls to protect detect and manage the effects of could adversely affect DOD systems and networks It is therefore critical that appropriate guidance be developed and disseminated to C S As and field activities responsible for effectively and efficiently managing these systems and networks 2 It is the responsibility of the network defenders to ensure the security of computing and communication systems for executing successful military operations and to maintain the integrity of information within the cyber domain and throughout the Department of Defense A-2 Enclosure A CJCSM 6510 01A 24 June 2009 3 This enclosure provides overarching guidance that fosters a shared and thorough understanding of how the Department of Defense’s global regional and local organizations coordinate efforts to positively affect response actions 4 Effective response requires consistent and complete end-to-end reporting using a framework that enables tactical and strategic analytical functions These functions help to characterize the threat environment and support development and implementation of effective countermeasures to protect and defend the GIG Maintaining the availability confidentiality and integrity of the GIG to support DOD operations is critical for national security 5 Guidance contained herein will cover the high-level procedures related to the Protect Monitor Analyze and Detect and Respond phases of the CND lifecycle It will describe the policies and processes required to operate a comprehensive DOD incident-handling program More specific guidance tailored for the individual requirements of C S As and field activities will be provided through operational orders OPORDs or similar command authority directives This document is a framework that will be used by DOD entities and individuals to provide a unified approach to incident handling to enable effective collaboration between and across DOD distributed organizations in a way that improves the Department of Defense’s ability to protect and defend the GIG 2 Roles and Responsibilities a Joint Staff combatant commands Services Defense agencies DOD field activities and joint activities will 1 Comply with the DOD Incident Handling Program responsibilities in accordance with IAW reference g and reference d 2 Document and report reportable events and incidents IAW this manual 3 Ensure CNDSPs are established or appointed to provide CND Services for C S A or field activity information systems 4 Coordinate horizontally and vertically with appropriate organizations e g Tier 1 2 3 law enforcement counterintelligence LE CI and intelligence community IC for incidents 5 Comply with directives including but not limited to operation orders and communication tasking orders CTOs A-3 Enclosure A CJCSM 6510 01A 24 June 2009 6 Include requirements to comply with all portions of this program and stipulate its enforcement within DOD information technology IT service contracts C S As and field activity vendors contractors and suppliers must comply with the procedures contained within this document 7 Coordinate with USSTRATCOM JTF-GNO on incidents prior to coordinating or taking action outside of the Department of Defense 8 Coordinate with appropriate DOD agency centers on incidents involving intelligence systems prior to coordinating or taking actions outside the Department of Defense consistent with Enclosure F b USSTRATCOM will 1 Plan and execute operations to defend DOD computer networks or other vital national security interests as directed by the Secretary of Defense against any unauthorized computer network intrusions or attacks 2 Issue incident or reportable event response orders and alerts through JTF-GNO to the C S As and field activities 3 Coordinate with the IC Incident Response Center IC-IRC which operates under the authority of the IC chief information officer CIO on matters relating to the governance secure operations and defense of the IC networks 4 Coordinate with the Department of Homeland Security DHS and other federal agencies for incidents related to cyberspace involving the Department of Defense As appropriate notify and or coordinate with the United States Computer Emergency Readiness Team US-CERT on cyberspace incidents 5 Coordinate with USNORTHCOM for incidents that involve the DHS and other federal agencies where Defense Support of Civil Authorities is involved 6 Maintain and disseminate DOD intrusion detection system IDS signature sets for DOD level sensors Tier 1 and provide necessary threat information to assist Tier 2 and Tier 3 CNDSP organizations developing IDS signature sets for their sensors 7 Provide reports summaries significant incidents trends Enterprise-wide issues to Office of the Secretary of Defense OSD through Joint Staff and C S As and field activities as necessary A-4 Enclosure A CJCSM 6510 01A 24 June 2009 3 CND Overview a Incident Handling Program The DOD Incident Handling Program is a component of the overall CND strategy for the Department of Defense In accordance with reference g the Incident Handling Program aligns with the three services of CND 1 Protect 2 Monitor Analyze and Detect 3 Respond b Incident Handling Incidents must be coordinated among and across DOD organizations and sources outside the Department of Defense such as LE CI IC and defense industrial base DIB partners to protect the interests of national security Where applicable this document attempts to draw relationships among these services to foster a common understanding of the process by everyone responsible for directing and coordinating incident response efforts c CND Framework 1 CND are the actions taken within the Department of Defense to protect monitor analyze detect and respond to unauthorized activity within DOD information systems ISs and computer networks CND protection activity employs IA principals and includes deliberate actions taken to modify an assurance configuration or condition in response to a CND alert or threat information 2 The Department of Defense is organized into three tiers to conduct CND a Tier One Global This tier provides DOD-wide CND operational direction or support to C S As and field activities Tier One entities include USSTRATCOM and supporting entities such as the JTF-GNO Defense Criminal Investigative Organization DCIO JTF-GNO Law Enforcement and Counterintelligence Center JTF-GNO LECIC and the National Security Agency Central Security Service Threat Operations Center NTOC b Tier Two Regional Theater Tier Two provides DOD component-wide operational direction or support and responds to direction from Tier One Tier Two includes C S A and field activity CNDSPs designated by heads of components to coordinate component-wide CND A-5 Enclosure A CJCSM 6510 01A 24 June 2009 c Tier Three Local Tier Three provides local operational direction or support and responds to direction from a designated Tier Two entity Tier Three includes bases posts camps stations and all entities responding to direction from a C S A or field activity Tier Two CNDSP e g manage and control ISs networks and services either deployed or fixed at DOD Installations 4 CND Services As defined in reference g there are three primary CND Services Protect Monitor Analyze and Detect and Respond a These services define actions employed to prevent or lessen computer network attacks that may disrupt deny degrade destroy exploit allow unauthorized access to or facilitate information theft from computer networks ISs or their contents A fourth area Capability Sustainment reflects actions that the component or its designated CNDSP must perform to ensure services are provided C S As and field activities must acquire these CND services through service relationships with CNDSPs The CND Services are enumerated and illustrated in the CND Framework below Table A-1 – Computer Network Defense CND Framework Table A-1 – Computer Network Defense CND Framework A-6 Enclosure A CJCSM 6510 01A 24 June 2009 b CND Protect Services 1 CND protection services include the management of DOD’s Information Operations Condition INFOCON system and actions taken to create or enhance an IS computer network configuration or assurance posture in response to a CND alert or threat 2 Protect services are often proactive e g Red teaming subscriber protection and training and may or may not result from an incident c CND Monitor Analyze and Detect Services 1 CND Monitor Analyze and Detect Services provide CND situational awareness attack sensing and warning and indications and warning 2 Multiple communities within the Department of Defense e g network operations CND Services intelligence CI and LE contribute to situational awareness 3 Attack Sensing and Warning AS W data gives Department of Defense the ability to sense changes in DOD global information and computer networks AS W includes the detection correlation identification and characterization of a large spectrum of intentional unauthorized activity including computer intrusion or attack It couples this with the notification to command and decision-makers so they can develop an appropriate response AS W is enabled through a managed network of intrusion misuse and anomaly detection systems supporting data fusion and analysis diagnostics long-term trend and pattern analysis and warning communications channels and procedures 4 Indications and Warning I W data gives DOD the ability to sense changes in adversary activities I W includes those intelligence activities intended to detect and report time-sensitive intelligence information on foreign developments that could involve a threat to the United States or allied military political or economic interests or to U S citizens abroad The intelligence community provides indications and warning for foreign threats from national states and transnational groups 5 The LE community investigates criminal activity and disseminates threat data that may pertain to domestic or foreign individuals and groups who constitute threats to Department of Defense The CI community conducts investigations collections operations functional services and analysis which may result in the dissemination of threat data relative to information gathered and cyber activities conducted to protect against espionage other intelligence activities sabotage or assassinations by or on the behalf of foreign governments or elements thereof Foreign Intelligence and Security Services A-7 Enclosure A CJCSM 6510 01A 24 June 2009 FISS foreign organizations foreign persons or international terrorist activities d CND Respond Services 1 CND Response includes the actions taken to report analyze coordinate and respond to any event or computer security incident for the purpose of mitigating any adverse operational or technical impact 2 Incident Reporting includes a well-defined framework for the timely reporting of any event or computer security incident The report provides an accurate meaningful and complete understanding of the incident from initial detection to analysis and remediation This information feeds into the UserDefined Operational Picture UDOP which provides local intermediate and DOD-wide situational awareness of CND actions and their impact 3 Incident Analysis identifies several critical elements of an incident to determine and characterize its possible effects on DOD networks operational missions and other defense programs This activity relies on effective acquisition preservation and timely reporting of incident data 4 Incident Response includes the coordinated development and implementation of courses of action COAs that focus on containment eradication and recovery At the same time it ensures the acquisition and preservation of data required for tactical analysis strategic analysis and or LE investigations A-8 Enclosure A CJCSM 6510 01A 24 June 2009 ENCLOSURE B INCIDENT HANDLING METHODOLOGY 1 Introduction a The methodology described in this section provides a general standardized process that establishes the intent and requirements for detecting analyzing and responding to information or technology events or incidents for the purpose of mitigating any adverse operational or technical impact on DOD critical data assets systems and networks b An effective incident handling capability relies on disciplined processes procedures and systems These must communicate timely accurate and accessible information about the incident's cause impact and current situation to incident responders command authorities and others involved in directing incident response actions c Given the diverse highly distributed and complex environment in which the Department of Defense operates the means by which C S As and field activities implement this methodology may vary depending on the resources technical capabilities and local policies procedures provided by the command authority d It is the expectation that C S As and field activities will implement and institutionalize the guidance procedures and policies described in this methodology in a way that yields the intended results as described throughout and sustains the global regional and local capabilities necessary to maintain and operate a robust and effective incident handling program e The primary objectives of the incident handling process are to 1 Maintain a robust detection capability to ensure all suspicious activity is detected and reported so that further analysis can take place to determine if it is a reportable event or incident 2 Ensure the timely reporting of incidents through appropriate technical and operational channels in a way that provides an accurate meaningful and complete understanding of the incident throughout its life cycle B-1 Enclosure B CJCSM 6510 01A 24 June 2009 3 Effectively contain events and incidents and isolate systems to minimize any damage or impact resulting on DOD systems networks data and services 4 Safely acquire and preserve the integrity of data required for incident analysis to help determine the technical operational impact root cause s scope and nature of the event or incident 5 Ensure the effective coordination and communication of incident information through appropriate channels and with appropriate stakeholders higher CND organizations and or C S A and field activity headquarters HQ 6 Provide an effective and comprehensive response that includes the recovery of any affected systems and the return to a fully functioning secure operational state for all services and systems 7 Identify lessons learned to help improve infrastructure component protection strategies and incident handling procedures to prevent a reoccurrence of the event or incident 8 Understand patterns of activity and trends to characterize the threat and direct protective and defensive strategies f All Tiers must cooperate with each other and other organizations when appropriate This cooperation is critical to sustaining a robust incident handling capability 1 The quality timeliness and consistency of reporting across all the Tiers do much to determine the overall effectiveness of DOD incident handling 2 Effective reporting practices ensure the availability of valuable data to help military-decision making and shape tactical and strategic response actions 3 Incident response requires coordination across various C S As and field activities and is similar to coordination for other military operations 4 Sometimes intelligence and technical information may come from sources unique to the CND environment including sources outside the Department of Defense Consequently extensive coordination with the USCERT LE CI organizations the IC and industry partners can be required B-2 Enclosure B CJCSM 6510 01A 24 June 2009 2 Incident Handling Process and Life Cycle a The basic process for DOD incident handling can be grouped into the following processes or phases 1 Detection of events 2 Preliminary analysis and identification of incidents 3 Preliminary response actions 4 Incident analysis 5 Response and recovery 6 Post-incident analysis g Figure B-1 illustrates the relationship of each phase to other lifecycle phases The lifecycle is circular What is learned throughout the process can be leveraged to improve the state of the practice in defending against future attacks However many of these activities can happen in parallel or can occur simultaneously Figure B- 2 illustrates how these activities overlap with each other Figure B-1 Incident Life Cycle B-3 Enclosure B CJCSM 6510 01A 24 June 2009 Figure B-2 Relationship of Incident Handling Phases h Several supporting activities cross any one stage in the life cycle 1 Reporting and Notification a Those responsible for incident handling activities must constantly refine their ability to assess an incident as it unfolds handle the information appropriately e g within security legal and investigative contexts and rapidly provide accurate and accessible information to militarydecision makers b This includes the submission of the initial incident report and any updates that result from analysis or response actions taken This also includes any notification to other CND organizations HQ and stakeholders c Reporting and notification happen throughout the entire incident handling process rather than just one time As more information is obtained or learned it is passed on to relevant stakeholders 2 Documentation a This is not limited to the initial documentation of the incident in an incident reporting form as a submission to the Joint CERT Database JCD but also includes documentation of additional information gathered during B-4 Enclosure B CJCSM 6510 01A 24 June 2009 analysis and response The primary vehicle for reporting and recording all incidents and reportable events is the JCD b Any response actions taken may also be part of this documentation including preliminary response actions first responder actions or actions taken to preserve and protect incident artifacts evidence or chain of custody 3 Coordination This includes coordination between C S As and field activities and other stakeholders to a Gather information such as log and artifact collection b Share information such as situational awareness and intelligence information c Plan and implement response strategies across affected components i Table B-1 presents the relationship between the ongoing support activities and the basic phases of incident handling 1 These activities are part of an iterative and ongoing process They are required when there are changes to the status of activity reportable events incidents and continue throughout the incident handling lifecycle 2 The incident handling lifecycle shares similar characteristics with a business and military strategy known as the Observe Orient Decide and Act OODA Loop a Observe Monitor and detect anomalous or suspicious activity within DOD networks and systems b Orient Collect validate and analyze information available about an incident to characterize the perceived threat and identify with confidence the nature scope root cause s and potential impact of an incident c Decide Based on the available information identify the necessary courses of action required to contain the incident eradicate the risk and recover from the incident d Act Execute the courses of action required to resolve and close the incident and subsequently perform a postmortem As with military combat the goal is to be more effective and quicker to execute defensive actions than the adversary is able to attack The following sections discuss the B-5 Enclosure B CJCSM 6510 01A 24 June 2009 incident handling process and activities in more depth Although they are presented in a logical sequential order during the lifecycle of an incident they may be done repetitively in parallel or sequentially depending on the requirements of the incident Reporting and Notification Detection of Events Preliminary Analysis and Identification Submission of report of events of interest Submission of initial incident report Documentation Initial documentation of event activity If no documentation has been started initial documentation should occur here Documentation of any actions taken Preliminary Response Action Update of actions taken Incident Analysis More detailed updates of analysis performed Documentation of analysis results Response and Recovery Updates on actions taken and submission of final report for closure Documentation of response plan analysis performed and COAs Post-Incident Analysis Submission of Post-Incident Analysis report Documentation of lesions learned and resulting improvement plan Coordination Global information sharing and gathering between tiers with other CND components LE CI or IC Coordination to identify additional sources of information and artifacts Coordination of technical and organizational steps taken to implement preliminary actions across all affected C S As Coordination of incident analysis activities between CND and technical and management components and internal external subject matter experts Coordination of response actions between C S As and field activities CNDSPs Installations and CND Service subscribers and with LE CI and IC and others as required Coordination between DOD components to implement any process improvement activities resulting from post-incident analysis Table B-1 Relationship of Incident Handling Process and Ongoing Supporting Activities j Detection of Events 1 Detection of events is the continuous process of identifying any unusual network or system activity that has the potential to adversely affect DOD systems networks or operational missions B-6 Enclosure B CJCSM 6510 01A 24 June 2009 Figure B-3 Detection of Event s 2 The primary objectives for detecting events include a Ensuring all suspicious activity is detected and reported so that further analysis can take place to determine if it is a reportable event or incident b Ensuring suspicious activity is reported in a timely manner consistent with required reporting timelines c Effectively coordinating with command channels and other DOD organizations 3 As part of this process information about potential incidents vulnerabilities or other computer security or incident information is gathered and reported to the appropriate area for analysis and response This process is important because it is the point where an anomalous or unusual event is first noticed and identified as something that must be reviewed It may also be the first point at which an event is reported 4 Detection starts the reporting process Gathering report information in a database helps analysts identify emerging trends and patterns This knowledge can help the C S As and field activities learn from ongoing activity and incidents so they can properly secure and defend their infrastructures 5 Detecting Events a For proper detection to take place guidelines must be established defining what is abnormal or suspicious This information must be passed on to appropriate network and system administrators or incorporated into the configuration of automated detection systems b Without the detection process C S As field activities and CNDSPs would not be alerted that something must be checked or resolved If this does not happen in a timely standard consistent manner it is possible B-7 Enclosure B CJCSM 6510 01A 24 June 2009 that a serious incident will not be properly reported and significant damage and loss for the component infrastructure can occur c Detection of an event may occur in various ways including by 1 An automated detection system or sensor 2 A report from an individual or user 3 An incident report or situational awareness update from other internal or external organizational components such as other CNDSPs JTF-GNO US-CERT IC LE CI or other external Computer Security Incident Response Team CSIRT entities d Because different methods may detect events initial event detail can vary Alerts from automated detection systems might include more specific details than a report from a non-technical user Additional information may need to be collected as part of the incident analysis phase e Examples of events and the various ways they are detected are provided below 1 The network intrusion detection sensor sends alerts for suspicious network traffic 2 The antivirus AV software alerts that a device is infected with a worm virus or other form of malicious logic 3 A Web server crashes 4 Users complain of slow access to hosts on the Internet or mail servers 5 The system administrator sees a filename with unusual characters message 6 The user calls the helpdesk to report a threatening e-mail 7 The system records a suspicious configuration change in its log 8 A system logs multiple failed login attempts from an unfamiliar remote system B-8 Enclosure B CJCSM 6510 01A 24 June 2009 9 The e-mail administrator sees a large number of e-mails with suspicious content 10 The network administrator notices deviation from typical network traffic flows 11 The firewall administrator may see unauthorized outbound connections not seen by other means f An event is not determined to be an incident until some preliminary analysis is done to assess and validate the event against the criteria for determining if it is an incident g If it is a reportable event or confirmed incident it is categorized and the incident handling process should be followed 6 Detecting Events Methodology a Detect event Identify suspicious behavior or events of interest A person or an automated system may detect events b Event detected by a person 1 If an event is something witnessed by a user or an administrator that person must report the information to their designated point of contact POC This might be a helpdesk a CNDSP or a local system and network administrator 1 The report can be submitted by phone e-mail reporting form or some other identified mechanism as identified in Enclosure C or based on the guidance distributed within the affected component 1 C S As and field activities must ensure that DOD personnel within their area of responsibility AOR know what type of activity constitutes an incident and also where and how to submit information about suspicious activity including reportable events and incidents c Event detected by an automated system 1 If the event is detected by an automated system an alert will be sent to the POC designated for receiving such automated alerts 1 C S As and field activities that maintain automated detection systems and sensors must ensure that a POC for receiving the alerts has been defined and that the systems are configured to send alerts to that POC B-9 Enclosure B CJCSM 6510 01A 24 June 2009 1 The POC must then ensure that the event is reviewed as part of the preliminary analysis phase and reported to the appropriate individuals if it meets the criteria for a reportable event or incident d Document event information Present a basic characterization of the activity 1 If the event is detected by a person the POC to which the event is reported or the first responder will collect the symptoms and indicators from the person who noticed or reported the event as the start of documentation 1 If the event is detected by an automated system the initial logging and alert will be considered the start of the documentation process e Coordinate with others 1 Coordinate with the appropriate command and technical channels so they are informed of the issue 1 As appropriate share or corroborate this information with other C S As and field activities for validation or situational awareness k Preliminary Analysis and Identification of Incidents 1 Performing preliminary analysis and identifying incidents is the process of performing initial analysis of a detected event to determine if it is a reportable event or incident Figure B-4 – Preliminary Analysis and Identification of Incidents 2 The primary objectives for this phase include a Determining whether a detected event is a reportable event or incident B-10 Enclosure B CJCSM 6510 01A 24 June 2009 b Ensuring all appropriate DOD organizations are notified through technical and operational reporting channels c Ensuring the timely submission of an initial incident report that contains as much complete and useful information as is available or possible 3 A standardized benchmark is used for defining a reportable event or incident If an event does not meet the incident criteria it can be removed from consideration If the proper preliminary analysis is not done some incidents may not be identified and therefore never be reported Such a failure can impact the global security posture of the DOD GIG resulting in an inaccurate operational picture and potentially allowing an incident to continue thereby increasing the damage and loss resulting from the unidentified and unreported malicious activity During this phase of the incident life cycle the incident handler or automated detection systems will review the incoming event data identify what type of activity is occurring and determine if an anomalous event shall be treated as a reportable event or incident Initial information to be reviewed will include where available a Number of systems affected b Source and destination Internet Protocol IP addresses c Source and destination ports d Hostname s e System location f User information g Timestamps h IDS alert and payload data if relevant i General description of the problem event or activity j Status ongoing or ended successful or unsuccessful 4 Assignment of Category Type a An Incident or Reportable Event Category is a collection of events or incidents that share a common underlying cause for which an incident or event is reported Each event or incident is associated with a category as part of the incident handling process Incident and Reportable B-11 Enclosure B CJCSM 6510 01A 24 June 2009 Event categorization is outlined in Appendix A to Enclosure B Incident and Reportable Event Categorizations b An event can be declared an incident at various points in the incident handling process including during the preliminary analysis phase or the more detailed incident analysis phase Sometimes if an automated detection system is used the criteria used to benchmark network traffic or system activity may flag an event as an incident at the time it is detected c After further investigation a single event or incident can lead to discovery of additional events For instance a network scan Category 6 of a large number of hosts may be reported Upon further analysis it is determined that one of the hosts scanned is also misconfigured Category 5 This should result in an additional Category 5 report being submitted along with the original Category 6 report Incident and Reportable Event categorization is outlined in Appendix A to Enclosure B Incident and Reportable Event Categorizations 5 Preliminary Analysis and Identification Methodology a Assess and Categorize Assess the event against the incident criteria to determine if it is a reportable event or incident 1 Confirmed reportable events or incidents shall be categorized using Appendix A to Enclosure B Incident and Reportable Event Categorization In cases where more than one category applies the category of highest precedence is used as outlined in the annex 2 The security classification of the incident is determined at this stage in accordance with DODI O-3600 02 “Information Operations IO Security Classification Guidance” reference h or local C S A and field activity original classification authority OCA approved classification guidance 3 Based on the incident category nature and impact of the incident determine if the computer forensics process should be initiated b Perform preliminary impact assessment Determine the potential damage of the reportable event or incident 1 This preliminary impact assessment should be conducted in accordance with Appendix C to Enclosure D Impact Assessment Matrix 2 Initial assessment shall be performed quickly even with limited details and analysis As the investigation continues and a more accurate characterization of the true impact is understood the report is reassessed and modified B-12 Enclosure B CJCSM 6510 01A 24 June 2009 3 To make an accurate impact assessment the analyst performing the preliminary assessment must have access to personnel with a good understanding of the function and criticality of the system network or data in question and its role in fulfilling the C S A or field activity mission or ensure that those who do have that knowledge are informed c Begin or continue documentation Begin to document the incident if documentation has not already begun If it has been determined that computer forensics is required e g law enforcement investigation then begin to document the chain of custody Documentation should include 1 All known information about the event or incident 2 All actions taken during the preliminary analysis activities and the results of that analysis 3 A chain of custody record initiation determination is made by LE CI if forensic evidence is collected and further prosecutorial investigation may be a consideration 3 Submit Initial Report Prepare and submit the initial report to the appropriate organizations and commands and through the appropriate reporting mechanisms a There are two different types of reporting 1 Technical reporting This technical channel is designed to assist with the handling of incidents and provide fixes to mitigate the operational and or technical impact of an incident It may include submitting an incident report to the JCD appropriate CNDSP or any other appropriate reporting channels Report submission should follow the procedures and formats outlined in Incident Reporting Procedures in Enclosure C Incident Reporting 2 Operational reporting This channel provides notification to commanders at all levels about the status of their systems or networks and the operational impact of the incident on the mission s It is a vital conduit for the commanders to identify the operational impact and direct the incident handling process to mitigate unnecessary negative impact on their mission s b The type of reporting made is based on the nature and category of the incident If appropriate this is when the LE CI community should be notified of an incident that may require an investigation IAW reference i c Incident reports must be submitted to the JCD by the CNDSP and updated as the status changes B-13 Enclosure B CJCSM 6510 01A 24 June 2009 d Initial incident reporting can include verbal notifications e-mail summaries and technical incident reports as appropriate e Incident reporting procedures as identified in Enclosure C Incident Reporting will be followed f Timelines for reporting are outlined in Table C-A-1 Reporting Timelines Additional guidance on reporting timeframes are provided by command authority OPORDs or other specific guidance g It is important to stress the need for organizations to report incidents Sharing information about an incident in a timely manner can alert other organizations to be on the lookout on their own networks for similar suspicious activity This increased knowledge and awareness can help prevent other incidents from happening or going undetected h Incidents and reportable events shall be reported at the appropriate classification level over the appropriate system i e Non-Secure Internet Protocol Router Network NIPRNET e-mail or normal phone for unclassified incidents SECRET Internet Protocol Router Network SIPRNET or secure phone for SECRET incidents i When reporting an event or incident do not use assets on a network that is or potentially has been compromised because an attacker may be monitoring the compromised network and could be warned of their detection 4 Preliminary Response Actions Preliminary response comprises the coordinated and initial actions taken to protect the network or system from any further malicious activity and to acquire the data required for further analysis Figure B-5 Preliminary Response Actions a The primary objectives of preliminary response include 1 Preventing a reportable event or incident from causing further damage B-14 Enclosure B CJCSM 6510 01A 24 June 2009 2 Maintaining control of the system s affected and surrounding environment 3 Ensuring forensically sound acquisition of data necessary 4 Maintaining and updating the incident report and actively communicating updates through the appropriate technical and operational command channels 5 Preliminary response actions are the immediate steps taken once an incident has been detected and declared These actions are important as they provide information to help protect the systems and network from more damage while more detailed analysis is completed More detailed response steps may be taken after a more thorough analysis is performed These will be based on the nature scope and potential impact of the incident b Preliminary Response Action Methodology 1 Contain the incident a Contain any potential threat to protect the affected system or network and prevent any further contamination intrusion or malicious activity b Containment can be done by an automated detection system or by incident handling staff working in conjunction with technical and management staff c Containment will be coordinated with the supporting CNDSP The commander and supporting CNDSP will coordinate with LE CI as required d Containment actions that may affect the ability to acquire and preserve data about the incident must be decided on carefully When making these decisions it is important to assess the relative value of ensuring mission success by preventing further damage against the potential for containment actions to hinder further analysis 2 Acquire and Preserve Data Safely acquire and preserve the integrity of all data as directed to allow for further incident analysis a All incidents require that as much data as possible be acquired and its integrity preserved This includes volatile data system registers cache and Random-Access Memory RAM persistent data system images log files malware and environmental data environment location configuration around system This data is necessary to support LE CI investigations and to B-15 Enclosure B CJCSM 6510 01A 24 June 2009 conduct incident analysis to fully understand the scope and impact of the incident b A system will not be shutdown or disconnected from the network prior to acquiring and preserving the data e g making a system image unless authorized by the CNDSP or command authority The exception to this is if the machine begins to perform destructive tasks such as deleting files or formatting drives then the computer should be shutdown quickly c Data from related systems or devices e g routers IDS intrusion prevention system IPS domain controllers AV servers that potentially aid in incident analysis will be acquired and preserved d If an incident affects a large number of systems it may be impractical to acquire and preserve the data from each system Take for instance an incident that involves 100 user workstations containing no sensitive data that were compromised using the same attack vector In these cases data must be acquired and preserved to the extent that the data provides new and or additional information that could help in the technical analysis required to understand the nature scope and potential impact of the incident Therefore each system may not require data acquisition and preservation e g system images However prior to invoking this course of action the relevant CNDSP or command authority must approve that such data acquisition and preservation is not required e Extenuating circumstances may prohibit the acquisition of data For instance there may be insufficient tools and or resources Alternatively the acquisition may jeopardize mission critical responsibilities or cause major operational mission degradation In all cases the CNDSP or command authority must approve that such data acquisition is not to be done 3 Continue Documentation a Update the incident report with any actions taken during the preliminary response step and other useful information that may help to better characterize the incident b Any steps taken by first responders that potentially change the status or state of the affected system must be documented For example actions such as taking the system offline or touching any files on the system will change the state of the information to be collected – including file access times running processes and memory contents If this information is changed and not documented it can potentially corrupt the admissibility of the forensic evidence collected in an investigation This is why it is important to document any actions taken on the affected system or service B-16 Enclosure B CJCSM 6510 01A 24 June 2009 4 Incident Analysis a Incident analysis is a series of analytical steps taken to find out what happened in an incident The purpose of this analysis is to understand the technical details root cause s and potential impact of the incident This understanding will help to determine what additional information to gather coordinate information sharing with others and develop a course of action for response Figure B-6 Incident Analysis b The primary objectives for this phase include 1 Ensuring the accuracy and completeness of incident reports 2 Characterizing and communicating the potential impact of the incident 3 Systematically capturing the methods used in the attack and the security controls that could prevent future occurrences 4 Researching actions that can be taken to respond to and eradicate the risk and or threat 5 Understanding patterns of activity to characterize the threat and direct protective and defensive strategies 6 Identifying the root cause s of the incident through technical analysis b Incident Analysis Framework It is important to understand the different types of incident analysis 1 For most incidents the CNDSP incident handlers will conduct or coordinate a system analysis to gather any necessary information from or about the affected system s B-17 Enclosure B CJCSM 6510 01A 24 June 2009 2 Depending on the type of incident or reportable event activity if network or malware information is also available then the CNDSP will also conduct or coordinate a network analysis and or malware analysis as appropriate 3 If there is a chance the incident might meet the criteria for reporting an incident to LE CI for the purposes of pursuing a disciplinary criminal or CND investigation then computer forensics evidence collection and analysis must be performed 4 See Enclosure D Incident Analysis for additional guidance c Incident Analysis Methodology 1 Gather information Identify and collect all relevant information about the incident for use in incident analysis a Information gathered may include data previously acquired and preserved external logs personal accounts all-source intelligence technical information or the current operational situation b Any software artifacts suspected of being malware should be submitted to the Joint Malware Catalog JMC 1 Additional guidance may be found in Enclosure G CND Incident Handling Tools – Joint Malware Catalog 2 Validate the incident Review corroborate and update if applicable the reported incident to ensure all information is accurate as reported a Reports should be reviewed and updated to maintain situational awareness to add to incomplete information or to fix erroneous information contained in the report b Report validation may require the review of trusted network and system logs or affected systems to determine if the suspected activities happened as reported c Verify that the incident is categorized properly in accordance with Appendix A – Incident and Reportable Event Categorization 3 Determine attack vector s Analyze the information to determine the attack vector s used by the threat actor The attack vector is the primary path or method used by the adversary to cause the incident or event to occur 1 The Joint MALWARE Catalog is currently under development B-18 Enclosure B CJCSM 6510 01A 24 June 2009 a Attack vectors are used to systematically record major classes of attack vectors used by adversaries They do not identify the system-specific root cause s of an incident b If more than one attack vector is identified distinguish between the primary and secondary attack vectors used by the threat actor For example use of socially engineered e-mail delivering a malicious payload exploiting a known vulnerability that was preventable Attack vectors should be assessed in accordance with Appendix A to Enclosure D Attack Vectors 4 Determine system weaknesses Analyze the information to determine any underlying system weaknesses vulnerabilities or security controls that could have prevented or mitigated the impact of the incident a Identification of system weaknesses is a process used to systematically record and categorize major classes of security controls that could prevent similar incidents from occurring in the future They cannot identify the system-specific root cause s of an incident b System weakness identification should be performed IAW Appendix B to Enclosure D System Weaknesses 5 Identify root cause s Analyze the information to determine the system-specific cause s of the incident a Root cause identification expands upon the identified attack vector s and system weaknesses by precisely identifying the sets of conditions allowing the incident to occur For example an attack vector may identify an unpatched system This is useful for correlation and trending but is insufficient in identifying the specific cause of the incident and preventing against future occurrences Root cause identification would determine missing patches or system configurations that allowed the incident to occur b The root cause s of an incident should unless not practical be determined prior to the recovery and reconstitution of any system unless otherwise approved by your command authority This decision to restore a system without identifying the root cause s of the incident must be weighed carefully as it may leave the system vulnerable For example if the root cause of an incident stemmed from a missing patch in the baseline configuration a system restoration using the same baseline configuration will leave the system open to future compromise c A risk assumed by one is potentially a risk shared by many Failing to identify the root cause of an incident may expose multiple commands and the organizations to increased risk especially in situations where they share similar configurations or defensive measures B-19 Enclosure B CJCSM 6510 01A 24 June 2009 6 Determine impact Analyze the information gathered to validate and expand on the original impact assessment done during the preliminary analysis Impact should be assessed in accordance with Appendix C to Enclosure D – Impact Assessment Matrix The impacts to be determined are as follows a Technical Impact TI TI refers to the incident’s detrimental impact on the technical capabilities of the organization TI typically refers to impacts on the network or system machines directly or indirectly affected by the incident Examples include 1 Network health status 2 Potential data compromise or loss 3 Equipment downtime or destruction 4 Impact on other systems or components e g a machine removed from operations takes 8 hours to be rebuilt b Operational Impact OI OI refers to detrimental impacts on an organization’s ability to perform its mission This may include direct and or indirect effects that diminish or incapacitate system or network capabilities the compromise and or loss of mission critical data or the temporary or permanent loss of mission critical applications or systems 1 Examples of direct impact include the following a A secretary is unable to process temporary duty TDY orders thus delaying personnel from performing TDY b An organization is unable to perform effective C2 with its parent and or subordinate organization due to a disabled mail server c An organization cancels a tactical mission due to compromised mission plans or orders 2 Examples of indirect impact on a supply organization include the following a An Army division is unable to order track process repair parts using a networked system and is therefore unable to conduct combat operations due to insufficient availability of repair parts B-20 Enclosure B CJCSM 6510 01A 24 June 2009 b Barges on the Mississippi River are unable to deliver supplies because of the inability of their crews to access the DOD-supplied river hazard data c A Reserve unit goes unpaid because of an incident affecting time-phased force deployment data TPFDD and the unit does not meet its deployment timeline c When reporting TIs and OIs the TIs are normally reported by the communications and technical component of an organization J G S N A – 6 while OIs are typically reported by and or to the operational component of an organization J G S N A – 3 Examples 1 J-6 reports that an attack accessed 3 megabyte MB of data from a server 2 J-3 reports the attack accessed 3 MB of unclassified family support group data and determines no operational impact d Determine if the incident has any strategic significance and whether it is a USSTRATCOM or other commands’ Commander’s Critical Information Requirement CCIR and report appropriately 7 Research and Develop COAs Identify actions necessary to respond to the reportable event or incident fix the system and assess the risk for the system or network a Analysis comparison and selection of the best COA could be done at the lowest command possible For instance a commander could be the approving authority for an incident response COA for their base USSTRATCOM through JTF-GNO reserves the right to redirect all response actions for incidents that fall into a DOD Enterprise Incident Set b In some cases in coordination with the CNDSP the commander may decide to leave the system vulnerable and accessible in order to monitor the attacker’s activities This may be done to assist a LE CI investigation or for network defense and operational purposes c COAs may include CND Response Actions CND RA as outlined in reference j d Actions that potentially affect traffic on the DOD Protected Traffic List see Enclosure G must be coordinated with JTF-GNO 8 Coordinate with Others Work with other appropriate parties to collect additional information obtain assistance and additional expertise or guidance and notify appropriate operational and technical channels regarding B-21 Enclosure B CJCSM 6510 01A 24 June 2009 changes in the status of reportable events incidents and incident handling activities Timely interagency coordination and deconfliction of operations is crucial to conducting an effective incident response For additional guidance refer to Appendix A to Enclosure F Coordination and Deconfliction a Coordination cannot be overstressed It is a continuous process from event detection through post-response activities including the prosecution of an offender b Coordination ensures that the identification and deconfliction of response is vetted through all the parties that may be affected by the response This may include 1 Reporting vertically to alert higher HQ and other CND organizations 2 Reporting horizontally to other peer organizations that have systems that may be affected action 3 Researching and planning response strategy and course of 9 Perform Correlation and Trending Analyze and identify relationships and trends between incidents in the short term and patterns across incidents in the long term Effective and complete reporting throughout the incident handling lifecycle assures that the Department of Defense has the ability to conduct and identify these trends and patterns a Trending Analysis The process of understanding and accurately characterizing the relationship of incidents reported and providing awareness of the cyber security trends as observed by the affected parties This includes analysis based on incident information that has been reported to the constituent incidents identified by the constituent and public private sector information identified when correlating and analyzing the data b Enterprise Threat Fusion and Correlation The process of correlating incident activity to assess and direct operation and defense of the GIG across strategic operational and tactical boundaries This includes developing disseminating and directing the implementation of countermeasures to specific weaknesses against known adversarial tactics techniques and procedures TTPs to preserve the warfighter’s ability to carry out current and future missions 5 Response and Recovery Response and recovery includes the detailed response steps performed to prevent further damage restore the integrity of affected systems and implement follow-up strategies to prevent the incident B-22 Enclosure B CJCSM 6510 01A 24 June 2009 from happening again Figure B-7 Response and Recovery a The primary objectives for performing response and recovery include 1 Resolving the incident according to policy procedures and quality requirements 2 Eliminating the risk or threat 3 Restoring the integrity of the system and returning it to an operational state 4 Implementing proactive and reactive defensive and protective measures to prevent similar incidents from occurring in the future 5 Completing a battlefield damage assessment BDA should be determined IAW Appendix C to Enclosure D Impact Assessment Matrix b Response and recovery may require a combination of technical management and or LE CI actions 1 Technical actions include changes in the network and system infrastructure to remove the risk or threat 2 Management steps can include administrative human resources public relations or policy creation and management activities LE CI actions can include further investigation or criminal prosecution Other management issues may involve legal actions to handle liability service level agreements or contracting issues c Response and Recovery Methodology 1 Containment B-23 Enclosure B CJCSM 6510 01A 24 June 2009 a Implement if applicable additional containment actions to regain control of or isolate the system and prevent further malicious activity b Containment strategies vary based on the type of incident c Examples of strategies might include modifying network access controls e g firewall installing new antivirus or IDS IPS signatures or making physical changes to the infrastructure d Collaborate with partners as investigative or intelligence equities may need to be considered before certain containment measures are taken See Enclosure F for a full discussion 2 Eradicate Risk Eradicate the risk and take actions that remove the cause of the incident from the system network a No system should be rebuilt until the system data has been adequately preserved and the vulnerability has been mitigated b Systems having a Category 1 Category 2 and Category 7 must be rebuilt from trusted media have up-to-date anti-virus loaded and configured IAW Security Technical Implementation Guides STIGs information assurance vulnerability management IAVM notifications fragmentary orders FRAGOs and CTOs prior to connecting the system to the network c Mission impact may require patching the affected component and temporary vulnerability mitigation until the mission allows the system to be rebuilt 3 Recover from Incident Fully restore affected data and systems to normal operation if applicable Harden systems to prevent similar incidents and monitor them to ensure system is completely free from the original system weakness a For some incidents eradication is either not necessary or is performed during recovery b Preventing similar incidents may involve changing baseline configurations tightening network perimeter security updating anti-virus and scanning tools signature files rebuilding the system from trusted media conducting user training or implementing countermeasures that mitigate the risk 4 Coordinate with Others Work with appropriate parties to implement COAs and resolve event or incident B-24 Enclosure B CJCSM 6510 01A 24 June 2009 a Notify Others Notify any relevant stakeholders or participants of actions that they need to take Notify involved parties as appropriate of the status of the incident and progress of the response Submit updated information on the incident and the progress of the response to keep higher CND organizations and or headquarters updated on the status of the incident response C S As and field activities must ensure that Program Managers for centrally managed programs are notified for category CAT 1 2 or 5 incidents impacting their programs 5 Continue Documentation Update the incident record in the JCD with information on any response and recovery steps that were taken Each update to the JCD report provides a more complete understanding of the incident Consistent and frequent updates provide a platform to broadly characterize adversarial activity and enables USSTRATCOM JTF-GNO to direct appropriate defensive actions GIG wide 6 Update Response Actions BDA and Close Incident Update incident record in JCD that closes out the incident response a Ensure all parties have completed the necessary actions for the b The BDA documents the technical and operational impact i e operations security OPSEC assessment of the incident on the organization It should be determined IAW Appendix C to Enclosure D Impact Assessment Matrix c Update incident record in JCD with BDA within 24 hours after the incident is resolved d Close incident Declare the incident closed change the status in the JCD to closed and perform any other actions to close out the incident 1 Incidents cannot be closed as a Category 8 – Investigating 1 Note that the incident may be closed for the DOD component or the CNDSP but might still remain open for LE CI investigation 1 CNDSPs are responsible for closing an incident Incidents may be reopened by USSTRATCOM JTF-GNO if necessary in which case the affected CNDSP would be contacted and given direction as to what additional actions should be taken 7 Additional information about responding to incidents is described in Enclosure E Incident Response B-25 Enclosure B CJCSM 6510 01A 24 June 2009 6 Post-Incident Analysis a Post-incident analysis involves a postmortem on an incident to review the effectiveness and efficiency of incident handling Data captured in the postmortem includes lessons learned initial root cause problems with executing COAs missing policies and procedures and inadequate infrastructure defenses b Postmortem results should be used to make improvements to the incident management process and methodology and to the security posture and defenses of the C S As and field activities Figure B-8 Post-Incident Analysis c One of the most important parts of incident handling is learning how to improve operations processes and infrastructure defenses by reviewing how an incident happened and how the response was handled The primary objectives for post-incident analysis include 1 Identifying infrastructure problems to address 2 Identifying organizational policy and procedural problems to be addressed 3 Identifying technical or operational training needs 4 Determining unclear or undefined roles responsibilities interfaces and authority 5 Improving tools required to perform protection detection analysis or response actions d C S As and field activities will establish a formal postmortem process and will establish criteria governing which incidents require a postmortem e Not all incidents require a postmortem Usually incidents that are large in scope handled poorly involved LE or caused severe damage require a postmortem B-26 Enclosure B CJCSM 6510 01A 24 June 2009 7 First Responder Guidelines a The first responder is the first person who arrives to investigate and respond to any detected activity This includes but is not limited to system administrators CNDSP technical staff and law enforcement A first responder’s role and responsibilities are to b Determine the initial impact of the incident 1 Collect as much information about the incident as possible 2 Document all findings 3 Share this collected information with appropriate points of contact to support root cause identification c First responder procedures and processes must be in place to ensure the consistent and proper initial response to events incidents or other suspicious activities 1 Detectors People who detect events or incidents must be properly trained to ensure they do not damage or contaminate evidence They must be taught to step away from the affected or involved system and to touch nothing rather they should report what they have found or seen to their appropriate POC or CNDSP The POC or CNDSP is responsible for ensuring a qualified person is assigned to handle the collection analysis and the response 2 Responders The people who arrive to investigate and respond to an event or incident are true first responders just as a firefighter or police are first responders to physical security events Guidance to these first responders is vital to ensuring proper methods are initiated for appropriate response actions 3 First responders must have a defined process and procedure in place governing what they can and cannot do at the scene First responders who will not handle the investigation or analysis must be ready to turn over all their information in a clear concise manner that is easily understood by others First responders must be knowledgeable and prepared to be able to collect data and forensic evidence Along with a standard incident response and reporting plan they must also have a tested and documented toolkit that can be used for collection data acquisition and response in a forensically sound manner B-27 Enclosure B CJCSM 6510 01A 24 June 2009 d Policies and Procedures 1 Policies and procedures are required to ensure a consistent and proper response to events and incidents This must include a Determination of a designated first responder and his or her responsibilities 2 b Guidance for non-expert or technical personnel who detect an event or incident to ensure they do not make changes to the system and to ensure they report it to the appropriate command authority or CNDSP c Instructions for creating using and maintaining a first responder trusted toolkit d Infrastructure to create and maintain a trusted test bed to test and document tools before adding them to the toolkit e A defined collection strategy that outlines what type of information and data will be collected with what tools and how it will be stored and documented f Instructions for performing forensic data acquisition and maintaining a corresponding chain of custody g Instructions about what type of preliminary response actions the first responder is approved to make related to containment notification or documentation actions 2 Each C S A and field activity in coordination with their CNDSP will define first responder policies and procedures for their areas and provide guidance to Tier Three e Precautionary Measures Prior to the arrival of an authorized incident response analyst first responders are responsible for taking precautionary measures to ensure the successful acquisition and preservation of data 1 Maintain Control Prevent unauthorized access to the system and maintain physical control of the surrounding environment Protect the integrity of other devices that may have witnessed or captured information related to the incident such as log servers video cameras remote access servers etc Be aware of unintentional destructive activity such as If the first responder will not be the person to handle the incident or they do not have the skills or tools needed they must be carefully instructed to not touch the system or make any changes and wait to hand over the investigation to that assigned analyst 2 B-28 Enclosure B CJCSM 6510 01A 24 June 2009 maintenance procedures that purge and rotate log files processes that delete files and e-mails after a certain date etc 2 Document Events and Activities Immediately start a log of activities as soon as a security incident is detected This log should note when the incident was detected by whom and how it was detected All activities pertaining to the incident should be included in the log such as opening log files for viewing printing reports etc At a minimum document the following items a Time and date of incident b State of the system when incident was discovered on off connected or disconnected c List all activities and commands done to the system note the time date and who performed what d People present or knowledgeable about the incident e Owner or user of the system 3 Determine if Shutdown is Necessary As soon as it is determined an incident has occurred the computer should be kept on and in the same state as when the incident was discovered Guidance to shutdown alter settings saving settings or any other action will be determined by the incident responder i e analyst and law enforcement 4 Log all actions Ensure that all actions are logged as part of documenting the chain of evidence f First Responder Toolkits 1 A first responder toolkit is a set of scripts programs and other resources used to safely acquire examine and preserve volatile and nonvolatile data from a system 2 These trusted toolkits must be approved by the designated accrediting authority DAA acquired described and fully understood prior to using them 3 Information about what the tool does how it interfaces with a system and network what type of outputs it produces and what type of impact or fingerprint it leaves on the analyzed system must be determined and documented If this is not done or if untested tools are used then changes B-29 Enclosure B CJCSM 6510 01A 24 June 2009 may be introduced to the system that will inhibit a complete analysis cause a misinterpretation of the activity or cause the evidence to be contaminated 4 First responders must also ensure that any actions they take do not violate any existing C S As and field activities’ computer and network usage policies 5 More in-depth information about performing forensic data acquisition and analysis documenting the analysis and chain of custody and protecting the collected data is discussed in Enclosure D Incident Analysis B-30 Enclosure B CJCSM 6510 01A 24 June 2009 APPENDIX A TO ENCLOSURE B INCIDENT AND REPORTABLE EVENT CATEGORIZATION 1 Introduction a An Incident or Reportable Event Category is a collection of events or incidents sharing a common underlying cause for which an incident or event is reported b Each event or incident is associated with one or more categories as part of the incident handling process 2 Categories a In cases where more than one category applies the category assigned should be determined using the following precedence in Table B-A-1 Precedence Category Description 1 1 Root Level Intrusion Incident 2 2 User Level Intrusion Incident 3 4 Denial of Service Incident 4 7 Malicious Logic Incident 5 3 Unsuccessful Activity Attempt Event 6 5 Non-Compliance Activity Event 7 6 Reconnaissance Event 8 8 Investigating Event 9 9 Explained Anomaly Event Table B-A-1 Category Precedence b For instance an incident could be reported either as a User Level Intrusion Category 2 or a Non-Compliance Event Category 5 The User Level Intrusion takes precedence based on Table B-A-1 and the incident should be reported as a User Level Intrusion Category 2 incident c Investigating Category 8 reports will include an initial assessed incident category Category 1-7 or 9 and be re-categorized based on continued B-A-1 Appendix A Enclosure B CJCSM 6510 01A 24 June 2009 investigation No reports will be closed as a Category 8 d Table B-A-2 provides incident and reportable event categories Category 1 Description Root Level Intrusion Incident – Unauthorized privileged access to a DOD system Privileged access often referred to as administrative or root access provides unrestricted access to the system This category includes unauthorized access to information or unauthorized access to account credentials that could be used to perform administrative functions e g domain administrator If the system is compromised with malicious code that provides remote interactive control it will be reported in this category 2 User Level Intrusion Incident – Unauthorized non-privileged access to a DOD system Non-privileged access often referred to as user-level access provides restricted access to the system based on the privileges granted to the user This includes unauthorized access to information or unauthorized access to account credentials that could be used to perform user functions such as accessing Web applications Web portals or other similar information resources If the system is compromised with malicious code that provides remote interactive control it will be reported in this category 3 Unsuccessful Activity Attempt Event – Deliberate attempts to gain unauthorized access to a DOD system that are defeated by normal defensive mechanisms Attacker fails to gain access to the DOD system i e attacker attempt valid or potentially valid username and password combinations and the activity cannot be characterized as exploratory scanning Reporting of these events is critical for the gathering of useful effects-based metrics for commanders 4 Denial of Service Incident – Activity that denies degrades or disrupts normal functionality of a system or network 5 Non-Compliance Activity Event - Activity that potentially exposes DOD systems to increased risk as a result of the action or inaction of authorized users This includes administrative and user actions such as failure to apply security patches connections across security domains installation of vulnerable applications and other breaches of existing DOD policy Reporting of these events is critical for the gathering of useful effects-based metrics for commanders Table B-A-2 Incident and Reportable Event Categories B-A-2 Appendix A Enclosure B CJCSM 6510 01A 24 June 2009 Category 6 Description Reconnaissance Event – Activity that seeks to gather information used to characterize DOD systems applications networks and users that may be useful in formulating an attack This includes activity such as mapping DOD networks systems devices and applications interconnectivity and their users or reporting structure This activity does not directly result in a compromise 7 Malicious Logic Incident – Installation of software designed and or deployed by adversaries with malicious intentions for the purpose of gaining access to resources or information without the consent or knowledge of the user This only includes malicious code that does not provide remote interactive control of the compromised system Malicious code that has allowed interactive access should be categorized as Category 1 or Category 2 incidents not Category 7 Interactive active access may include automated tools that establish an open channel of communications to and or from a DOD system 8 Investigating Event – Events that are potentially malicious or anomalous activity deemed suspicious and warrant or are undergoing further review No event will be closed out as a Category 8 Category 8 will be re-categorized to appropriate Category 1-7 or 9 prior to closure 9 Explained Anomaly Event – Suspicious events that after further investigation are determined to be non-malicious activity and do not fit the criteria for any other categories This includes events such as system malfunctions and false alarms When reporting these events the reason for which it cannot be otherwise categorized must be clearly specified Table B-A-2 Incident and Reportable Event Categories continued 3 Comparison of DOD and Department of Homeland Security DHS Categories Table B-A-3 provides a comparison between categories utilized by DOD and the DHS B-A-3 Appendix A Enclosure B CJCSM 6510 01A 24 June 2009 DOD Incident and Reportable Event Categories DHS Incident and Reportable Event Categories Category 0 Exercise Network Defense Testing Category 1 Root-Level Intrusions Category 1 Unauthorized Access Category 2 User-Level Intrusions Category 1 Unauthorized Access Category 3 Unsuccessful Activity Attempt Category 5 Scans Probes Attempted Access Category 4 Denial of Service Category 2 Denial of Service Category 5 Non-Compliance Activity Category 4 Improper Usage Category 6 Reconnaissance Category 5 Scans Probes Attempted Access Category 7 Malicious Code Category 3 Malicious Code Category 8 Investigating Category 6 Investigation Category 9 Explained Anomaly Table B-A-3 Comparison of DOD and DHS Incident and Event Categories3 3 The eventual goal is to coordinate common incident and event categories between DOD and DHS B-A-4 Appendix A Enclosure B CJCSM 6510 01A 24 June 2009 ENCLOSURE C INCIDENT REPORTING 1 Introduction a Incident Reporting comprises a well-defined framework for the timely reporting of any reportable event or computer security incident It ensures the report provides an accurate meaningful and complete understanding of the incident from initial detection through analysis to resolution and closure b Reporting provides valuable input into the combined and coordinated analysis of data from a variety of sources 1 This analysis provides the joint forces CNDSPs and USSTRATCOM JTF-GNO with indications of adversary reconnaissance probing intrusions network exploitations and or attacks that have occurred or are occurring on DOD networks 2 It also enables regional and theater entities to understand what is happening across their joint theater operations and in turn provides information to Tier One who are able to gain a global situational awareness of attacks occurring on the GIG c This section provides guidance on the reporting requirements for reportable events and incidents 1 Further requirements shall be articulated in OPORDs issued by relevant commands 2 DOD contractor or other personnel who access DOD systems and networks must report to their appropriate organization and commands whether that is a supervisor information assurance manager information assurance officer commander CNDSP etc d The primary objectives for the incident reporting process are to 1 Ensure all suspicious activity on DOD networks and systems is reported according to defined policies procedures and within established timeframes 2 Ensure incident reports provide an accurate meaningful and complete understanding of the incident throughout its life cycle C-1 Enclosure C CJCSM 6510 01A 24 June 2009 3 Ensure the effective and timely coordination and communication of incident information through appropriate channels and with higher CND organizations and or DOD C S As and field activities HQ 4 Enable the Department of Defense’s ability to direct protective and defensive strategies based on incident reporting trends and adversarial activity e Events and incidents are reported and communicated across multiple tiers within the Department of Defense including Joint Staff C S As field activities and the installations at Tier Three levels Each Tier plays a role in this incident reporting process to support situational awareness and operational impact reporting regarding activities that affect C S As and field activities Such reporting serves multiple purposes and serves different needs within the Department of Defense for example 1 Initial detection and notification alerts to appropriate organizations that activity has occurred or is occurring that requires attention 2 Follow up notification provides further details and updates regarding status or changes in the activity to support ongoing analysis remediation or development of response COAs 3 Accurate and complete information gives analysts data that is used to assess the impact of an incident and the impact it has on mission operations 4 Accurate and complete reporting assists analysts in determining root cause s in identifying attack vectors and or identifying system weaknesses 5 Accurate and complete reporting provides relevant input to the intelligence community and supports LE CI investigations 6 Timely reporting provides input to Tier One to enable a DOD-wide understanding of the current UDOP 4 7 Comprehensive incident reporting provides data that can be used in other correlation trending or retrospective analysis tasks 8 Increased knowledge and awareness can help keep other incidents from happening or going undetected f Effective end-to-end reporting serves as input to the CND UDOP which provides local intermediate and DOD-wide visual situational awareness of 4 The CND UDOP is currently under development C-2 Enclosure C CJCSM 6510 01A 24 June 2009 incidents events CNDSP actions and their impact To accurately identify characterize and understand activity occurring across the GIG commanders at all levels must ensure their subordinates participate in the reporting process g There are requirements and benefits across all Tiers on appropriately sharing information about incident reports For example activity identified at a Tier Two entity that is reported up to Tier One and pushed down to Tier Three can additionally be passed on to peering C S As and field activities to alert them to similar activity Sharing information about an incident at one location with peer organizations can facilitate improvements or be used proactively by these peering entities in protecting their systems and networks 5 2 Reporting Structures a Effective response requires coordinated reporting and information sharing with multiple communities of interest within and outside of the Department of Defense There are two primary reporting structures explained below 1 Technical Reporting Structure This structure consists primarily of Global USSTRATCOM JTF-GNO Tier One Regional Theater C S A Tier Two CNDSPs and Local Tier Three organizations and describes the interactions between each of the Tier levels and how reporting notification and communications shall occur 2 Additional Reporting Structures This group includes other reporting structures that may be required in support of the IC LE CI operational and any other external organizations as appropriate b Technical Reporting Structure 1 All reportable events and incidents are reported to USSTRATCOM JTF-GNO Defined processes and procedures will be followed at each Tier to ensure that reportable incidents and events contain relevant information IAW this manual to enable the DOD to appropriately handle those incidents and events as well as to gain an in-depth view of activity and any operational impact on DOD mission operations 2 The level and type of information to be reported will depend on the operational roles and responsibilities of the individuals involved as well as any specific OPORDs When incidents and reportable events are identified it Online collaborative tools provide a proven environment to conduct these information sharing activities Persistent sessions between tier entities can be established to track and collaborate on ongoing incidents and events 5 C-3 Enclosure C CJCSM 6510 01A 24 June 2009 should be recognized that reporting occurs through a management as well as technical channel These channels are described below a Technical Reporting This technical channel is designed to assist with the handling of incidents and provide fixes to mitigate the operational and or technical impact of an incident 1 Technical activities include reporting incidents and events through appropriate channels updating information throughout the lifecycle of the event or incident and conducting other communications related to them 2 The dissemination of information and types of communications will vary depending on the roles involved in the activity Tier One Two or Three LE CI joint commands etc b Operational Reporting The management and oversight channel is designed to notify commanders at all levels of the ability of their systems to support operations and the operational impact of any reported incidents 1 Commanders determine when to initiate communications with the LE CI community for example when an incident requires a criminal investigation 2 The type of reporting will also depend on the leadership role involved in the notification path e g communicating with control centers CNDSPs USSTRATCOM JTF-GNO LE CI or the IC 3 The leadership and oversight channel also provides a conduit for the commander to guide the incident handling process to mitigate any additional negative impact on their ISs c These technical and operational reporting channels occur in parallel They ensure that incidents and their potential impact are not only addressed at the technical detection analysis response levels but that commanders and other appropriate DOD personnel receive details to enable appropriate tactical and strategic military decision making Commanders are ultimately responsible and accountable for their networks and for ensuring that appropriate reporting occurs 3 Tier One Reporting Tier One receives reports from Tier Two and external entities It is positioned for centralized coordination and control in a way that allows it to broadly characterize attacks occurring across the Department of Defense This vantage point allows it to provide tactical and strategic direction to subordinate levels and determine defensive and or protective strategies that help improve the overall security posture of the GIG C-4 Enclosure C CJCSM 6510 01A 24 June 2009 Tier One includes USSTRATCOM and supporting entities e g JTF-GNO and JTF-GNO LECIC a Incidents are reported to USSTRATCOM according to published CCIRs b USSTRATCOM provides reports summaries significant incidents trends enterprise-wide issues to OSD through the Joint Staff as required c USSTRATCOM JTF-GNO receives reports of all reportable events and incidents from Tier Two CNDSP through the JCD d USSTRATCOM JTF-GNO analyzes correlates and fuses reports to understand attacks against the GIG and to direct defensive measures This information in turn is shared as appropriate with other Tiers e USSTRATCOM JTF-GNO disseminates information to USSTRATCOM Joint Intelligence Center STRATJIC about DOD Enterprise Incident Sets f USSTRATCOM JTF-GNO coordinates with LE CI regarding incidents that involve LE CI investigations g USSTRATCOM JTF-GNO provides tactical and strategic information to subordinate Tiers based on the results report trending analysis and the correlation and enterprise fusion of threat information h USSTRATCOM JTF-GNO provides releasable Incident Reporting material to bilateral and multilateral partners as appropriate i USSTRATCOM JTF-GNO J-2 and the Service Component CERT computer incident response team CIRT intelligence support elements are required to perform IAW Appendix B to Enclosure F Intelligence Support to Incident Reporting j The LE CI Center at JTF-GNO receives reports of incidents that may support LE CI actions k The LE CI Center at JTF-GNO coordinates the release of CND LE CI information with appropriate release authority from originating agencies to support information sharing across the C S As and field activities C-5 Enclosure C CJCSM 6510 01A 24 June 2009 l The NTOC provides AS W and a variety of technical alerts to USSTRATCOM JTF-GNO that is shared as appropriate with other Tiers to direct response actions 4 Tier Two Reporting Tier Two receives reports from the subordinate levels Tier Three This information can also be shared if applicable with other Tier Two entities to provide insight into activity that can potentially affect its region or theater of operations Tier Two organizations report incidents to the JTF-GNO in accordance with Appendix A to Enclosure B Incident and Reportable Event Categorization All incident reports should be submitted through the JCD unless prevented by extenuating circumstances e g no access to JCD All organizations must report through their CNDSP The CNDSP enters the report into the JCD Lateral reporting may be required by their operational or administrative chain of command Tier Two entities include a CND Service Providers CNDSPs 1 CNDSPs report incidents within their subscriber community to USSTRATCOM JTF-GNO through the JCD 2 CNDSPs share valuable information about incidents being reported if applicable with other peer organizations 3 CNDSPs provide feedback to reporting organizations as information is developed Subordinate echelons in the reporting chain are responsible for relaying information to the originating point and developing procedures to disseminate the information as appropriate within their constituent communities e g Network Operations Security Center NOSC Theater Network Control Center TNCC or Global Network Control Center GNCC within the C S A or field activity and or Theater NetOPs Center TNC within its AOR b Theater NetOPs Center 1 Incidents are reported from the Joint headquarters or Activity to their Tier II CNDSP the Regional C4I Control Center CCC TNC’s and the combatant command headquarters 2 Reports are submitted from the CCC TNC’s to the Joint Staff National Military Command Center NMCC as appropriate CCC TNC’s and combatant command HQ report information about events and incidents to Tier One C-6 Enclosure C CJCSM 6510 01A 24 June 2009 3 The TNCs issue technical and operational directives to Service theater NOSCs and agency theater NOSCs c Service or Defense Agency Network Operations Security Center 1 Each Service and Defense agency NOSC providing CND services to a Service or Defense agency component supporting a regional combatant command makes available warnings reports information data and statistics pertinent to the protection of resources assigned to the regional combatant command 2 Service and Defense agency NOSCs coordinate and report network deception systems to USSTRATCOM JTF-GNO for awareness and correlation purposes prior to connection to any DOD network In addition they report for situational awareness purposes network deception system deployments e g honeypots within combatant command Service components to that combatant command 3 Service and Defense agency NOSCs report information to USSTRATCOM JTF-GNO for inclusion into the DOD Protected Traffic List 4 Service and Defense agency elements subordinate to a commander of a combatant command geographic and or functional simultaneously report to a combatant command NetOps organization and to their Service or Defense agency NOSC or TNC Reporting should be accomplished IAW combatant command guidance 5 Combatant Command Headquarters Joint HQ or Regional CCC TNCs must forward or make available through the JCD information about events and incidents reported to them from the affected components to combatant command HQ This helps combatant command HQ maintain an accurate operational view in their AOR d Global Network Control Center 1 GNCCs receive informational reports from Service elements and Global NetOps Support Centers GNSCs 2 GNCCs disseminate CNDSP feedback within the constituent communities as appropriate e Global NetOps Support Center 1 GNSCs report incidents through defined channels e g CNDSP or as directed by command instructions or policy C-7 Enclosure C CJCSM 6510 01A 24 June 2009 2 GNSCs issue technical and operational directives to Service theater NOSCs and agency theater NOSCs f Theater Network Control Center 1 TNCCs receive informational reports from Service elements and TNCs 2 TNCCs provide recommendations and advise senior leadership on COAs as appropriate g Theater C4I Control Center TCCC 1 TCCCs receive informational reports from Service elements and TNCs 2 TCCCs provide recommendations and advise senior leadership on COAs as appropriate h C S As and Field Activities Incidents or reportable events that occur within their subordinate levels regardless of classification are reported to the appropriate CNDSP 5 Tier Three Reporting Tier Three initiates local operational reporting and receives support from and responds to direction from a designated Tier Two CNDSP Tier Three reporting notification and communication provides information about what is occurring to the Network Service Centers NSCs at Service component headquarters major commands and service elements at installations e g base post camp and stations B P C S or joint activities that serve as a focal point for reporting and handling incidents and network management at the lowest level Tier Three entities include a Base Post Camp Station B P C S represent the lowest level in which reportable events and incidents occur and from which they must be reported 1 Service elements at B P C S report through Service-defined channels to the Service or agency NOSC or their CNDSP which report to the USSTRATCOM JTF-GNO 2 Service elements subordinate to a commander of a combatant command simultaneously report to a combatant command GNCC and a TNCC as directed by combatant command instruction or policy C-8 Enclosure C CJCSM 6510 01A 24 June 2009 3 Joint activities report incidents to their host command NSC combatant command and TNC b Network Service Centers NSCs serve as focal points for reporting and handling incidents and network management at the lowest level c Additional Reporting Structures Additional reporting structures exist in order to support the IC LE CI and other operational reporting requirements 1 Operational Report OPREP a An OPREP6 is required for certain types of incidents It is conducted by any unit to provide appropriate commanders immediate notification about events or incidents that may significantly affect the mission b Specifically Category 1 2 4 and 7 events or incidents affecting Mission Assurance Category MAC I or II DOD ISs must be reported using OPREP-3 reporting procedures and structure 1 Root Level Intrusion Category 1 Unauthorized privileged access to MAC I or MAC II DOD IS s 2 User Level Intrusion Category 2 Unauthorized nonprivileged access to MAC I or MAC II DOD IS s 3 Denial of Service Category 4 Denial of Service DoS against MAC I or MAC II DOD IS 4 Malicious Logic Category 7 Active propagation of malware infecting a DOD IS or malicious code adversely affecting the operations and or security of DOD IS OPREP for previously reported outbreaks are not submitted e g outbreak of virus reported two months ago c OPREP-3 reports will be submitted as soon as possible after an event or incident has been detected Speed takes priority over detail d OPREP-3 initial reports will contain only as much of the requested information as is immediately available The initial report must not be delayed to gain additional information Follow-up reports and additional notification shall be submitted as additional information becomes available throughout the lifecycle of the event or reported incident OPREP reporting procedures can be found in CJCSM 3150 03B “Joint Reporting Structure Event and Incident Reports” reference h 6 C-9 Enclosure C CJCSM 6510 01A 24 June 2009 e USSTRATCOM JTF-GNO submits OPREP-3 for DOD-wide computer network incidents to USSTRATCOM HQ 2 Law Enforcement and Counterintelligence Reporting Structure a CND reportable events or incidents that may lead to criminal investigations require notification and reporting to LE CI Data from the incident will be preserved in a forensically sound manner to enable possible criminal prosecution or LE CI operations b At minimum Category 1 2 and 4 incidents are reported to DOD LE CI IAW established C S A and field activity procedures Incidents involving potential or actual compromise of classified systems or networks are reported through standard CND technical reporting channels 1 Commanders request investigations and the servicing LE CI organization determines if investigations are to be opened IAW reference i 2 Incidents are reported to the appropriate LE CI organization at the lowest level at which they are discovered in accordance with established C S A and field activity procedures 3 The investigative community has substantial authority to access official government and private sector information consistent with normal investigative procedures Ideally the operational community should cooperate with the servicing LE CI organization which will in turn coordinate with LE CI Center at JTF-GNO The LE CI Center disseminates information to other LE CI organizations including non-DOD LE CI organizations if appropriate 4 Reporting incidents through LE CI channels does not eliminate the requirement to report incidents through standard CND reporting channels 5 LE CI matters and investigations regarding sensitive compartmented information SCI networks systems and personnel will be forwarded to SCI LE CI authorities 3 Intelligence Community Reporting Structure IC reporting is required for any reportable events or incidents that affect classified systems or involve foreign threats to DOD systems and networks C S As and field activities report incidents or reportable events affecting TOP SECRET TS SCI networks directly to organizations as directed under SCI directives and policies as provided by the principal accrediting authority PAA C-10 Enclosure C CJCSM 6510 01A 24 June 2009 a DOD SCI organizations will provide reporting directly to the DIA Information Assurance Protection Center IAPC b Member organizations operating under authority of NSA NRO and NGA shall report to their agency authority in accordance with internal agency policy c DOD IC members will report all reportable events directly to the IC-IRC within established reporting timelines 1 The IC-IRC will ensure all TS SCI reports are reported to USSTRATCOM JTF-GNO to ensure information about new vulnerabilities exploits or incidents reported on compartmented systems is disseminated to the appropriate IC member organization for remediation 2 All requests for DOD SCI information will be vetted through the IC-IRC to the responsible community member organization 3 Additional guidance on Phased Reporting procedures for CND intelligence reporting can be found in Appendix B to Enclosure F Intelligence Support to Incident Reporting 3 Operational Reporting Practices a Incident reporting plays an essential role in understanding how and when DOD systems and networks are being attacked Achieving this understanding requires a disciplined reporting framework and individuals responsible for incident reporting are expected to follow some general best practices as part of this process b Critical success factors for incident reporting include the following 1 Timeliness Reporting incidents aids in identifying characterizing and responding to adversarial activity The Department of Defense’s ability to respond effectively while minimizing damage is highly dependent on the length of time between when activity is detected and when it is first reported Reporting incidents in a timely manner accelerates the Department of Defense’s ability to develop and implement defensive measures 2 Quality and Completeness An incident report’s value is determined by the quality of the information The more useful information contained in the report the better it can help analysts understand the technical details root cause s and potential impact of the incident Incident reports should be regularly updated with as much useful information as is available at the time C-11 Enclosure C CJCSM 6510 01A 24 June 2009 3 Enterprise-wide visibility of reporting All incident reports shall be submitted to the JCD The consistent complete and timely reporting of incident data into a single database is necessary in order to reflect the collective reporting of adversarial activity and can help shape tactical strategic and military strategies for response This information can then later be used to perform trending analysis correlation and fusion 4 Operational effectiveness Incident reports should be managed effectively from creation to resolution This management is an ongoing and iterative process Once an incident is reported it should be updated when its status changes and until the incident is resolved This allows commanders and others responsible for directing incident response strategies to remain informed about the status of their systems or networks and the impact of the incident on their missions Timely updates and the effective sharing of relevant incident information can also help other DOD organizations recognize the activity and mitigate any negative impact on their mission s c Organizations at all levels report changes in the status of reportable events incidents and incident handling actions There are a variety of reasons why status reports are issued to the appropriate organizations Some reasons may include but are not limited to 1 Changes in the characteristics of the reportable event or incident activity a Increase or decrease in activity b Operational impact s on system network or mission 2 Corrective actions that change the status of the reportable event or incident activity 3 Closure of a reportable event or incident 4 Reporting Vehicles a All reportable events and incidents must be reported in a timely manner through approved reporting mechanisms The primary vehicle for reporting incidents and reportable events is the JCD Other mechanisms are available but the JCD maintains the canonical records for all incident reports b Table C-1 Reporting Vehicles summarizes reporting vehicles available in order of preference It is important that the use of the JCD is emphasized to all DOD components as the primary mechanism for reporting Other mechanisms should only be used when the JCD cannot be accessed or when circumstances require the use of other reporting channels Regardless of how C-12 Enclosure C CJCSM 6510 01A 24 June 2009 initial reporting is done information regarding the report must be added to the JCD Table C-1 Reporting Vehicles c The principal reporting vehicle for DOD SCI systems is a Joint Worldwide Intelligence Communications System JWICS e-mail to the IAPC d Reports should be submitted using the most protected means available for the affected system 1 Use SIPRNET or secure phone fax if those systems are available 2 Unclassified reporting vehicles NIPRNET non-secure fax should only be used for incidents on unclassified systems 3 USSTRATCOM JTF-GNO will work with NOSCs TNCs and GNCCs TNCCs to correlate and deconflict incident reporting information 4 If necessary potentially compromised assets will be removed from the network prior to reporting an incident C-13 Enclosure C CJCSM 6510 01A 24 June 2009 e Reporting will be done on a network other than the potentially compromised system to remove the possibility of an attacker monitoring the compromised network and potentially intercepting the incident report 5 Reporting Timelines a The reporting timelines establish the minimum requirements and timeframes for which incidents will be reported They are designed to expedite reporting of incidents where national-level coordination and action may serve to mitigate or prevent damage to the GIG b All incidents will be reported IAW the requirements and timeframes defined in Appendix A to Enclosure C Reporting Timelines c These requirements will not preclude the rapid reporting of any event or incident deemed necessary by the responsible CNDSP or CCIR and do not supersede any requirements established by USSTRATCOM CND CCIRs These CCIRs may be found on USSTRATCOM JTF-GNO's Web site at http www jtfgno smil mil site index cfm Page CCIR-PIR d Additionally as noted in Appendix A to Enclosure C Reporting Timelines some incidents are also reportable using OPREP 3 reporting procedures and structure IAW reference k 6 Reporting Formats a The preferred method for reporting incidents is through the JCD The JCD provides a structured format to conveniently record and submit information about the reportable event or incident to a central database maintained by USSTRATCOM JTF-GNO b JCD Report Format 1 The JCD reporting format is used by Tier Two CNDSP7 to report incidents to the USSTRATCOM JTF-GNO It is the primary reporting format and mechanism for submitting reports 2 The format can be found on the JCD Web site at http jtidweb2 cert smil mil jcd 7 Tier Two CNDSPs are responsible for ensuring incidents and events are reported in JCD However C S As and field activities in conjunction with their Tier Two CNDSP may authorize their Tier 3 organizations to also report incidents in JCD C-14 Enclosure C CJCSM 6510 01A 24 June 2009 c General Report Format 1 This format is used to report incidents and reportable events from Tier Three entities to respective Tier Two CNDSP CNDSPs are then responsible for submitting these reports into the JCD 2 Appendix B to Enclosure C General Incident Report Format lists the types of information that will be provided 3 The format provides a structure for initially reporting incidents and reportable events by JCD telephonically by secure fax or by other electronic means 4 On initial discovery of an incident not all information will be known however as much information as possible should be provided regardless of the means used to report Over time as additional information is identified follow-on reporting shall be made to complete the form 5 Information provided in this format is then used to submit an incident to the JCD 6 C S As and field activities may append more information to the report format to require further information for internal analysis or uses 7 As more information becomes available provide additional details as updates to the initial report in follow-on incident and reportable event reporting 8 In order for a report to be considered “complete ” it must contain at a minimum the information listed in Appendix B to Enclosure C General Incident Report Format 7 Reporting Considerations a In addition to the reporting requirements already described there are several other factors to consider when reporting incidents to include classification level and whether or not they involve personally identifiable information PII Both will have an effect and impose additional requirements on the reporting including the timeframes and methods b Loss or Suspected Loss of Personally Identifiable Information Data 1 PII is any information about an individual maintained by a DOD entity including but not limited to education financial transactions medical history and criminal or employment history It also includes information that can be used to distinguish or trace an individual's identity such as his or her C-15 Enclosure C CJCSM 6510 01A 24 June 2009 name social security number date and place of birth mother's maiden name biometric records etc including any other personal information linked or linkable to an individual 2 Incidents8 that also involve loss or suspected loss of PII data require DOD components to augment their processes to report this activity separately IAW reference l 3 The DOD has established guidance to protect PII This is mandated through legal federal and DOD guidance e g references e f l m and n C S As and field activities must ensure that PII not explicitly cleared for public release is protected IAW DOD policy This includes meeting or exceeding requirements described in references o and reference p 9 4 The policy applies to any DOD-owned or controlled ISs or services regardless of classification or sensitivity that receive process store display or transmit DOD information 5 Loss or suspected loss of PII shall be reported as follows a Reports must be submitted to the US-CERT within one hour b Reports must be submitted to the C S A or field activity Privacy Office POC within 24 hours The POC then reports to the DOD Privacy Office within 48 hours or as established by the Defense Senior Privacy Official c Loss of PII information on DOD or intelligence community networks must also be reported to US-CERT within one hour 6 Criteria for determining the risk include a Will the breach cause harm b What is the risk level c How many individuals are affected d Is the information accessible and usable 8 Incidents or Events e g CAT 1 2 or 5 could involve the loss of PII and require additional reporting requirements 9 Available from http www whitehouse gov omb memoranda fy2006 m06-19 pdf C-16 Enclosure C CJCSM 6510 01A 24 June 2009 7 Failing to protect PII can result in civil penalties against DOD components and criminal penalties against individuals c Classification Level The security classification of an incident is determined IAW reference h Incident reports will be protected based on their classification and sensitivity All incidents occurring on the SIPRNET shall be classified at least SECRET Incident classifications higher than SECRET depend on the classification level of the material involved e g TOP SECRET or compartmented overall impact and compromise potential Incidents occurring on NIPRNET systems will be unclassified and marked Controlled Unclassified Information CUI unless exploitation of information in the report by an adversary would result in a classified information compromise or significant negative impact on a national security mission 8 Exercise Reporting a Incident and event categorization and reporting will be IAW this manual b USSTRATCOM JTF-GNO will provide separate guidance on identifying exercise incidents events reported in the JCD and the processes for deconflicting real-world and exercise activities C-17 Enclosure C 6510 01A 24 June 2009 INTENTIONALLY BLANK 18 Enclosure CJCSM 6510 01A 24 June 2009 APPENDIX A TO ENCLOSURE C REPORTING TIMELINES 1 Introduction a The Reporting Timelines establishes the minimum requirements and timeframes by which incidents will be reported USSTRATCOM JTF-GNO may issue changes to reporting requirements and timeframes based on on-going operations or activities The Reporting Timelines are designed to expedite reporting of incidents where national-level coordination and action may serve to mitigate or prevent damage to the GIG b Included below are definitions for the Reporting Timelines columns 1 Impact The degree to which an incident or event adversely impacts or has the potential to impact the successful accomplishment of operational missions and the confidentiality integrity or availability of DOD systems and networks Impact helps characterize the estimated damage or loss resulting from the incident and contributes to the collective understanding of the DOD-wide security posture Additional information is available in Appendix C to Enclosure D Impact Assessment Matrix 2 Initial Notification to Next Tier The required notification timeframe between the discovery or awareness of an incident or event and the initial notification to the designated upstream Tier Initial notification serves to provide preliminary information that an incident or event has occurred to those responsible for directing response actions within organizations and commands 3 Initial Report to Next Tier The required reporting timeframes between the discovery or awareness of an incident or event and the initial electronic submission of a report such that it is available to the upstream Tier Initial reports serve to provide details about the incident or event and contain preliminary analysis to characterize the potential technical and organizational implications Initial reports are updated throughout the lifecycle as further analysis and information become available 4 Initial Submission to JCD The required reporting timeframe between the discovery and awareness of an incident or event and the initial entry into the JCD such that it is available to the upstream Tier s The JCD is the central catalog for managing event and incident reports Consistent and comprehensive reporting is required in order to accurately characterize the C-A-1 Appendix A Enclosure C CJCSM 6510 01A 24 June 2009 threat environment and security posture of the GIG such that strategic and tactical COA may be developed and implemented 5 Minimum Reporting This defines the lowest Tier for which an incident or event will be reported The minimum reporting requirement can be changed by USSTRATCOM direction Category Impact Initial Notification to Next Tier 1 High Within 15 minutes Root Level Intrusion Incident Moderate Low 2 High User Level Intrusion Incident Moderate Initial Report to Next Tier Initial submission to JCD Minimum Reporting Within 4 hours Within 6 hours Tier 1 Within 2 hours Within 8 hours Within 12 hours Tier 1 Within 4 hours Within 12 hours Within 24 hours Tier 1 Within 4 hours Within 6 hours Tier 1 Within 2 hours Within 8 hours Within 12 hours Tier 1 Low Within 4 hours Within 12 hours Within 24 hours Tier 1 Any Within 4 hours Within 12 hours Within 24 hours Tier 2 Within 4 hours Within 6 hours Tier 1 Within 15 minutes 3 Unsuccessful Activity Attempt Event High 4 Denial of Service Incident Moderate Low Within 15 minutes Within 15 minutes Within 4 hours Within 6 hours of discovery As directed by C S A and Field Activity Guidance Tier 1 As directed by C S A and Field Activity Guidance As directed by C S A and Field Activity Guidance Within 4 hours Within 12 hours Within 48 hours Tier 2 As directed by C S A and Field Activity Guidance As directed by C S A and Field Activity Guidance As directed by C S A and Field Activity Guidance Tier 2 Tier 1 5 NonCompliance Activity Event 6 Reconnaissance Event All NonCompliance Events Any Table C-A-1 Reporting Timelines C-A-2 Appendix A Enclosure C CJCSM 6510 01A 24 June 2009 High 7 Malicious Logic Incident 8 Investigating Event Within 15 minutes Within 4 hours Within 6 hours Tier 1 Within 2 hours Within 8 hours Within 12 hours Tier 2 Low As directed by C S A and Field Activity Guidance As directed by C S A and Field Activity Guidance As directed by C S A and Field Activity Guidance Tier 2 N A Within 2 hours of notification10 Consistent with the most severe possible interpretation Within 24 hours Tier 2 N A N A Within 72 hours Tier 2 Moderate 9 Explained Anomaly Event Within 24 hours Table C-A-1 Reporting Timelines continued 2 Reporting Timelines a Reporting timelines will be based on the current and potential impact of the incident or event on the confidentiality availability and integrity of organizational operations organizational assets or individuals b Additionally abbreviated reporting timelines give the CNDSP more time to collect process and correlate information concerning reportable events and incidents before reporting them at the national level c Follow-on reports are submitted as directed by the higher CND organizations or headquarters 1 If no direction is provided follow-on reports are submitted within 8 hours of the discovery of new information about the incident 2 Follow-on reports provide the raw details needed for the regional or global teams to understand the technical nature of the problem and is merged with information obtained from other reports to highlight regional or global trends 3 This report is forwarded IAW Table C-1 Reporting Vehicles 10 Acknowledgement from the asset owner that they are investigating the issue C-A-3 Appendix A Enclosure C CJCSM 6510 01A 24 June 2009 d The USSTRATCOM JTF-GNO provides feedback to reporting organizations as more information becomes known Subordinate layers in the reporting channels are responsible for relaying this information to the originating point and developing procedures to disseminate the information as appropriate within their constituent communities NOSCs TNCC or GNCC within the C S A and field activity and or TNC within their AOR The format is also used by NOSCs or combatant command TNCCs and GNCCs and or TNC organizations to report information developed through observation correlation analysis or other means C-A-4 Appendix A Enclosure C CJCSM 6510 01A 24 June 2009 APPENDIX B TO ENCLOSURE C GENERAL INCIDENT REPORT FORMAT 1 General Incident Report Format Table C-B-1 describes the report format used for an initial report of an incident or reportable event The format provides a structure for reporting initial incidents by secure fax telephonically or by other electronic means Initial reports may be incomplete Reporting organizations should balance the necessity of timely reporting reports with critical information versus complete reports those with all blocks completed Timely reporting is vital and complete information should follow as details emerge Field Description Incident Tracking Information Reporting Incident Number Identify the reporting CNDSP e g CERT CIRT reference number for tracking the incident Organization Tracking Identify the organization that is responsible for tracking the incident Reporting Information Name The first and last name of the individual reporting the incident Organization The name of the organization reporting the incident Telephone The telephone or Defense Switch Network DSN number that should be used to reach the reporting entity for additional information This may be the number to an individual or central number for the organization e g operations center E-mail The e-mail address that should be used to reach the reporting entity for additional information This may be the e-mail address of an individual or central e-mail for the organization e g operations center Fax The fax number that should be used to reach the reporting entity for additional information Alternative Contact The name telephone number and e-mail of an alternative contact in the event the reporter is not available Table C-B-1 General Incident Report Format C-B-1 Appendix B Enclosure C CJCSM 6510 01A 24 June 2009 Field Description Categorization Information Primary Incident Category Identify the primary underlying cause of the incident being reported IAW Appendix A to Enclosure B Incident and Reportable Event Categorization Secondary Incident Category Identify any secondary causes for which the incident is being reported if more than one category applies IAW Appendix A to Enclosure B Incident and Reportable Event Categorization Attack Vector Identify attack vector IAW Appendix A to Enclosure D Attack Vectors System Weaknesses Identify attack vector in accordance with Appendix B to Enclosure D System Weaknesses Incident Status Status Status of the incident “OPEN” “INVESTIGATING” “MITIGATED” or “CLOSED” Incident Start Date ZULU DTG of the earliest event that was incorporated into the incident Provide year month day hour minute seconds Incident End Date ZULU DTG that incident actually ended Provide year month day hour minute seconds Last Update ZULU date time group DTG of the last time the report was updated Provide year month day hour minute seconds CERT Date Reported ZULU DTG of when the incident was first reported to the CNDSP Provide year month day hour minute seconds System Classification Report the Classification of the system under attack i e UNCLASSIFIED CONFIDENTIAL SECRET TS SCI This field is NOT used to classify the reported incident Action Taken Indicates what action has been taken in response to the incident Include notifications and associated reports Include whether a copy of a media was taken image hard drives or logs collected and disposition of mediums and logs Table C-B-1 General Incident Report Format continued C-B-2 Appendix B Enclosure C CJCSM 6510 01A 24 June 2009 Field Description Technical Details Event Incident Description Provide a narrative description of the incident with technical details Include DTGs of significant events start stop or change of activity State the use of the targeted system and whether the system is online or offline Indicate whether the incident is ongoing Root cause s Identify the system specific cause s of the incident The root cause expands upon the identified attack vector s and system weaknesses by precisely identifying the sets of conditions allowing the incident to occur Source IP and port Provide source IP with resolution data identifying owner and country of source IP machine Note the source IP could be a DOD IP If the intruder is known provide all identifying information to include objective of intruder if known Source IP is not necessarily indicative of true origin Footnote the source of resolution attribution data i e ARIN org Insert “Not Applicable” for incidents that do not involve source IP or port Intruder s if known Identify the intruder or group responsible for the incident if known Origin country Identify the source IPs country of origin Target IP s and port Provide target IP with resolution identifying responsible command and physical location of target IP machine e g B C P S etc Footnote the source of resolution attribution data i e DDD NIC nslooklup and whois If machine is behind a NAT’ed network address translation enabled router or firewall then also provide the wide area network WAN routable address i e the Internet SIPRNET routable IP address Technique tool or exploit used Identify the technique tool or exploit used Operating system OS and version of OS Record the operating system and version number of the operating system where the incident occurred Use of target e g Web server file server host If applicable for what the intruder attacker used the target system for after it was exploited if applicable Method of detection Identify how the intrusion was detected e g external notification log files network monitoring IDS user Table C-B-1 General Incident Report Format continued C-B-3 Appendix B Enclosure C CJCSM 6510 01A 24 June 2009 Field Description Sites Involved Major Command Identify the C S A or field activity targeted based on owner of target IP address e g USN USAF USSTRATCOM and Defense Information Systems Agency DISA Combatant Command Identify the combatant command geographical and or functional targeted based on the owner of the target IP address Physical Location base camp post or station Identify the B C P S affected by the intrusion and or owns the target IP and where the physical system resides DOD Network Identify network on which the incident occurred e g NIPRNET or SIPRNET Detecting Unit or Organization The name of reporting unit or organization Affected Unit or Organization The name of reporting affected unit or organization Impact Assessment Systems Affected Number of systems affected by the incident Operational Impact Identify any detrimental effects on ability to perform mission by organization directly affected Include organizations affected e g due to being network users Include impact on other organization s ability to perform mission This includes an operational impact assessment in accordance with Appendix C to Enclosure D Impact Assessment Matrix Technical Impact Identify any detrimental effects on the technical capabilities of the organization e g data loss service degradation effects on other systems This includes a technical impact assessment in accordance with Appendix C to Enclosure D Impact Assessment Matrix If the technical impact cannot be determined for some reason e g limited details or analysis use Table C-B-2 Initial Impact Assessment for a limited impact assessment Staff Hours Lost This is reported as an update record and may cause the impact field to be updated Amount of time technical support is required to identify isolate mitigate resolve and recover from the attack and repair the attacked system do not include analyst time spent analyzing the incident Encompassing Cost Costs both direct and indirect to include all actions from initial detection through investigation response and recovery This should include but is not limited to workforce expenses hardware software travel shipping costs and lost productivity Table C-B-1 General Incident Report Format continued C-B-4 Appendix B Enclosure C CJCSM 6510 01A 24 June 2009 Field Description Additional Reporting or Coordination OPREP 3 Reporting State whether the incident was reported via OPREP 3 and what headquarters received the report Attach a copy of the OPREP 3 report to this incident report if applicable Intel Reporting State whether the incident was reported to the IC If reported identify the agency that was contacted and any specific actions that have been coordinated LE CI Reporting State weather the incident was reported to the LE CI community If reported identify the agency that was contacted and any specific actions that have been coordinated Other Exercise Name Name of the exercise if applicable Operation Name Name of the operation or focused operation if applicable Table C-B-1 General Incident Report Format continued 2 Initial Impact Assessment Matrix The System Impact Matrix may be used to provide an initial impact assessment when submitting a report Initial assessment should be performed quickly even with limited details and analysis This table calculates impact using the type of device affected and the incident category It should only be used during the initial reporting process The more complete impact assessment conducted later in the incident handling process is done IAW Appendix C to Enclosure D Impact Assessment Matrix C-B-5 Appendix B Enclosure C CJCSM 6510 01A 24 June 2009 Incident and Reportable Event Category Network Device CAT 1 CAT 2 CAT 3 CAT 4 CAT 5 CAT 6 CAT 7 Backbone High High Low High Low Low Low Router High High Low High Moderate Low Low Network Management Security Server High High Low High Moderate Low Moderate Non-Public Server Moderate Moderate Low Moderate Moderate Low Moderate Public Server Low Low Low Moderate Low Low Moderate Workstation Low Low Low Moderate Low Low Moderate Table C-B-2 Initial Impact Assessment C-B-6 Appendix B Enclosure C CJCSM 6510 01A 24 June 2009 APPENDIX C TO ENCLOSURE C INCIDENT REPORTING DIAGRAMS 1 High-Level Overview of Reporting The following reporting scenario depicts the general DOD-wide process for how incidents are reported information is exchanged and feedback is provided back to the DOD community Figure C-C-1 High-Level Overview of Reporting C-C-1 Appendix C Enclosure C CJCSM 6510 01A 24 June 2009 2 Event Detected by Installation The following reporting scenario depicts the general process for how incidents detected at a DOD Installation e g B P C S are reported The actions outlined in process may occur simultaneously following the initial detection of an anomalous activity Figure C-C-2 Event Detected by Installation C-C-2 Appendix C Enclosure C CJCSM 6510 01A 24 June 2009 3 Event Detected within Combatant Command The following reporting scenario depicts the general process for how incidents detected within a combatant command are reported One of the key elements in this scenario is that the combatant command HQ is provided critical data necessary to maintain situational awareness to exercise their command and control authority within their AOR Figure C-C-3 Event Detected within Combatant Command C-C-3 Appendix C Enclosure C CJCSM 6510 01A 24 June 2009 4 Event Detected by External CND Group The following reporting scenario depicts the general process for how incidents detected by an external entity affecting a DOD Installation e g B P C S are reported Figure C-C-4 Event Detected by External CND Group C-C-4 Appendix C Enclosure C CJCSM 6510 01A 24 June 2009 5 Event Detected by Computer Network Defense Service Provider The following reporting scenario depicts the general process for how incidents detected by a Tier Two CNDSP affecting a DOD Installation e g B P C S are reported Figure C-C-5 Event Detected by CNDSP C-C-5 Appendix C Enclosure C 6510 01A 24 June 2009 INTENTIONALLY BLANK Appendix Enclosure CJCSM 6510 01A 24 June 2009 ENCLOSURE D INCIDENT ANALYSIS 1 Introduction a Incident analysis is the series of analytical steps taken to figure out what happened in an incident The purpose of this analysis is to understand the technical details root cause s and potential impact of the incident This understanding will help to determine what additional information to gather how to coordinate information sharing with others and how to develop a course of action and response If there is a chance the incident might require the pursuit of disciplinary or criminal actions the appropriate LE CI organization must be contacted to ensure proper legal procedures are taken in the investigation of the incident b This section provides additional guidance on incident analysis requirements for reportable events and incidents Further requirements will be articulated in OPORDs issued by relevant commands c The primary objectives for the incident analysis process are 1 Identify the root cause s of the incident through technical analysis 2 Ensure the accuracy and completeness of incident reports 3 Characterize and communicate the potential impact of the incident 4 Capture the methods used in the attack and the security controls that could prevent future occurrences 5 Research actions that can be taken to respond to and eradicate the risk and or threat 6 Understand patterns of activity to characterize the threat and direct protective and defensive strategies d Technical analysis is iterative in nature It is conducted many times throughout the incident handling life cycle Some degree of analysis must occur in order to detect and adequately report an incident Once an incident has been reported it may go through several levels of analysis to identify the root cause s Each successive level requires personnel that possess more sophisticated skills and have access to additional tools or systems D-1 Enclosure D CJCSM 6510 01A 24 June 2009 e Incident analysis seeks to identify the root cause s of an incident and is required to fully understand the scope potential implications and extent of damage resulting from the incident Figure D-1 below illustrates the basic relationship between data preservation technical analysis root cause identification and system recovery Depending on the complexity of the incident and the level of analysis required the amount of time necessary to analyze an incident may vary from minutes to hours to months Figure D-1 Incident Analysis Relationship to Preserving Data and Recovering Systems f In some cases technical analysis may not be able to conclusively identify the root cause of an incident The intruder may have deleted or tampered with logs and files making them untrustworthy or the existence of multiple unpatched vulnerabilities may make it impossible or not worth the effort to try to identify which specific vulnerability was exploited In such cases it may be more expedient simply begin system recovery and hardening g The decision to restore a system without identifying the root cause s of the incident must be weighed carefully as it may leave the system vulnerable For example if the root cause of an incident stemmed from a missing patch in the baseline configuration a system restoration using the same baseline configuration will leave the system open to future compromise 2 Incident Analysis Framework D-2 Enclosure D CJCSM 6510 01A 24 June 2009 a The type of analysis conducted will depend on the nature of the incident under analysis Typically responding to an incident will require some combination of the following types of analysis 1 System Analysis The process of acquiring preserving and analyzing system artifacts e g log files or registry information that help characterize the incident and develop courses of action 2 Malware Analysis The process of identifying analyzing and characterizing reported software artifacts suspected of being adversarial tradecraft to help defense in depth mitigation actions and strategies CI activities and LE activities 3 Network Analysis The process of collecting examining and interpreting network traffic to identify and respond to events that violate the security policy or posture of the resources attached to the network or the network infrastructure and used to support computer security incident investigations b This set of categories is somewhat arbitrary as there are no clear lines of separation between them For example malware may leave traces on a system under analysis as well as in network data The principles of sound forensic data collection and analysis particularly in cases that may lead to legal prosecutions apply across all the above types of analysis c The level or depth of analysis conducted can often depend on the context of the analysis request or mission of the organization For instance some organizations may be tasked with recovering from a compromise and wish to determine the extent of the damage This may differ greatly from analysis required to support a law enforcement investigation where data preservation and chain of custody must be strictly managed d The level of incident analysis to be conducted will also vary depending on the incident category the operational and technical impacts and any identifiable attack vectors or system weaknesses It will also depend on the availability of relevant information for analysis and available resources 3 Computer Forensics Analysis a Computer forensics is considered the application of science to the identification collection examination and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody 11 Definition from NIST SP 800-86 “Guide to Integrating Forensic Techniques into Incident Response” reference n 11 D-3 Enclosure D CJCSM 6510 01A 24 June 2009 b CNDSPs will establish and maintain a computer forensics program IAW the Evaluators Scoring Metrics for the Certification and Accreditation of CNDSPs A computer forensics program will include the following 1 Policies including criteria for determining when forensics collection and analysis should be performed 2 Guidelines and procedures for forensic collection of evidence forensics analysis and chain of custody 3 Forensics staff technology and facility resources -- including trained and knowledgeable staff tools and equipment for forensic collection and analysis of evidence -- and necessary infrastructure such as a forensics lab c Many forensics collection and analysis tasks are similar to or overlap with other incident analysis activities which are generally more focused on gaining a technical understanding of the incident When these informationgathering and analysis activities are performed for forensics purposes the forensic activities focus on processing and preserving the authenticity and integrity of the data in a manner that ensures the evidence can be admissible in a court of law d For incidents to be investigated for computer crime incident handlers and first responders must understand proper forensics and evidence handling policies and procedures even if that means “hands off” until a trained analyst can start the proper evidence collection Data and information to be gathered for forensics analysis or evidence must be obtained and handled IAW various applicable laws possibly spanning many jurisdictions in order to ensure the authenticity and reliability of the information for forensics analysis as well as to be admissible in a court e Electronic data from a computer to be used for forensics and or evidence can consist of both volatile data and persistent data from the affected system s see paragraph 4 System Analysis The use of approved forensics tools and methods to collect and handle volatile and non-volatile data will help ensure that incident handlers and first responders satisfy forensics and evidence requirements f Forensics process 1 One model for the forensics process presented in reference q describes four basic phases D-4 Enclosure D CJCSM 6510 01A 24 June 2009 a Collection The first phase in the process is to identify label record and acquire data from the possible sources of relevant data while following guidelines and procedures that preserve the integrity of the data Collection is typically performed in a timely manner because of the likelihood of losing dynamic data such as current network connections as well as data from battery-powered devices e g cell phones or Personal Digital Assistant PDA b Examination Examinations involve forensically processing large amounts of collected data A combination of automated and manual methods is used to assess and extract data of particular interest while preserving its integrity c Analysis The next phase is to analyze the results of the examination using legally justifiable methods and techniques to derive information that addresses the questions driving the analysis d Reporting The final phase is reporting the results of the analysis This may include describing the methods used explaining how tools and procedures were selected determining what other actions need to be performed e g forensic examination of additional data sources securing identified vulnerabilities improving existing security controls and providing recommendations for improvement to policies guidelines procedures tools and other aspects of the forensic process The formality of the reporting step varies greatly depending on the situation 2 The reporting phase of forensics can also present the evidence and the results of the analysis in a court of law Individuals involved in conducting any activities for forensics purposes particularly the collection phase must understand the forensics process and be prepared to explain their actions in court g Forensics policies guidelines and procedures 1 In accordance with reference q forensics policies “should allow authorized personnel to monitor systems and networks and perform investigations for legitimate reasons under appropriate circumstances ” In addition each organization “should ensure that their policies contain clear statements that address all major forensic considerations such as contacting law enforcement performing monitoring and conducting regular reviews of forensic policies guidelines and procedures ” C S As and field activities CND incident handlers and first responders must understand and abide by their organization’s forensics policies D-5 Enclosure D CJCSM 6510 01A 24 June 2009 2 Forensics guidelines and procedures a Reference q provides organizations a starting point for developing a forensic capability in conjunction with extensive guidance provided by legal advisors law enforcement officials and management b The guidelines and procedures should support the admissibility of evidence into legal proceedings including 1 Information on gathering and handling evidence properly 2 Preserving the integrity of tools and equipment 3 Maintaining the chain of custody 4 Storing evidence securely c Although it may not be feasible to record every event or action taken in response to an incident having a record of the major events and actions taken help to ensure that nothing has been overlooked and explains how the incident was handled This documentation can be useful for case management report writing and testifying Keeping a record of the dates and times that people worked on an incident including the time needed to recover systems can also help calculate the costs of damages Also handling evidence in a forensically sound manner puts decision makers in a position where they can confidently take the necessary actions d Guidelines and procedures for forensics evidence collection handling and analysis will be more extensive and less flexible than those for general incident data collection and analysis Forensics processing requirements generally exceed typical incident collection and analysis procedures in the following areas 1 Increased preparation and use of specialized tools for acquisition and analysis of evidence 2 Increased level of detail in documenting the scene e g recording model numbers and serial numbers of equipment photographing hardware peripherals wiring and network connections photographing the monitor screen etc 3 Stricter attention to the order in which volatile system data is acquired to avoid loss of volatile data 4 Increased care taken to capture persistent data while preventing contamination of evidence e g removing seizing hard drives and D-6 Enclosure D CJCSM 6510 01A 24 June 2009 storage media or creating forensically sound duplicate images on prepared storage devices using hardware and or software write blockers to prevent changes to data creating hashes of the suspect data and duplicate images to verify authenticity 5 Increased documentation of steps taken during evidence examination and analysis including date- and time-stamping of all actions taken 6 Increased controls limiting access to evidence and maintenance of a chain of custody 7 Different details to be included in reports of the analysis results different audience 8 Different evidence storage retention timeframes policies and procedures 4 System Analysis a System analysis is the gathering and review of all information from or about the affected system s to further incident analysis and understand the full scope of the incident The system information to be analyzed typically includes various logs files configuration settings records of currently loggedon users past connections logins running processes open files and changes to files or system settings access control lists ACLs registries permissions b If the system has been compromised care must be taken when using any programs on the suspect system that may have been modified or in trusting the validity of logs that may have been tampered with and altered replaced or removed A CND or incident response toolkit containing trusted copies of system analysis tools should be used The toolkit should include appropriate operating system tools to examine the suspect system including tools to analyze 1 Files and logs – examine text files binary executable files archive files 2 Processes – list processes list processes that open a socket 3 Connections – list open sockets or ports list systems that recently connected c As part of the data collection effort the first responder must determine what has been done to a system and by whom This includes not just the attacker but system and network administrators and system users The first D-7 Enclosure D CJCSM 6510 01A 24 June 2009 responder should have an initial set of questions to ask to those involved and a log book for recording all the information gathered First responders must document everything they can including all actions they or anyone else involved take during the investigation or response A new log must be created for every incident or case During the data collection the first responder will document the following in the log book 1 Who is performing the forensic collection 2 The history of executed analytical tools and commands done during the collection 3 Any generated tool and command output 4 The date and time of the executed commands and tools 5 Expected system changes or effects e g changed media access control times for specific files as first responder tools are executed 6 Any other information pertaining to the response including artifacts or notes about the system its configuration and its physical location d Data obtained for forensics analysis or evidence must be collected using forensically sound methods and tools that capture the relevant data while preventing or minimizing evidence contamination Forensics methods and tools are specifically designed to enable the following 1 Collection of volatile data while minimizing the footprint left on the suspect system Volatile data is any data stored in system memory system registers cache and RAM that will be lost when the system loses power or is shut down If the system is rebooted or shutdown this data may be permanently lost Examination of volatile data can provide insight into the state of the system and currently running processes and potentially help determine a logical timeline identifying the date time and or cause of the incident 2 Collection of persistent data while preventing data on the suspect system from being overwritten Persistent data includes data in the system’s hard drives and removable storage media that will not be changed when the system is powered off This often includes disk imaging the process of creating an exact duplication of the original disk A disk image includes files as well as hidden files deleted data slack space swap files and unallocated space 3 Documentation of the process typically using a forensic collection log book The documentation should contain a time-stamped record of all actions taken during collection of the evidence The purpose of the D-8 Enclosure D CJCSM 6510 01A 24 June 2009 documentation is to enable the process to be validated and ensure that the digital evidence is an exact representation of the original data e Detailed steps for conducting system analysis on various operating systems and equipment are beyond the scope of this manual The analyst who performs such analyses however must be knowledgeable and have the necessary tools to access and examine the following types of information on the affected system s 1 Volatile data Any data stored in system memory system registers cache and RAM that will be lost when the system loses power or is shut down a Volatile system data and time examples include 1 System profile 2 Current system data and time 3 Command history 4 Current system uptime 5 Running processes 6 Open files startup files and clipboard data 7 Logged on users 8 Dynamic-linked libraries DLLs or shared libraries b Volatile network data examples include 1 Open connections 2 Open ports and sockets 3 Routing information and configuration 4 Network interface status and configuration 5 Address resolution protocol ARP cache 2 Persistent non-volatile data Data in the system’s hard drives and removable storage media that will not be changed when the system is powered off examples include D-9 Enclosure D CJCSM 6510 01A 24 June 2009 1 System log files 2 Event Viewer files 3 Application logs 4 Disk image – exact duplicate of the original disk which includes files as well as hidden files deleted data slack space swap files and unallocated space f While conducting the system analysis the analyst may need to perform other related tasks These tasks include looking up hostnames and IP addresses or tracing them back to their sources searching for hidden or deleted files checking the integrity of system binaries checking for unauthorized processes or services identifying potential malware or examining other machines on the local network g After the system analysis has been completed new details will emerge requiring a follow-on report Information fields in the initial incident report may also need to be updated h For a summary of resources useful for investigating computer security incidents also see reference ii 5 Malware Analysis a Malware Analysis is the process of analyzing and capturing the capabilities of software artifacts suspected of being malicious code It is an essential step in determining the full scope of an incident Malware is defined as software designed and or deployed by adversaries without the consent or knowledge of the user in support of adversarial missions e g gaining access to resources or information cyber strikes C2 operations b Uncovering an adversary’s tools techniques procedures and motivations will aid in discovering other affected or vulnerable systems establishing a more concrete framework for attribution and development of additional defensive measures c Individuals analyzing or otherwise handling malware are expected to 1 Handle with care Adversarial tradecraft is employed by the adversary as a weapon and should be handled as such It is important when handling a sample suspected of being malicious that proper care is taken to ensure that the sample does not affect any operational systems or networks If possible once a sample is identified it should be moved to a separate system that is completely isolated for analysis Any physical media used to transport D-10 Enclosure D CJCSM 6510 01A 24 June 2009 samples should be labeled to indicate that its contents are potentially malicious 2 Catalog all software artifacts All artifacts suspected of being malware should be safely acquired preserved and submitted to the authorized malware catalogs for storage 3 Manage capability effectively Due to the large volume of artifacts that will likely be gathered as part of system analysis and because the process of analyzing malware can be extremely time and resource intensive it is unlikely that a complete end-to-end analysis of every artifact identified as malicious will be feasible For this reason it is important for all DOD CND personnel to understand the analytical resources available to them and to apply a measure of cost-benefit analysis to determine the depth of analysis to be performed on a given artifact Automated systems should be employed to increase the number of samples that can be processed where applicable 4 Perform analysis in an isolated environment Precautions must be taken when performing analysis to prevent against the execution of code that may adversely affect DOD networks or systems Malware analysis shall be done in a safe and isolated environment segregated from other DOD systems In this isolated environment the intentional or unintentional execution of the code does not violate the implicit or explicit security policies of the system For example isolated environments may include a malware analysis laboratory virtualization environment or an analyst workstation disconnected from the network and intended for malware analysis This prevents the unintentional compromise of additional systems or sensitive information d Policies shall be in place governing what media can be connected to an analysis machine For example it is relatively common for malware to use universal serial bus USB keys to spread so policy governing the usage of USB keys and other forms of portable storage must be established e Preserve the original software artifacts It is fairly common for malware to attempt to avoid detection by modifying and or deleting the original malicious file s When transferring malware between systems the file should be altered to avoid accidental execution It is however important that the person receiving the sample knows how to return it to its initial state f Levels of Depth for Malware Analysis 1 Malware analysis can be performed at varying degrees of depth Each successive level requires personnel that possess more sophisticated skills and have access to additional tools or systems Depending on the complexity of the malware and depth of analysis required the time necessary to complete the request can vary from minutes to hours to months Therefore when D-11 Enclosure D CJCSM 6510 01A 24 June 2009 requesting malware analysis asking specific questions about information of interest to the mission helps expedite results 2 The diagram Figure D-2 below illustrates the different degrees of depth for malware analysis After each stage the decision must be made as to whether additional information is needed If additional information is needed the next successive level of analysis begins If no additional data is needed then the analysis should be recorded and appropriately communicated Figure D-2 Levels of Depth for Malware Analysis 3 Surface analysis a Surface analysis involves quick checks to characterize the sample within the context of the analysis mission b Common surface analysis techniques include file type identification strings extraction public source analysis and comparative analysis with previously analyzed artifacts The results of this analysis should either produce an actionable result in the context of the request or be used to help direct additional analysis as required D-12 Enclosure D CJCSM 6510 01A 24 June 2009 c Potential information to be gained through surface analysis includes the following 1 Basic determination of nature and intent 2 Identification of strings in binary files 3 Cryptographic hashes 4 Antivirus software detection status 5 File sizes 6 File type identification 7 File attribute information 8 Packer identification 9 Signature-based detection status d While useful for quick malware characterization surface analysis can produce results based on an incomplete picture of the malware sample Surface analysis does not accurately determine program functionality For example surface analysis may produce useful matches against third-party information but the third-party information may be incomplete or inaccurate e Analysis missions requiring a high degree of assurance shall not rely solely on surface analysis 4 Run-time Analysis a Run-time analysis is the controlled execution of the malware sample in an isolated environment instrumented to monitor observe and record run-time behavior without impacting mission-critical systems and infrastructure b Although run-time analysis may provide additional information relative to surface analysis run-time analysis is generally limited to observation of default execution paths of malware samples Malware samples may contain unexercised functionality or demonstrate alternate behavior in different run-time environments c Potential information to be gained by performing run-time analysis includes D-13 Enclosure D CJCSM 6510 01A 24 June 2009 1 Network touch points addresses protocols ports etc 2 File system and registry activity 3 Vulnerabilities or weaknesses in particular run-time environments 4 System service daemon interactions 5 Dynamic unpacking of packed executable files 6 Success of remediation techniques in particular run-time environments 7 Suggestions of adversarial intent low degree of confidence d Note Subsequent surface analysis of unpacked binaries may yield additional results and could possibly negate the need for further resource expenditure 5 Static Analysis a Static analysis focuses on examining and interpreting the contents of the malware sample in the context of an analysis mission Files of many types particularly text files Web page scripts and source code files can be analyzed without malware sample execution or disassembly In the case of a binary if a complete understanding of the malware sample is necessary reverse engineering is required b Potential information to be gained by performing static analysis includes 1 Static unpacking of packed executables 2 Definitive understanding of program source code confidence 3 Determination of adversarial intent high degree of 4 Deobfuscation of obfuscated data 6 Reverse Engineering a The most in-depth analysis reverse engineering is highly complex and consists of disassembly of malware sample executable files and interpretation of the assembly language Reverse engineering is time-intensive D-14 Enclosure D CJCSM 6510 01A 24 June 2009 and requires extensive technical knowledge and specialized tools It is the only method of analysis that can produce a definitive or complete understanding of a malware sample Reverse engineering analysis can range from addressing particular problem scope in order to answer a very few specific questions to extensive reverse engineering all of the code in a malware sample in order to understand complete functionality b Potential information to be gained by performing reverse engineering includes 1 Manual unpacking of packed executable files 2 Understanding of obfuscation or encryption techniques 3 Definitive understanding of malware capabilities 4 Characterization of malware sophistication 5 Comparison of capabilities across malware samples g Cataloging Malicious Code 1 All software artifacts suspected of being malware must be safely acquired preserved and cataloged 2 Cataloging of incident-related artifacts provides structured storage of pertinent malware logs and related analysis Any malware uncovered throughout the incident response process must be cataloged to the JMC Additional guidance may be found in Enclosure G CND Incident Handling Tools – Joint Malware Catalog Maintaining a central catalog facilitates and enhances correlation and information sharing within the DOD incident response community 3 Any analytical products that are created should be shared safely both horizontally and vertically to the greatest extent possible to ensure that the resources expended can be best utilized to improve the Department of Defense’s overall situational awareness and defensive posture h Requesting Malware Analysis 1 Analysis of malware samples is required to accurately characterize the capabilities of the malware The scope complexity and depth of malware analysis requests may differ across DOD and CND organizations For instance some components may be tasked with recovering from a compromise and wish to determine the extent of damage done Intelligence organizations may D-15 Enclosure D CJCSM 6510 01A 24 June 2009 conduct analysis to gain technical insights to support attribution or to support counterintelligence activities 2 When requesting malware analysis the requestor should specify the questions about the malware requiring an answer and identify any specific information required to support the mission Malware analysis is resource intensive and the depth of analysis performed should be no more than is absolutely required Effective management of analysis requests is critical to managing an effective malware analysis capability 3 When requesting analysis of a malware sample Table D-1 should be used to assist in specifying the analysis information required within the context of the mission Level of Analysis Information Produced from Analysis Surface Analysis − − − − − − − Determine basic nature and intent Identification of strings in binary files Cryptographic hashes Antivirus software detection status File sizes File type identification File attribute information Packer identification − Signature-based detection status Runtime Analysis Determine adversarial intent with low degree of confidence − Network touch points addresses protocols ports etc − File system and registry activity − Vulnerabilities or weaknesses in particular run-time environments − System service daemon interactions − Dynamic unpacking of packed executable files − Success of remediation techniques in particular run-time environments Static Analysis Determine adversarial intent with high degree of confidence Reverse Engineering − − Static unpacking of packed executables Definitive understanding of some portion of program source − Deobfuscation of obfuscated data − Definitive understanding of − − malware analysis capabilities − − Manual unpacking of packed executable files Understanding of obfuscation or encryption techniques Definitive understanding of malware capabilities Characterization of malware sophistication Comparison of capabilities across malware samples Table D-1 Levels of Analysis for Requesting Malware Analysis D-16 Enclosure D CJCSM 6510 01A 24 June 2009 5 Network Analysis a Network security analysis consists of the collection examination and interpretation of network traffic to identify and respond to events that violate the security policy or posture of the resources attached to the network or the network infrastructure b Analyzing an adversary’s use of network resources and uncovering the network interactions that occurred during an intrusion aid in discovering other affected or vulnerable systems It also helps in the development of additional defensive measures c Network analysis should be an ongoing activity with analysts constantly studying and monitoring the normal operation of the network This should include constructing and updating a baseline of the inventory of hosts and application servers Because the most serious incidents may not be detected by automated analysis or IDS analyst understanding of the network provides the best chance of noticing unusual patterns associated with the malicious activity Once in an incident response situation this preparatory work will pay significant dividends as the incident response team works through the process described in Enclosure B Incident Handling Methodology d Network Analysis Capabilities The network analysis capabilities required for CND analysis across DOD include the following 1 I W Appropriate use of intelligence information to understand threats to the network both external and internal 2 AS W Detection of known and suspected malicious activity as well as sharing of such information for improved I W capability across the Department of Defense 3 Situational Awareness Understanding of the current network security posture including internal assets and their vulnerabilities normal and abnormal traffic patterns and defensive measures in place These goals are interdependent and none can be fully achieved without the others e Network Analysis Technologies 1 Some fundamental technology approaches that form the building blocks of network analysis capabilities include a Wire speed network capture and or examination b Traffic summarization D-17 Enclosure D CJCSM 6510 01A 24 June 2009 c Pattern matching d Protocol analysis at all layers of the protocol stack e Behavioral analysis f Statistical anomaly detection g Correlation between data sources 2 All network monitoring technologies should be provisioned configured and evaluated to achieve the following minimum requirements a The ability to operate at the bandwidth levels experienced at the deployment point up to and including link saturation while successfully collecting and or examining all traffic no packet loss or loss of capability b Pattern matching engines support “regular expressions” or a similarly flexible pattern expression language c Signature engines permit the operator to provide custom signatures to permit DOD-specific signature development according to timely I W information d Network sensors perform IP fragment reassembly to ensure correct parsing of transport layer headers e Network sensors that examine the application layer perform Transmission Control Protocol TCP stream reassembly to ensure correct parsing of content data While there is some difficulty in the emulation of the behavior of TCP IP stacks on destination hosts e g differences in the handling of URG pointers a generic reassembly protocol is sufficient to fulfill the requirement f Anomaly detectors achieve acceptable accuracy rates as defined by the alert consumers including appropriate or adjustable parameter settings to maximize accuracy in the deployed network f Network Analysis Methodology Network analysis comprises data sources data collection and data analysis 1 Data Sources Network traffic consists of event session full content and statistical data D-18 Enclosure D CJCSM 6510 01A 24 June 2009 a The availability of data sources will vary based on the complexity of the network and level of network instrumentation in place b Acquiring some data sources may require coordination across DOD elements This data may reside on the local workstations network devices monitoring instrumentation or other network security mechanisms 2 Data Collection The collection of data focuses on gathering network and transport header information particularly source and destination addresses and ports content and content-based information from full packet capture to specific application parameters such as Uniform Resource Locators URLs or domain resolution data traffic summaries and alerts based on matches on patterns or models of malicious activity e g IDS alerts Specific technologies that provide this information change over time to address new threats and to incorporate novel approaches to address new and existing threats However all DOD entities or their CNDSPs must at a minimum collect data from the following sources a Network Log Data This data includes logs of all network connections passing the network boundary at a connection summary level e g network flow records or firewall logs or better with a log retention policy that prioritizes data retention Collecting network logs internally internal routers or switches would further enhance this capability The entity or its CND service provider must have an active program of monitoring and analyzing its network log data b Intrusion Detection Data This must include at least pattern matching capability with an active signature management program to responsibly address current threat information as available to the incident response organization In general vendor-provided signatures would need to be supplemented with DOD-specific signatures to address targeted threats according to currently available I W information 3 Enhanced capabilities can be achieved by additionally collecting the following types of data a Full Packet Capture Data This data can provide complete insight into network transactions that occurred between hosts It can also allow for the reconstruction of network sessions that can provide a better characterization of the activity Full packet capturing enhances network logging capability but must be balanced with the increased cost and analytical overhead due to the much larger data volumes involved Data retention would typically be much shorter than for summary log data b Statistical and Behavioral Anomaly Detection Data and or Protocol Analysis This data can enhance IDS capabilities and contribute to a D-19 Enclosure D CJCSM 6510 01A 24 June 2009 deeper understanding of network behavior However the benefits must be balanced with the uncertainty inherent in these approaches c Intrusion Prevention System Data This data can be used to identify known malicious activity or attempted intrusions These systems may enhance network protection by blocking known malicious traffic but their benefits must be balanced with the potential for interference with production traffic Therefore these devices must be tuned to minimize false positives which means that intrusion detection capabilities which may simply mean non-blocking signatures on the same device must still be provided to detect intrusions missed by the tighter configuration of the IPS 4 Data Analysis Network data analysis helps identify anomalous and potentially malicious activity enumerate network resources involved in an intrusion and identify other systems that may be affected System and malware analysis will generally also be required to piece together the full event timeline Many exploits may not be identifiable as such based solely on network activity for example Some types of analysis that may be required include the following a Timeline Reconstruction What did the attacker do Identification of relevant hosts network connections and application events and placing these into an event timeline to organize the information about the incident This timeline would be used to correlate other event information gained from analysis of system logs file timestamps etc b Exploit Analysis What was exploited and how The examination of all traffic data sources in order to determine the nature of the exploit and assist in identifying the root cause s of the incident The analyst will have to understand the protocols involved and the network manifestation of the exploit c Retrospective Analysis What else did the attacker do Using traffic summaries or packet capture data the analyst reconstructs past network events relevant to the intrusion potentially identifying portions of the malicious activity that were missed by IDS systems This analysis is part of the process of identifying the full scope of the intrusion event The analyst will often have to iterate through the other types of analysis adding new events to the timeline and determining root cause s of other exploit activity g Analysts must have strong command of the analysis tools at their disposal and their organizations should support providing the analyst with the specialized training and continuing education to perform well in their role An automated analysis or alerting tool can only provide the beginning of an understanding of a security incident and only a skilled analyst provided with appropriate tools can complete the picture D-20 Enclosure D CJCSM 6510 01A 24 June 2009 6 Analysis and Correlation of Event and Incident Data Analysis and correlation of event and incident data occur at all levels as well as within various functional communities e g intelligence counterintelligence law enforcement To conduct this analysis and correlation it is important that all Tiers participate in comprehensive support of the reporting process Correlation of data enables the C S As and fields activities to identify traffic patterns trends and other relevant information that is used in determining the UDOP 7 Legal issues The following is provided as background information on legal issues impacting on incident analysis a A number of federal laws12 affect the monitoring and collection of electronic communications and data These laws cover various topics such as the searching and seizing of computers and data privacy electronic surveillance and rules of evidence 1 Different laws govern the monitoring of data in transit e g references r and s versus data in storage reference t 2 There may be additional state and local laws or international laws that similarly affect forensics activities b Incident handlers and first responders will conduct data acquisition for forensics evidence IAW guidance provided by legal advisors law enforcement officials and management c For example computer records are generally admitted as evidence under the reference u for records of regularly conducted activity If documented policies and procedures regarding network monitoring and incident response are followed this will help computer records to be admitted under this Federal Rules of Evidence Exception reference u whereas the lack of policies and procedures or ad hoc procedures may not d The DOJ Search and Seizure Manual13 provides guidance on related topics including searching and seizing computers with or without a warrant issues related to the Electronic Communications Privacy Act ECPA reference v issues related to the electronic surveillance in communications networks 12 Relevant laws include the U S Constitution 4th and 5th amendments U S statutory law 18 U S C sections 2510-22 2701-12 3121- 27 and Federal Rules of Evidence hearsay authentication and identification For more information see http www cybercrime gov Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations http www cybercrime gov s smanual2002 htm http www cybercrime gov s sappendix htm or http www cybercrime gov s smanual2002 pdf 13 D-21 Enclosure D CJCSM 6510 01A 24 June 2009 Pen Trap Statue Wiretap Statute and evidence Although the manual was published to provide guidance to federal law enforcement agents and prosecutors understanding this guidance will help individuals conducting forensics activities better understand the relevant legal issues that arise and better prepare to interact with law enforcement and prosecutors when needed e Also the DOJ National Institute of Justice provides additional guidance on digital evidence issues in a series of special reports 1 Electronic Crime Scene Investigation A Guide for First Responders Second Edition 14 This report includes additional and more detailed guidance on developing policies and procedures securing and evaluating the scene handling evidence at the scene examining the evidence and documenting and reporting the results The report also provides lists of potential evidence by crime category 2 Forensic Examination of Digital Evidence A Guide for Law Enforcement 15 This report is intended for law enforcement officers who examine digital evidence It provides guidance on policy and procedure development evidence assessment acquisition and examination and documenting and reporting analysis results Appendices include case examples and sample worksheets 3 Digital Evidence in the Courtroom A Guide for Law Enforcement and Prosecutors 16 This report identifies federal laws governing search and seizure issues It also provides guidance on the handling of digital evidence courtroom preparation and presentation of digital evidence f Collection of evidence Data obtained for forensics analysis or evidence must be collected using forensically sound methods and tools that capture the relevant data while preventing or minimizing contamination of the evidence g Storage of evidence 1 Any data or records that might be used as evidence must be documented maintained and protected under a chain of custody in accordance with forensics policies and procedures This avoids allegations of mishandling or tampering with evidence and increases the probability evidence will be entered into a court proceeding 2 A chain-of-custody log is used to document the integrity of any evidence at every point from the time it is seized until it is presented in court 14 15 16 http www ojp usdoj gov nij pubs-sum 219941 htm http www ojp usdoj gov nij pubs-sum 199408 htm http www ojp usdoj gov nij pubs-sum 211314 htm D-22 Enclosure D CJCSM 6510 01A 24 June 2009 A chain-of-custody log will typically include the following types of information a Description of the evidence b Details of where location when date and time and by whom name contact information the evidence was found c Detailed description of the forensic evidence collection method tools or procedures d Details who where when of the transfer of evidence to a custodian for safekeeping 3 A custodian must be designated to control and keep records of any access to the evidence D-23 Enclosure D 6510 01A 24 June 2009 INTENTIONALLY BLANK Enclosure CJCSM 6510 01A 24 June 2009 APPENDIX A TO ENCLOSURE D ATTACK VECTORS 1 Introduction An attack vector is defined as the primary path or method used by the adversary to cause the incident or event to occur This information is collected as part of the incident report and used to identify trends in the prevalence of various vectors By understanding the most prevalent vectors tactical and strategic plans can be developed to improve the defensive posture of the GIG Including the types of attack vectors in the incident reporting can help the USSTRATCOM JTF-GNO correlate information across DOD components to identify potential Enterprise Incident Sets 2 Attack Vector Categories a Attack vectors are very dynamic but can generally be grouped into several distinct categories Sub-categories are more specific vectors and may be more dynamic and therefore require changes over time b This annex describes the major categories and sub-categories of attack vectors It should be used for assigning attack vectors to reportable events or incidents Given the complexity of some attacks it is not uncommon for more than one attack vector to be used in an attack Therefore an event or incident may be assigned more than one attack vector Attack Vector Category Number Description Sub-category Reconnaissance Information was accessible and used to characterize DOD systems applications networks and users that may be useful in formulating an attack A Information Gathering and Data Mining Activity that seeks to gather information from publicly available sources B Network Scan Activity that targets multiple IP addresses This is referred to as a horizontal scan C System Scan Activity that targets a single IP address across a range of ports This is referred to as a vertical scan 1 Table D-A-1 Attack Vectors Categories D-A-1 Appendix A Enclosure D CJCSM 6510 01A 24 June 2009 Attack Vector Category Number Sub-category 2 Description Authorized User A user with authorized access took specific actions that resulted in jeopardizing DOD systems or data A Purposeful An authorized user knowingly took specific actions that jeopardized DOD systems or data B Accidental An authorized user took actions that had consequences over and above the intentions and jeopardized DOD systems or data Sub-category Social Engineering Human interaction social skills or deception used to gain access to resources or information A E-mail E-mail is the primary vehicle used to deliver a malicious payload or gain access to resources or information B Web site A Web site is the primary vehicle used to deliver a malicious payload or gain access to resources or information C Other A user was deceived or manipulated in a way that is not covered by the other types of social engineering 3 Sub-category Configuration Management Compromise resulting from the inadequate or improper configuration of an information system A Network A system that provides network-based services was improperly or inadequately configured B Operating System An operating system was improperly or inadequately configured C Application An application was improperly or inadequately configured 4 Sub-category 5 Software Flaw A vulnerability in the software that allows for the unauthorized use of or access to an information system in a way that violates the system’s security policy A Exploited New Vulnerability This vulnerability was unknown prior to the event or there was no mechanism available to prevent it B Exploited Known Vulnerability This vulnerability was known prior to the event and there was a mechanism available to prevent it Table D-A-1 Attack Vectors Categories continued D-A-2 Appendix A Enclosure D CJCSM 6510 01A 24 June 2009 Attack Vector Category Number Sub-category 6 Transitive Trust Compromise resulting from the implicit or explicit trust relationship between security domains A Other System Compromise Compromise resulting from access previously gained on another DOD system B Masquerading Compromise resulting from the unauthorized use of a valid user’s credentials This may include cryptographic material account credentials or other identification information Sub-category 7 Description Resource Exhaustion The consumption of system resources that prevents legitimate users from accessing a resource service or information A Non-Distributed Network Activity Activity from a single IP address that overwhelms system or network resources This is generally associated with a DoS incident B Distributed Network Activity Activity from multiple IP addresses that overwhelms system or network resources This is generally associated with a DoS incident Sub-category Physical Access The unauthorized physical access to resources A Mishandled or lost resource Equipment was stolen lost or left accessible to unauthorized parties B Local access to system An unauthorized user was provided local physical access to a DOD information resource C Abuse of resources The physical destruction of an information resource by an unauthorized party 8 Sub-category 9 New Attack Vector The attack vector is not covered by the listed methods Description of the attack vector must be included in the incident comments A Sub-category 10 A Other Unknown Unable to determine Attack vector could not be determined with the information available Table D-A-1 Attack Vectors Categories continued D-A-3 Appendix A Enclosure D CJCSM 6510 01A 24 June 2009 c The attack vectors above are not exhaustive Rather they broadly define the major categories of attack vectors To provide a greater degree of granularity a category may consist of subcategories that further characterize specific attack vectors For example subcategories of the attack vector “Software Flaw” may include “Exploited a New Vulnerability” or “Exploited an Existing Vulnerability ” This provides a greater degree of control over the type of information being reported D-A-4 Appendix A Enclosure D CJCSM 6510 01A 24 June 2009 APPENDIX B TO ENCLOSURE D SYSTEM WEAKNESSES 1 Introduction a Security controls are safeguards or countermeasures applied to an information system in order to protect the confidentiality integrity and availability of the system and its information The catalog of security controls to be used is currently found in reference w This annex will be updated to match CNSS Instruction 1253 “Security control Catalog for National Security Systems” upon its publication expected to occur during staffing b Information about system weaknesses is collected as part of the incident report and used to broadly represent gaps or deficiencies in protective and defensive security controls Security control effectiveness is defined as the extent to which existing controls are implemented correctly operating as intended and producing the desired outcome in meeting the security requirements for the information system in its operational environment c By collecting this information on an ongoing and consistent basis management can make more informed decisions based on real data and can provide technical direction that significantly improves the protection of the GIG 2 Determining System Weaknesses a Reference w should be used to identify the security family and security control s that could have been in place to prevent or lessen the impact of the incident System weaknesses must be recorded as part of the incident handling process and included in the incident report It is expected that more than one security control may apply b For example an incident that had a missing patch poor baseline system configuration and out-of-date antivirus signatures as its root causes may have the following system weaknesses associated with it 1 Configuration Management 2 System and Information Integrity c System weaknesses are dynamic and may change over time Applications processes and procedures that independently operate and D-B-1 Appendix B Enclosure D CJCSM 6510 01A 24 June 2009 maintain the security controls must be flexible to allow these controls to be modified as needed while minimizing the effects these changes may have on incident reporting activities D-B-2 Appendix B Enclosure D CJCSM 6510 01A 24 June 2009 APPENDIX C TO ENCLOSURE D IMPACT ASSESSMENT MATRIX 1 Impact Assessment a Impact is assessed based on the degree to which an incident or event adversely affects or has the potential to affect the successful accomplishment of operational missions and the confidentiality integrity or availability of DOD systems and networks 1 Each event or incident is assessed and assigned an impact as part of the incident handling process 2 An impact assessment is one of the determining factors when assigning priority to an incident or event 3 The Category and Impact guide reporting timelines and response actions commensurate with the magnitude of the incident or event b In determining the actual impact consider the current and potential impact of the incident or event on the confidentiality availability and integrity of organizational operations organizational assets or individuals The standards and guidelines used below provide a baseline for assessing impact have been adopted and adapted where necessary from reference x 2 Levels of Impact a Low The potential impact is low if the loss of confidentiality integrity or availability could be expected to have a limited adverse effect on organizational operations organizational assets or individuals Adverse effects on individuals may include but are not limited to loss of the privacy to which individuals are entitled under law A limited adverse effect means that for example the loss of confidentiality integrity or availability might 1 Cause degradation in mission capability to an extent and duration that the organization is able to perform its primary functions but the effectiveness of the functions is noticeably reduced 2 Result in minor damage to organizational assets 3 Result in minor financial loss D-C-1 Appendix C Enclosure D CJCSM 6510 01A 24 June 2009 4 Result in minor harm to individuals b Moderate The potential impact is moderate if the loss of confidentiality integrity or availability could be expected to have a serious adverse effect on organizational operations organizational assets or individuals A serious adverse effect means that for example the loss of confidentiality integrity or availability might 1 Cause a significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions but the effectiveness of the functions is significantly reduced 2 Result in significant damage to organizational assets 3 Result in significant financial loss 4 Result in significant harm to individuals that do not involve loss of life or serious life threatening injuries c High The potential impact is high if the loss of confidentiality integrity or availability could be expected to have a severe or catastrophic adverse effect on organizational operations organizational assets or individuals A severe or catastrophic adverse effect means that for example the loss of confidentiality integrity or availability might 1 Cause a severe degradation in or loss of mission capability to an extent and duration that the organization is not able to perform one or more of its primary functions 2 Result in major damage to organizational assets 3 Result in major financial loss 4 Result in severe or catastrophic harm to individuals involving loss of life or serious life-threatening injuries 3 Determining Technical and Operational Impacts a The tables below should be used to identify the potential TI and OI of the incident or reportable event 1 These impacts should be assessed based on the degree to which an incident or event adversely affects or has the potential to affect the successful accomplishment of operational missions and the confidentiality integrity or availability of DOD systems and networks D-C-2 Appendix C Enclosure D CJCSM 6510 01A 24 June 2009 2 These impacts must be recorded as part of the incident handling process and included in the incident report b For example a DoS attack against a local MAC I II mail server may have the following impacts 1 Technical Impact a Confidentiality – Low b Integrity – Low c Availability – Medium d The potential impact to technical availability is medium because it may degrade day-today business services 2 Operational Impact a Confidentiality – Low b Integrity – Low c Availability – High d The potential impact to operational availability is high because it is targeted at a MAC I II system 4 Incident Impact Table This table describes the categorization system for assigning impact levels to incidents or events This table is intended to provide a high-level overview of each security objective and define impact levels across these objectives D-C-3 Appendix C Enclosure D CJCSM 6510 01A 24 June 2009 POTENTIAL IMPACT Security Objective LOW MODERATE HIGH Confidentiality Preserving authorized restrictions on information access and disclosure including means for protecting personal privacy and proprietary information 44 U S C SEC 3542 The unauthorized disclosure of information could be expected to have a limited adverse effect on organizational operations organizational assets or individuals The unauthorized disclosure of information could be expected to have a serious adverse effect on organizational operations organizational assets or individuals The unauthorized disclosure of information could be expected to have a severe or catastrophic adverse effect on organizational operations organizational assets or individuals Integrity Guarding against improper information modification or destruction and includes ensuring information nonrepudiation and The unauthorized modification or destruction of information could be expected to have a limited adverse effect on organizational operations organizational assets or individuals The unauthorized modification or destruction of information could be expected to have a serious adverse effect on organizational operations organizational assets or individuals The unauthorized modification or destruction of information could be expected to have a severe or catastrophic adverse effect on organizational operations organizational assets or individuals The disruption of access to or use of information or an information system could be expected to have a limited adverse effect on organizational operations organizational assets or individuals The disruption of access to or use of information or an information system could be expected to have a serious adverse effect on organizational operations organizational assets or individuals The disruption of access to or use of information or an information system could be expected to have a severe or catastrophic adverse effect on organizational operations organizational assets or individuals authenticity 44 U S C SEC 3542 Availability Ensuring timely and reliable access to and use of information 44 U S C SEC 3542 Table D-C-1 Incident Impact Table 5 Incident and Event Potential Impact The following tables provide examples of incidents or events and how they are categorized across each security objective and impact level a It should be used as a guide to determine the potential impact of an incident or event Initial assessment should be performed quickly even with limited details and analysis D-C-4 Appendix C Enclosure D CJCSM 6510 01A 24 June 2009 b As the investigation continues and a more accurate characterization of the true impact is understood there is always opportunity to reassess and modify the potential impact c Note “All Security Objectives” is intended to represent examples of incidents or events that may affect any security objective i e confidentiality integrity availability POTENTIAL TECHNICAL IMPACT Security Objective Confidentiality LOW MODERATE Reoccurring or automated recon events Disclosure of network topology or interconnectivity Reoccurring or automated unsuccessful activity events Significant recon events HIGH Administrative credentials to systems and networks Significant unsuccessful activity events User credentials Malicious logic defeated by defense mechanisms Exposes limited number of systems or global network services to risk Integrity Propagation of malicious logic that could significantly affect DOD Exposes moderate number of systems or global network services to significant risk Malicious logic having well-understood capabilities and which will not cause significant damage or loss Inability to verify or known modification to highly sensitive DOD intellectual property Widespread propagation of malicious logic that could significant affect DOD Exposes large number of systems or global network services to significant risk e g 0-day exploit Malicious logic capabilities that are unknown or not fully understood Table D-C-2 Technical Impact Examples D-C-5 Appendix C Enclosure D CJCSM 6510 01A 24 June 2009 POTENTIAL TECHNICAL IMPACT Security Objective LOW MODERATE User workstation is inaccessible Degradation of services for day-today business A mail server was removed from the network and users were unable to access mail Availability HIGH Degradation or unavailability of DNS routing or PKI infrastructure User Web portals and Web applications are not available System was not patched or protected All Security Objectives Exploitation technique used infrequently Exploitation of the system can be conducted locally with physical access System was partially patched and protected System was fully patched and protected Exploitation technique used frequently Exploitation technique widespread Exploitation of the system can be conducted remotely or locally with user interaction Exploitation of the system can be conducted remotely with no user interaction Table D-C-2 Technical Impact Examples continued D-C-6 Appendix C Enclosure D CJCSM 6510 01A 24 June 2009 POTENTIAL OPERATIONAL IMPACT Security Objective Confidentiality LOW MODERATE A set of configuration information about an obsolete unclassified system is found on a NIPRNET account Unauthorized disclosure of technical reporting structures or TDY assignments Unauthorized disclosure of highly sensitive DOD Program Information mission plans or orders or deployment plans Access to deployment records for operations that have been completed are found on compromised machine Loss of confidence data stored on a MAC II system for less than 2-3 days System used to manage aircraft maintenance records compromised Applying fix to legacy system based on bulletin or alert leaves application vulnerable to unauthorized access Degradation of services on a MAC I system Access to personnel files who are terminated is unavailable Unable to process TDY orders Inhibited ability to manage inventory deliver supplies or meet deployment timelines Old duty rosters or schedules are in an accessible directory Integrity Availability HIGH Access to purchasing database for equipment look-ups is offline Organization is unable to perform effective C2 with its parent subordinate organization due to a disabled mail server Table D-C-3 Operational Impact Examples D-C-7 Appendix C Enclosure D CJCSM 6510 01A 24 June 2009 POTENTIAL OPERATIONAL IMPACT Security Objective LOW MODERATE Generates limited if any military action Causes local adverse publicity Causes limited or localized coverage in news media Short-term physical injury or harm All Security Objectives Resources required for response will have limited effects on operations and not significantly reduce the effectiveness of response functions HIGH Affects a MAC III system OSD network or DOD network Affects a MAC I II system classified system or guard device Generates moderate level of military action Risk to human life or widespread physical injury or harm Causes national adverse publicity Causes moderate coverage in news media Permanent physical injury or harm Resources required for response will have moderate effects on operations and may reduce the effectiveness of response functions temporarily Crosses C S A and field activity boundaries Impacts operational mission of B P C S level or higher networks Generates a higher level of military action Causes a national reaction Affects national reaction Causes widespread coverage in news media Resources required for response will have significant effects on operations and reduce the effectiveness of response functions for a significant period of time Table D-C-3 Operational Impact Examples continued D-C-8 Appendix C Enclosure D CJCSM 6510 01A 24 June 2009 ENCLOSURE E INCIDENT RESPONSE 1 Introduction a Incident Response is an organized and coordinated series of steps also known as RAs to resolve or mitigate a reported computer security incident It also includes the steps taken to recover affected systems and return them to a fully operational and secure state b During incident response coordination communication and documentation actions are also taken to ensure the right C S As and field activities are involved notified of the outcomes and provided any follow-up reports c It is also in this phase that incident information and incident response actions are archived and recorded Once the incident is resolved it is closed a final report is submitted and any postmortem actions are completed d This section provides further guidance on incident response and recovery Further requirements shall be articulated in OPORDs issued by relevant commands e The primary objectives for RAs are to 1 Halt or minimize attack effects or damage while maintaining operational mission continuity 2 Ensure the effective and timely recovery of systems in a way that prevents similar incidents from occurring again 3 Strengthen the Department of Defense’s defensive posture and operational readiness 4 Ensure that RAs occur in a manner that protects any data according to its level of sensitivity 5 Support rapid complete attack characterization 2 Types of Responses a There are three types of response activities that can occur E-1 Enclosure E CJCSM 6510 01A 24 June 2009 1 Technical Response RAs that involve containment or eradication of any risks or threats associated with the incident and the rebuilding or restoring of affected systems to a normal operational state 2 Management Response RAs that require some type of administrative supervisory or management intervention notification interaction escalation or approval as part of any response Administrative or management response steps can include actions taken by human resources public relations financial accounting audits and compliance and other internal organizational entities 3 LE CI and Intel Response RAs associated with LE CI liability privacy issues creating or reviewing nondisclosures and service level agreements and any other legal actions taken in response to a computer security incident b Response actions across these three areas will be coordinated c C S As and field activities must be prepared ahead of time for any RAs Decisions made in haste while responding to a critical incident are rarely effective Therefore response procedures tools defined interfaces communications channels and mechanisms will be in place and tested before hand d Response guidance or a response plan will be developed by each C S A or field activity The response plan lists the steps to take and specifies who should take them In this way when an incident does take place appropriate personnel will know how to respond Escalation procedures and criteria must also be in place to ensure effective management engagement in RAs e Preparations that will facilitate response activities include 1 An archive of boot disks and distribution media for all applications and OSs 2 An archive of security-related patches for applications and OS 3 Test networks and systems to test patches analyze malicious code etc 4 A resource kit of tools and hardware devices to support analysis or data acquisition E-2 Enclosure E CJCSM 6510 01A 24 June 2009 3 Developing and Implementing Courses of Action a COAs include the actions necessary to respond to the reportable event or incident fix the system return the system to operations and assess the risk for the system or network b Those involved in developing COAs will depend on the incident and the affected C S A or field activity They may be developed by field operations or by CNDSPs or jointly by both working with any commanders c Who will actually execute the COAs will depend on who has responsibility for various infrastructure components 1 COAs may include CND RAs IAW ASD C3I memorandum see reference j Analysis comparison and selection of the best COA should be done at the lowest command possible e g the theater commander should be the approving authority for an incident response COA for the theater 2 COAs may include the development and issuance of bulletins advisories and other notifications to C S As and field activities to promote awareness direction actions and ensure compliance 3 Those with key roles in responding to an intrusion must be notified and kept informed to fulfill their responsibilities Executing COAs and information dissemination procedures may include contacting users security personnel LE CI vendors Internet service providers ISPs other CNDSPs and other internal or external security organizations 4 Specific coordination may be required with DOD LE CI or with external law enforcement organizations when DOD LE CI support is not available or cannot be obtained due to time or distance factors Coordination with LE CI involves helping LE CI personnel investigate the incident and prosecute the perpetrators if warranted 5 International coordination may be needed if attacking hosts reside in a foreign nation or if DOD systems are attacking networks in that nation 6 USSTRATCOM JTF-GNO reserves the right to direct and assist C S As and field activities with response actions for incidents that fall into a DOD enterprise incident set or when actions otherwise affect multiple theater or Service networks d For more information on coordination and collaboration with LE CI and international organizations see Enclosure F Collaboration with Other Strategic Communities E-3 Enclosure E CJCSM 6510 01A 24 June 2009 e Reference c provides a list of criteria for determining appropriate courses of action or what it calls “strategies” These criteria include 1 Potential damage to and theft of resources 2 Need for evidence preservation 3 Service availability e g network connectivity services provided to external parties 4 Time and resources needed to implement the strategy 5 Effectiveness of the strategy e g partially contains the incident fully contains the incident 6 Duration of the solution e g emergency workaround to be removed in four hours temporary workaround to be removed in two weeks permanent solution f NIST describes COAs and RAs for various attacks such as DoS malicious code unauthorized access and inappropriate usage in reference c 4 Recovering without Performing Technical Analysis a Data from all incidents must be preserved to enable technical analysis However under certain circumstances and with approval technical analysis may not be required prior to system recovery 1 For example it may not be possible to conclusively identify the root cause of an incident through additional analysis The intruder may have deleted or tampered with logs and files making them untrustworthy The existence of multiple unpatched vulnerabilities may make it impossible or not worth the effort to try to identify which specific vulnerability was exploited In such cases it may be more expedient to begin system recovery and hardening 2 Potential technical and operational implications should be assessed carefully prior to recovering a system without performing technical analysis Such an assessment will indicate how this may impact mission success For example the primary benefit of determining root cause and eradicating it prior to redeploying a system is to prevent similar system compromises and to share that information with other DOD communities thereby strengthening the overall security posture of the GIG If a root cause is not identified and eradicated the system may once again be compromised and others may lose the valuable information provided by the technical analysis E-4 Enclosure E CJCSM 6510 01A 24 June 2009 5 Containment a Overview 1 Containment consists of short-term tactical actions to stop an intruder’s access to a compromised system limit the extent of an intrusion and prevent an intruder from causing further damage 2 The primary objectives for containment are to a Regain control of the systems involved in order to further analyze them and return them to normal operation b Deny an intruder access to prevent him or her from continuing the malicious activity and from affecting other systems and data 3 While an intruder has access to a system the system cannot be properly analyzed or restored Performing containment a Prevents an intruder from accessing or exfiltrating DOD data or other information b Prevents an intruder from destroying valuable evidence and tampering with systems while they are being analyzed c Prevents an intruder from using DOD systems to attack other systems protecting the C S As and field activities from liability 4 Containment provides a reasonable security solution until sufficient information has been collected to address the vulnerabilities exploited and the damage sustained a It should be noted that some containment actions can be taken during the preliminary response phase of the incident handling life cycle b More containment steps may be warranted following in depth analysis which may identify more affected systems or malicious activities Containment steps can be executed iteratively with the steps in the detection and analysis phase 5 Containment strategies are executed by the C S A or field activity responsible for the maintenance and operation of the affected systems or networks this could be a local system administrator or could be the component’s CNDSP Who executes the strategies will depend on the incident type affected component and local policy and procedures E-5 Enclosure E CJCSM 6510 01A 24 June 2009 b Containment Strategies Containment strategies will vary based on the type of incident Containment activities may include any of the following or any other strategies determined by the affected C S A or field activity 1 Blocking Blocking is the use of network access controls at the perimeter or enclave boundary to prevent the attacker from connecting to other DOD systems networks or critical data and services a The decision to block is based on the incident category the threat to the network and instruction from CI LE and JTF-GNO b Category 1 2 3 4 6 and critical 7 incidents require immediate blocks at the host and or gateway level if the risk of further compromise data exfiltration and continued threat to the DOD GIG outweighs the benefit of monitoring adversary TTPs for a more comprehensive countermeasure c Other incident categories such as 5 and 8 may elicit a block if the result reduces risk and exposure to potential attack vectors d Block requests will include inbound and outbound traffic e Border Gateway Firewall Block Gateway IP and port blocks are used to prevent the spread of compromise from an identified external system or attack vector Category 1 2 3 4 6 and 7 incidents could necessitate gateway blocks Block requests will include inbound and outbound traffic Sample blocks include 1 IP addresses that host malicious code malware spyware or unauthorized software 2 Peer-to-peer P2P and instant messaging IM communication ports 3 Mail relays phishing and spam originators 4 Known hostile IP addresses and hosts 5 IP addresses and ports associated with worms botnets and trojans 6 External hosts that are identified performing scanning footprinting or attempting to exploit DOD assets 7 DoS attacks E-6 Enclosure E CJCSM 6510 01A 24 June 2009 f Enclave Firewall Block Enclave firewall blocks follow the same process as gateway blocks depending on the scope of the incident Enclave blocks are specific to the component behind the firewall Block requests will include inbound and outbound traffic g Mail and Proxy Block Mail gateway blocks are required when e-mail is the identified attack vector Mail blocks include filtering for attachments subject lines and senders Examples include spam phishing worms and other mail attachments attacks containing malicious code Proxy blocks are dependent on the content filtering solution of the component managing the proxy application 2 Network Isolation Network isolation involves the use of network access controls to logically segment the network and restrict access to the affected hosts Isolation strategies include the following a Disconnect the System From Any Local Area Network This can help prevent further contamination of the affected system and network b Disconnect System From the Internet or Any Other Public Networks This can help to prevent inbound access or outbound traffic or data exfiltration c Disconnect or Isolate the Affected Network Host and or Segment from the Rest of the Network This can help to prevent further contamination or containing malicious activity to a system or logical network segment This will allow attached systems to still function but will not spread malicious activity to the rest of the infrastructure In some cases this may be relevant to monitor adversarial activity while limiting the adversary’s ability to attack other systems 3 System Server or Service Shutdown Shutting down a system server or service may help limit damage or prevent further access to the system by the adversary However it will also affect the ability to acquire certain valuable data for the incident analysis The decision to pursue this containment strategy should be weighed carefully a System Shutdown If it is determined that allowing the system to function will destroy data or applications on the system the system should be shut down with the commander’s approval as a containment measure b Server Shutdown If it is determined that a particular server such as an e-mail or Web server requires shutdown until problems can be eliminated or to contain the spread of malicious code the specific server should be shut down Be advised that in addition to destroying non-volatile data shutting down a server may adversely affect multiple users and mission E-7 Enclosure E CJCSM 6510 01A 24 June 2009 operations This decision should be made in coordination with the relevant command authority c Service Shutdown If sufficient analysis has been performed to correctly limit the scope of an intrusion to specific services these services can be disabled especially if no patch is available Be advised that in addition to potentially destroying non-volatile data shutting down a service may adversely affect multiple users and mission operations This decision should be made in coordination with the relevant command authority 4 Other Containment Strategies Other containment strategies presented by NIST17 include the following a Eliminate the attacker’s route into the environment by preventing attacker from accessing nearby resources that might be targets b Block the transmission mechanisms for the malicious code between infected systems c Disable user accounts that may have been used in the attack c Temporarily Leaving System Online 1 Under certain circumstances the commander may decide to leave the affected system’s vulnerability accessible in order to monitor the attacker’s activities a CNDSPs will monitor an attacker’s activities at all times regardless of LE CI involvement This monitoring for system protection purposes is conducted in the ordinary course of business and authorized by federal law The results of monitoring for network defense may be shared with LE CI organizations reference y b CNDSPs are not authorized to conduct monitoring on behalf of LE CI organizations for purely LE CI purposes unrelated to CND LE CI organizations must consult their servicing Staff Judge Advocate SJA about monitoring 2 If a compromised system is left running NIST recommends “management and legal counsel should ensure there is no liability that can result ” NIST also cautions “not containing malicious activity can cause more NIST SP 800-61 NIST Computer Security Incident Handling Guide Available at http csrc nist gov publications nistpubs 80061 sp800-61 pdf 17 E-8 Enclosure E CJCSM 6510 01A 24 June 2009 malicious activity to occur because malicious code or actions continue which can cause further damage and loss of operations or critical data ” d Caveats for Containment 1 Any changes to compromised systems including containment actions may destroy information required to assess the cause of an intrusion Ensure that all necessary data for analysis is completely collected before making any system changes Also collect and protect all evidence that may be needed in a subsequent investigation before performing any containment actions 2 C S As and field activities and CNDSPs must define acceptable risks for incident containment and develop strategies and procedures accordingly 3 Various questions arise when deciding whether to contain malicious or unauthorized activity Answers to these questions may require discussions with system and business process owners Such questions can include a Is it appropriate to shut down or disconnect a system b Does the CNDSP or local system administrator have the authority to shut down or disconnect a system c When must a system stay up and running d What systems cannot be taken offline or disconnected e Are there investigative or intelligence equities to consider See Enclosure F 4 Decide appropriate containment strategies for critical assets ahead of time By preparing in this way a decision does not have to be made about what is a correct or approved containment strategy during an incident 5 If the intruder’s actions are rapid and spreading system administrators and CNDSPs may need to take more immediate action response and containment policies and procedures should contain guidance for such situations E-9 Enclosure E CJCSM 6510 01A 24 June 2009 6 Eradication a Overview 1 Eradication consists of the steps required to eliminate the root cause s of an intrusion All threats and risks should be removed from DOD systems and networks before returning them to service If the threat is not removed then a system can be easily compromised or breached again 2 The primary objectives for eradication are to a Ensure the removal of the cause s of the malicious activity and any associated files b Ensure the elimination of any access methods used by the intruder including vulnerabilities physical security problems or human error 3 Execute eradication steps after the first round of containment actions occur and then interactively with any further analysis and containment activities 4 Sometimes full eradication can only happen after long-term policy and configuration management changes are put into place In that case the threat should be mitigated to the extent possible before rebuilding and reconnecting any affected systems 5 Some systems due to the nature of the incident may not need any eradication steps or the eradication may occur as part of the recovery activities when the infected system is wiped or erased and rebuilt 6 Eradication strategies are executed by the C S A or field activity responsible for the maintenance and operation of the affected systems or networks this could be a local system administrator or could be the components CNDSP Who executes the strategies will depend on the incident type affected component and local policy and procedures b Eradication Strategies Specific eradication actions depend on the nature of the incident 1 Remove Malware Quarantine delete replace or restore the integrity of infected files In most cases this will require rebuilding the system from trusted media This may also involve updating antivirus signatures a Under most conditions once a system is compromised the integrity of that system cannot be verified until it has been restored from trusted media If a system contains malware keeping it in operation is not E-10 Enclosure E CJCSM 6510 01A 24 June 2009 recommended unless the complete integrity of that system can be once again verified or the system is left running and monitored closely as part of an ongoing LE CI case In the latter case the decision to leave the system running must be based on approvals by authorized DOD personnel b Any malware uncovered throughout the incident response process must be cataloged in the JMC Additional guidance may be found in Enclosure G CND Incident Handling Tools – Joint Malware Catalog 2 Remediate or Mitigate Vulnerability Remove vulnerabilities by installing any new operating system or application patches to vulnerable software to prevent exploitation If the system cannot be patched for technical or operational reasons mitigate the vulnerability by updating system configurations and defenses to protect or segment the affected host If a patch is not available apply workarounds or temporary mitigation strategies 3 Modify Access Controls Update user and network access controls For instance remove compromised user or administrator accounts modify network access controls e g IDS IPS firewall content filtering update baseline configurations and remove any other access mechanisms used by the adversary 7 Recovery a Overview 1 Recovery consists of the steps necessary to restore the integrity of affected systems return the affected data systems and networks to an operational state and implement follow-up strategies to prevent the incident from happening again 2 The main objectives of recovery are to a Restore the integrity of the system by rebuilding it from trusted media when necessary b Implement proactive and reactive defensive and protective measures to prevent similar incidents from occurring in the future c Ensure all data and systems are operating in a normal fashion d Ensure the complete resolution and closure of the incident 3 Data and systems are fully restored when the necessary patches and fixes applicable to the incident have been installed If a system is compromised the integrity of anything on that system is suspect The intruder E-11 Enclosure E CJCSM 6510 01A 24 June 2009 could have changed the kernel binaries data files running processes or memory The only way to be sure a system is free of malicious code and back doors is to reinstall the trusted media and then install any security patches and upgrades This includes both operating system and application patches 4 Also as part of the recovery process any containment activities completed may need to be removed This can include removing any blocks that are no longer necessary re-enabling services and reconnecting systems and networks to the LAN or Internet 5 Recovery strategies can be executed by a variety of DOD personnel based on their roles and responsibilities Multiple strategies may need implemented across the affected component Who executes the strategies will depend on the incident type affected component and local policy and procedures b Recovery Strategies Depending on the nature of the incident recovery actions can include but are not limited to the following 1 Rebuild from Trusted Media Reinstall the operating system and applications from a trusted backup or from original distribution media 2 Verify System Data Review system data to ensure its integrity Someone who knows what user or other data was on the system should review the data to ensure it has not been changed Alternatively restore system data from a trusted backup 3 Change System Passwords Change all passwords on the system and possibly on all systems that have trust relationships with the victim system 4 Improve Network And Host Security a Increase host and network monitoring b Enable maximum host logging auditing and accounting programs c Disable unnecessary services services d Verify there are no weaknesses in configuration files for those e Install all the latest vendor security patches and upgrades if approved and tested E-12 Enclosure E CJCSM 6510 01A 24 June 2009 f Update firewall rule-sets g Update boundary router access control lists h Update IDS IPS signatures i Review any DOD guidance advisories or bulletins to see if there are other recovery actions or security enhancements that can be enabled or installed j Install new security mechanisms that may help protect systems or detect malicious activity This can include programs like file integrity checkers URL checkers etc k Implement any needed mail filtering l Update any security policies to reflect or support these security improvements c Once all recovery steps have been completed and systems have been tested to ensure they are operating normally reconnect any hosts or networks that were disconnected 1 All systems that have a Category 1 Category 2 or Category 7 incident must be erased and rebuilt from trusted media then patched and updated prior to connecting the system to the network This is necessary to prevent an incident from recurring 2 Mission impact may require the affected vulnerable component be mitigated temporarily until the mission allows the system to be rebuilt For other categories C S As and field activities have the discretion of rebuilding the system depending on the impact of the incident 3 STIGs and technical configuration data are provided as required from DISA Information Assurance Support Environment http iase disa mil and NSA security configuration guides http www nsa gov snac 8 Post-Incident Activity a Overview 1 One of the final parts of the incident handling process is learning how to improve operations processes and infrastructure defenses by reviewing the incident and the response A postmortem is a review of the incident including the detection analysis and response phases E-13 Enclosure E CJCSM 6510 01A 24 June 2009 2 The primary objectives for performing a postmortem include a Identifying infrastructure problems to be addressed b Identifying systems and configurations weaknesses or other vulnerabilities to be corrected c Identifying organizational policy and procedural problems to be reviewed and addressed d Identifying technical or operational training needs e Determining unclear or undefined roles responsibilities interfaces and authority f Improving tools required to perform protection detection analysis or response actions 3 The C S A or field activity with primary responsibility for handling the incident will normally take the lead in performing the postmortem and collecting and trending any outputs However in certain circumstances a management audit or other group may coordinate this as appropriate b Post-Incident Activity Strategies 1 Results from a postmortem shall be used to make improvements to the incident management process and methodology along with any improvements to the security posture and defenses of the C S A or field activity critical to achieving the mission of the DOD a C S A and field activity HQ will establish a formalized postmortem process and establish criteria defining which incidents require postmortems Not all incidents may require a postmortem Incidents that are large in scope handled poorly involve law enforcement or caused severe damage are candidates that require a postmortem Less severe incidents such as regular scanning need limited or no postmortem b All parties involved in the incident should be part of the postmortem A postmortem shall be held as soon as possible to answer questions such as the following 1 What were the timeframes for the incident its detection and its resolution E-14 Enclosure E CJCSM 6510 01A 24 June 2009 2 What actions were correctly executed by users analysts and management and what actions were not correctly executed 3 Were appropriate procedures available and followed Were they up-to-date and correct Were they still applicable 4 What would the staff and management do differently the next time a similar incident occurs 5 What corrective actions can prevent similar incidents in the future This should include recommendations for signature updates and or development and changes to ACLs filters and system configurations 6 What additional tools or resources are needed to detect analyze and mitigate future incidents 2 Pertinent information resulting from the postmortem should be added as part of the final report for the incident 3 New or unusual cases can be captured and used as the basis for future training exercises or case studies 4 After the postmortem is completed feedback on improvements to be made to policies procedures and infrastructure defenses should be passed to the appropriate C S A or field activity responsible for making those improvements provided there is support and approval from commanders and HQ It is important to implement any changes that can be made based on these lessons learned This will help provide a more effective defense against recurring or similar incidents Changes to be implemented can include enterprise or local a Updates to security policies and implementation guides e g DISA STIGs b Changes to incident management and incident handling processes and procedures c Updates to detection systems d Improvements in system and network configurations e Changes to configurations and filters on network perimeter devices such as firewalls routers and gateways 5 The postmortem analysis and lessons learned produce information and incident data that can be collected and used in various ways This E-15 Enclosure E CJCSM 6510 01A 24 June 2009 information can be used to create baselines for benchmarking performance timeliness and types of incidents seen It can also be used to generate trending and correlation information for historical purposes to determine whether response actions are actually resolving problems over time 6 Data to collect and trend can include a Recurring problems and recurring user errors b Incident costs including damage sustained and response and recovery efforts c Incident precursors d Types of incidents seen over time e Types of weaknesses exploited e g certain applications operating systems social engineering tactics 7 Output from postmortem analysis and lessons learned can also be used as case studies and training materials for new staff E-16 Enclosure E CJCSM 6510 01A 24 June 2009 ENCLOSURE F COLLABORATION WITH OTHER STRATEGIC COMMUNITIES 1 Introduction a It is in the long-term interest of the Department of Defense to gain attribution and prosecute malicious individuals attacking DOD systems The DOD CND community works hand in hand with the DOD LE CI to investigate and monitor individuals who attack DOD systems Information and insights gained from investigations can then be provided back to the DOD community to increase the overall defensive posture of the GIG b All unauthorized access to systems or networks is considered punishable as a crime The DOD investigative agencies conduct LE CI investigations and operations in support of CND In doing so the DOD investigative agencies obtain and provide relevant threat data for use in mitigating threats to the DOD GIG c The success of DOD CND response depends on the Department of Defense’s ability to effectively share and fuse analytical and operational information across and within organizational boundaries including operational components service providers and the LE CI and intelligence communities in a timely manner This enables improved battlefield awareness across the full spectrum of military operations to accurately characterize and understand the effects of network intrusions on the GIG and to improve military decision making about response strategies 2 Operational Cooperation with LE CI a Reporting incidents sharing information notifications and coordinating analysis of security incidents with DOD investigative agencies facilitate criminal attribution in the event U S code has been broken The DOD investigative agencies obtain and provide relevant threat data in a timely manner to mitigate threats to the DOD GIG The focal point for Net Defense threat data in the DOD is the USSTRATCOM JTF-GNO b Deconflicting Investigative Actions In some circumstances LE CI may request DOD system providers to allow a potentially compromised DOD system to remain operational for the purpose of facilitating LE CI investigations and operations The commander of the organization shall make every effort to support such requests however commanders are still required to maintain and defend their operations and ultimately the networks that facilitate those F-1 Enclosure F CJCSM 6510 01A 24 June 2009 operations Additional information can be found in Appendix A to Enclosure F Coordination and Deconfliction c When investigative actions conflict with protective measures these measures will be coordinated with the affected investigative service ahead of time unless there is an imminent threat 1 Supporting the Legal Process Commanders must be careful to balance short-term requirement to conduct operations with the long-term advantage of prosecuting malicious individuals If a commander is notified of a legal process such as a subpoena or warrant has been issued and that their actions may conflict with the intent of that order the commander will coordinate with LE CI and the servicing SJA on any actions so that a legal process is not obstructed Commanders will also promptly inform the USSTRATCOM JTF-GNO SJA of any potential conflict 2 Data and Information Management Actions required supporting LE CI investigations may include but are not limited to copying device media to facilitate media analysis a Care should be taken in the release of device storage media images or the results of analysis Media is classified to the highest level of information contained on the media Additionally the data on the media may be sensitive but unclassified such as CUI limiting its sharing outside the Department of Defense b If the device is evidence in an LE CI investigation the media may be LE CI sensitive requiring special handling and a law enforcement sensitive LES caveat While this does not forbid CND analysts from performing technical analysis special care shall be taken to ensure the dissemination of analytical results does not compromise an LE CI investigation The commander of the organization shall coordinate with LE CI when releasing such information 18 c The operational community and LE CI organizations must effectively collaborate in order to rapidly disseminate information necessary for network defense while minimizing the potential for compromise of LE CI operations sources and methods Many times this can be done effectively through the use of “tear lines ” etc 3 Sharing Information Trust must be established and maintained among the numerous LE CI agencies Although there may be no legal restriction on sharing certain information for instance in regard to an ongoing Where applicable it may be more convenient to separate these concerns by using two system images One image for CND purposes and one image for LE CI purposes 18 F-2 Enclosure F CJCSM 6510 01A 24 June 2009 operation many agencies may be hesitant to share information that could jeopardize the safety of their sources methods and agents Although information obtained by the LE CI community is governed by unique restrictions and considerations if this information is important to the security of DOD systems it can be shared with appropriate controls and limitations on distribution To improve the flow and timeliness of the threat information obtained by the LE CI community both the DOD CND organizations and the LE CI community must ensure formal processes are established to improve mutual understanding of one another’s needs capabilities and unique restrictions d LE CI Threat Data 1 From a CND perspective the principle value of the LE CI community is the threat information it obtains through investigations and operations Threat data consists of information that can help lead to increased defense of DOD networks and the attribution and intent of network intruder s It can consist of planned actions that could adversely affect DOD systems Threat data also consists of specific methodologies toolsets techniques targeted vulnerabilities used by network attackers that are discovered through an investigation 2 Typical sources of data include a Logs and records of ISPs recorded during the course of an intrusion as well as those ISP records used to store hacking tools stolen data e-mails chat rooms etc b Information sharing with local state federal and international law enforcement counterparts c Interviews of human sources in support of proactive operations and reactive investigations d Wiretaps pen trap and trace etc 3 In addition to developing threat data during an investigation or operation the LE CI community deters future threats by enforcing various statutes and prosecuting those who violate the law 4 The CI community offers various capabilities and options when countering the activities of foreign intelligence services and international terrorists a Insider Activity LE CI authorities and capabilities are typically the best option for addressing suspected and or known access violations theft F-3 Enclosure F CJCSM 6510 01A 24 June 2009 and damage caused by trusted insiders Given that “insiders” represent a large population e g U S military government service civilians contractors and foreign national coalition partners reports related to potential insiders will always be handled very cautiously b Unique Restrictions on Law Enforcement Data As noted above the network defense can gain very important information from LE CI investigation and or operations however much of the information may require LES controls 3 International Coordination a International coordination and collaboration is achieved in a number of ways The Department of Defense has established relationships with many countries through specific bilateral and multinational agreements for instance CND information sharing with the 5 Eyes CND community is conducted by USSTRATCOM JTF-GNO J3 under the auspices of the International CND Coordination Working Group Information is shared routinely to generate shared situational awareness amongst allied and partner nations but coordination and collaboration may also occur in response to specific incidents 1 The USSTRATCOM JTF-GNO J3 functions as the focal point for DOD communications with allied militaries counterparts USSTRATCOM JTFGNO will notify geographic combatant commands of agreements with allied military counterpart organizations in their AOR 2 Geographic combatant command international CND coordination and collaboration will occur under pre-defined agreements with military forces nations or international organizations in their AOR b In extremis there may be a need to coordinate quickly with other foreign countries in which attacking hosts reside Existing relationships and arrangements will be used to the greatest extent practicable according to the extent to which they may be beneficial c The key questions that may need to be addressed include 1 What is the state of relations between the United States and the nation in question 2 Will a request for assistance itself constitute a greater threat to national security than the attack or intrusion itself This includes an assessment of whether the country is an actual sponsor of the attack or may gain valuable information that could be used to attack the Department of Defense F-4 Enclosure F CJCSM 6510 01A 24 June 2009 3 Does the nation in question have the technical capacity to respond to a request for assistance 4 How long will it take for the nation to act on the request Is that too long given the threat to national security d The IC has multiple vehicles for working with their counterparts in allied countries These relationships have a proven history of quickly tipping the allied countries and vice versa to threat activity providing new indications and threat vectors and increasing information sharing The USSTRATCOM JTF-GNO J2 may act as the focal point for operational intelligence requests to Allied CND intelligence organizations through existing information sharing agreements e The LE CI community has a long history of working with their counterparts in allied and other foreign countries The LE CI Center at USSTRATCOM JTF-GNO will serve as the repository for relevant information shared by the LE CI community conveying CND organization requests for information to the LE CI community and providing a focal point for LE CI coordination with USSTRATCOM JTF- GNO f In cases where international coordination is required beyond the capabilities of the USSTRATCOM JTF-GNO and LE CI community USSTRATCOM HQ will forward a request to the Department of State via the Secretary of Defense 4 Intelligence Community a Intelligence support to CND is essential to provide knowledge reduce uncertainty and support effective operational decision-making According to the definition of CND found in reference g CND “…employs intelligence counterintelligence law enforcement and other military capabilities to defend DOD information and computer networks ” b Accurate and timely intelligence analysis of network events and of adversaries’ actions against the Department of Defense’s enterprise is critical to ensuring operations and the future viability of the military’s vital information resources and investments c The Intelligence Support to CND offices provides all-source intelligence in support of their respective organizations’ priority intelligence requirements All source intelligence consists of information that can help lead to increased defense of DOD networks and attribution and intent of network intruder s It can consist of planned actions that could adversely affect DOD systems Allsource intelligence also consists of specific methodologies toolsets techniques targeted vulnerabilities used by network attackers F-5 Enclosure F CJCSM 6510 01A 24 June 2009 d Each CNDSP is responsible for and should identify processes for working with their appropriate Intelligence Support Element This relationship will vary based on organization and internal authorities and requirements but can provide a wealth of threat data indications and warning and the ability to query the national level IC Technical reporting between incident handling program and intelligence is maintained in the Joint Threat Intelligence Database JTID JTID is the Department of Defense’s central repository for this key intelligence The primary objective of the database is to ensure the timely flow of crucial network intelligence across DOD USG and ally boundaries e For additional guidance see Appendix B to Enclosure F Intelligence Support to Incident Reporting 1 5 National Cyber Response Coordination Group NCRCG The NCRCG is comprised of senior representatives from federal agencies that have roles and responsibilities related to preventing investigating defending against responding to mitigating and assisting in the recovery from cyber incidents and attacks 19 The NCRCG is responsible for the following a a Provide input to member agencies and department heads and the Interagency Incident Management Group IIMG on cyber security issues incidents and threats b b Assist in reviewing threat assessments and providing strategic situational awareness and decision support across the national cyber incident management spectrum including prevention preparedness response and recovery c c Integrate information frame policy issues and recommend actions – including use or allocation of federal resources – for agency and department heads the IIMG and other appropriate officials d d Coordinate with the DHS National Operations Center to disseminate critical information to and from government and non-government sources such as information sharing mechanisms academia industry and the public e Support the Executive Office of the President as appropriate The NCRCG is an interagency forum where organizations responsible for a range of activities technical response and recovery LE intelligence and defensive measures coordinate for the purpose of preparing for and executing an efficient and effective response to an incident 19 F-6 Enclosure F CJCSM 6510 01A 24 June 2009 APPENDIX A TO ENCLOSURE F COORDINATION AND DECONFLICTION 1 Introduction a Coordination and deconfliction ensures that incident response COAs are coordinated with all parties potentially affected by the response and in a way that prevents any unnecessary interference or overlap between ongoing activities These actions must be vetted through all parties potentially affected by the response b For the purpose of this guidance coordination and deconfliction are defined below 1 Coordination is the act of exchanging information between organizations to provide situational awareness collaboration on assessments and synchronized response actions 2 Deconfliction is a subset of coordination in which information is shared to eliminate overlap or interference between ongoing activities 2 Types of Operations a Time-Sensitive Operations Time-sensitive operations generally involve network-centric COAs to defend the DOD GIG against imminent or ongoing threats 1 Time-sensitive operations require coordination inputs from DOD and non-DOD organizations with the timeliness required based on the threat and the operational situation as determined in the CCIR 2 As a general rule inputs for time-sensitive operations will be required from all organizations within four hours of notification by USSTRATCOM JTF-GNO 3 USSTRATCOM JTF-GNO J-2 will manage requests for IC coordination and deconfliction with the appropriate IC members The LE CI Center at JTF-GNO shall conduct LE CI coordination and deconfliction with appropriate LE CI organizations 4 Organizations participating in the coordination and or deconfliction process will provide POCs capable of responding 24 hours a day to take F-A-1 Appendix A Enclosure F CJCSM 6510 01A 24 June 2009 appropriate action or be able to recall necessary personnel who can complete the actions required within the required timeline in accordance with this manual b Non-time-sensitive Operations Non-time-sensitive operations are network-centric and non-network-centric COAs to defeat or mitigate ongoing threats such as a persistent sophisticated intruder 1 While coordination and deconfliction are important and all inputs will be considered by USSTRATCOM JTF-GNO when deciding to approve or disapprove a particular course of action non-concurrence from an organization does not constitute a veto over the operation 2 Non-time-sensitive coordination and deconfliction will use a more deliberative process employing periodic coordination and or deconfliction meetings correspondence teleconferences and video teleconferences 3 Non-time-sensitive coordination and deconfliction procedures shall be used when USSTRATCOM JTF-GNO contemplates non-network-centric COAs such as diplomatic initiatives public affairs campaigns law enforcement informational exchanges with foreign countries etc or when network-centric Tier One incident responses are necessary but not assessed as time sensitive 4 Coordination and or deconfliction meetings will be held periodically e g weekly bi-weekly with the IC appropriate DOD LE CI organizations the LE CI Center combatant commands Service components USSTRATCOM JTF-GNO staff and other government CND organizations as required c Operational Practices Coordination and deconfliction must occur across Tiers between agencies and with other DOD or external organizations as appropriate The following operational practices provide guidance on how this should occur 1 Establishing Meeting Frequency Determine how often coordination and deconfliction actions must occur between organizations a For Tier One level incident responses the USSTRATCOM JTFGNO will establish the coordination deconfliction meeting frequency and ensure meeting notification is provided to appropriate organizations b For Tier Two level responses the respective C S A and field activity will establish the coordination deconfliction meeting frequency and ensure meeting notification is provided to appropriate organizations keeping USSTRATCOM JTF-GNO informed of any planned and executed incident responses F-A-2 Appendix A Enclosure F CJCSM 6510 01A 24 June 2009 2 Initial Notifications Initial notification and request for coordination and deconfliction shall include the following information at a minimum a A summary of the CND event to include threat assessments damage assessments technical and operational impacts and actions taken so far b Attribution assessment with levels of confidence c COAs under consideration and assessment d Time when inputs must be provided back to the incident response lead agency d Managing Concurrence and Alternative COAs Work with all parties affected by the response to understand their level of concurrence with the recommended COAs and to solicit alternative COAs as needed 1 Coordination and or deconfliction inputs from the IC or LE CI organizations for both time-sensitive and non-time-sensitive operations will include a statement of understanding where they may concur or nonconcur with proposed COAs 2 In cases where an organization nonconcurs the organization will provide supporting technical operational or policy information as required so the operational impact of COAs on those organizations can be balanced against the ongoing threat Nonconcurrence does not equate to a veto 3 Organizations may recommend alternate COAs in cases where an organization nonconcurs with proposed COA Organizations may provide assessments of the threat potential collateral damage operational impact and political impact assessment for each COA Organizations may also recommend no action be taken for DOD allied and other forces networks 4 Organizations should identify data discrepancies and corrected data if they do not concur in that data provided by the incident response lead agency F-A-3 Appendix A Enclosure F 6510 01A 24 June 2009 INTENTIONALLY BLANK Appendix A Enclosure CJCSM 6510 01A 24 June 2009 APPENDIX B TO ENCLOSURE F INTELLIGENCE SUPPORT TO INCIDENT REPORTING 1 Introduction Intelligence support to CND is essential in order to provide knowledge reduce uncertainty and support effective operational decisionmaking Accurate and timely intelligence analysis of network events and of adversary’s actions against the Department of Defense’s enterprise is critical to ensuring both operations and the future viability of the military’s vital information resources and investments 2 Joint Threat Intelligence Database a The JTID is the Department of Defense’s central repository for this key intelligence The primary objective of the database is to ensure the timely flow of crucial network intelligence across DOD USG and ally boundaries The JTID and Joint Threat Intelligence Portal JTIP comprise the tool suite used to derive intelligence reporting b The JTID is used for recording possible foreign activity and domestic initiated threat activity suspected of being foreign in origin and against DOD networks Use of the JTID is required by the USSTRATCOM JTF-GNO J2 and each Service component CERT CIRT intelligence support element for the following categories of intrusions 1 Category 1 – Root Level Intrusion 2 Category 2 – User Level Intrusion 3 Category 4 – Denial of Service c The JTID may also be used by combatant command Joint Intelligence Centers Joint Analysis Center Joint Intelligence Operation Centers JICs JAC JIOCs DIA NSA and DOD Service agency intelligence centers d The JTID is populated with Threat Identification Database records TIDs based on JCD entries corresponding to threat activity against DOD computers and networks TIDs include both technical and intelligence data related to the IP addresses conducting activity against DOD systems 1 JTID will be the primary repository of intelligence related to Category 1 Category 2 and Category 4 incidents and database intelligence F-B-1 Appendix B Enclosure F CJCSM 6510 01A 24 June 2009 related to named intrusion sets USSTRATCOM JTF-GNO J3 is responsible for DOD-focused operations such as official named intrusion sets 2 During analysis of network events a serious pattern or series of events may be identified and analytically developed by a Service or other element For the purposes of analytic collaboration and communication identifying this activity by a specific name may be warranted In such a case the Service who identifies the activity will maintain the criteria and determination of what falls into that “named area of interest” NAI If the activity crosses multiple services or organizations USSTRATCOM JTF-GNO J3 may determine the activity warrants being an enterprise event USSTRATCOM JTF-GNO may then use the Services criteria to create an official USSTRATCOM J3 Focused Operation 3 The objective of JTID intelligence reporting is to share intelligence information and events in support of CND by enabling rapid cross-cueing of threat activity and fusion of all-sources of information on foreign threats to DOD networks 3 Intelligence Reporting Procedures a CND intelligence reporting on network events focuses on foreign threats to DOD networks and has been divided into three types of reporting 1 JTID JTID intelligence reports generated in a timely manner for incidents events meeting a specified reporting threshold based on technical event data augmented with all-source intelligence information 2 Network Intelligence Report NIR All-source intelligence reports focused on details of individual activity or a single event a correlation of several JTID records entity reporting on a person or organization related 3 Strategic Intelligence Report SIR SIR are all-source finished intelligence products intended for a general audience b Initial Intelligence Reporting Individual entries in the JTID are referred to as TIDs and are based on threat activity against DOD networks that might be of foreign origin Note the JTID also contains records of domestic IP addresses but the events associated with this activity are presumed foreign until proven otherwise 1 JTID records are a timely technical summary of an event supplemented with intelligence analysis that is entered into the JTID Technical event details are derived from an entry in the JCD or through other F-B-2 Appendix B Enclosure F CJCSM 6510 01A 24 June 2009 sources Technical specificity in initial JTID reports is vital to establishing or ruling out correlation between events during follow-on analysis 1 A JTID entry is required for every Category 1 – Root Level Intrusion 2 – User Level Intrusion 4 - DoS and incidents that appear to be associated with USSTRATCOM JTF-GNO -focused operations A JTID entry for other incident categories is optional but recommended when associated with focused operations 2 Input into JTID of initial analysis is required as soon as information becomes available Initial analysis on an event should occur as soon as feasible 3 The USSTRATCOM JTF-GNO J2 and the Service component CERT CIRT intelligence support elements are required to perform Initial JTID Intelligence reporting 4 This section was previously referred to as Phase I reporting c NIRs NIRs can be based on patterns that emerge from correlation of JTID reports and or provide correlated and amplifying intelligence on cyber event s or entity s 1 There are generally two types of NIRs a Event-based NIR Event-based NIRs focus on an incident group of incidents or network activity b Entity-based NIR Entity-based NIRs focus on an individual group or organization identified as a threat or potential threat to DOD networks 2 As with initial reports timeliness for NIRs is important Upon recognition of a correlation between network incidents malicious network activity analysis on an entity a NIR should be issued as soon as feasible a NIRs will be disseminated through message traffic when organizational processes allow with a URL link to report if appropriate b NIRs will have a standard Title Subject line Example “Service Organization Network Intelligence Report Serial Number Title” c The USSTRATCOM JTF-GNO J-2 and the Service component command CERT CIRT intelligence support elements are required to perform follow-on reporting when significant patterns or intelligence is identified F-B-3 Appendix B Enclosure F CJCSM 6510 01A 24 June 2009 associated with events or entity activity NIR reporting may also be generated by Combatant Command JICs JAC JIOCs DIA NSA and DOD Service agency intelligence centers d NIRs will be in following format Table F-B-1 SERVICE ORGANIZATION NETWORK INTELLIGENCE REPORT SERIAL NUMBER “TITLE” Summary Executive overview key points and bottom-line Details Result of incident source characterization target characterization activity pattern characterization and background entity characterization Threat Assessment Analyst comments recommendations intelligence impact OPSEC analysis and significant information from operations References Sources used in the report will be included in the Reference section to include JTID numbers when appropriate Contact information Your contact information organization e-mail phone number etc Amplifying or Additional Information When amplifying information exists it should be included Examples of this type of information include but are not limited to additional technical data list of hostile IPs list of victims signatures hashes tools host names URLs intelligence gaps and related collection requirements with appropriate classification markings Table F-B-1 NIR Report Format e This section was previously referred to as Phase II reporting d SIRs A SIR is an all-source finished intelligence report for a general audience 1 The objectives of SIRs are to a Report final attribution b Provide full-scope examinations of events and incidents c Provide assessment of event entity’s and incident strategic significance d Provide damage assessments 2 SIRs may omit the detail provided in initial reports or follow-on reports These reports should attempt to capture the full military and or F-B-4 Appendix B Enclosure F CJCSM 6510 01A 24 June 2009 political significance of network activity Strategic reporting is normally generated in response to intelligence consumer production requirements based on organization production priorities and focus Such reports can be considered as the agreed upon “Intelligence Community” assessment of a threat 3 Strategic reports may be based on a wide variety of reporting topics relevant to entities or issues of importance to intelligence support to CND For example these reports may provide potential threat information on foreign actors e g governments sub-national actors and individuals technology issues or trends future projections case studies or global characterizations 4 Timeliness for strategic reporting is an important consideration because it must be relevant to operational needs and other consumer requirements Although it is not possible to designate a specific time requirement once a consumer deadline has been established the intelligence production element must meet that requirement on a timely basis 5 SIRs may be generated by any CND intelligence provider 6 Formatting for SIRs is flexible However SIRs will generally conform to DOD-wide standards such as the Intelligence Community Assessment 7 This section was previously referred to as Phase III reporting 4 Product Dissemination a The Services combatant commands are required to use the primary reporting vehicle i e JTID Analysis of network activity will be entered into the JTID and thus available for the communities use as soon as feasible Significant events should also be disseminated via message traffic to assure that immediate defensive mitigation actions can be taken b When organizational processes allow all NIRs and strategic-level reports will be disseminated via automated message handling system AMHS M3 It is up to the discretion of each organization to provide other means of dissemination such as posting to a Web page or via e-mail c The format of message should follow guidelines as stated above or as disseminated by USSTRATCOM JTF-GNO 5 Writing For Release a All classified reports will be written for the widest dissemination possible If appropriate one report may have multiple versions at different F-B-5 Appendix B Enclosure F CJCSM 6510 01A 24 June 2009 classification levels e g REL TO USA NATO or REL TO FVEY i e Australia Canada New Zealand United Kingdom and United States b All reports will include a “tear-line” or Appendix for information usually technical in nature which is UNCLASSIFIED FOR OFFICIAL USE ONLY Inclusion of such an Appendix will reduce ambiguity and provide clarity for the CND community on what information can be used in sensors 6 JTF-GNO “Smart Book ” USSTRATCOM JTF-GNO will manage a community “Smart Book ” This book contains background information for the CND IC Additional information such as standard format for Analyst Notebook Charts and organizational missions will be maintained in this book Currently the “Smart Book” can be located on USSTRATCOM JTF-GNO’s JWICS Web page F-B-6 Appendix B Enclosure F CJCSM 6510 01A 24 June 2009 ENCLOSURE G CND INCIDENT HANDLING TOOLS This enclosure provides an overview of common tools that are used by the CND community to facilitate incident handling 1 CND User Defined Operational Picture a The CND UDOP20 provides local intermediate and DOD-wide situational awareness of CND activities operations and their impact b The Enterprise Sensor Grid ESG feeds the UDOP The ESG collects processes and stores the DOD networking sensing environment e g raw processed correlated alert etc available for use by the CND analyst c The CND UDOP will provide an enterprise view of the C S A and field activity sensors vulnerabilities and protection capabilities The UDOP leverages common data views and mechanisms for data sharing It provides information to the CND analyst community that facilitates the execution of selected COAs to mitigate and respond to attacks directed at the GIG 2 Joint CERT Database a The JCD is the central repository for managing all reportable events and incidents in the Department of Defense It serves as the primary reporting mechanism for submitting reportable events and incidents to USSTRATCOM JTF-GNO and is the basis for USSTRATCOM JTF-GNO support to combatant commanders senior government leaders and civilian authorities b The consistent complete and timely reporting of incident data into a single repository is necessary to reflect the collective reporting of adversarial activity It can also help shape tactical strategic and military response strategies c The C S As and field activities provide reportable event and incident reports to the JCD in the form of database records These reportable event and incident records are integrated correlated and displayed using a variety of visualization applications the combination of which provide the CND community with a shared situational awareness capability 20 The CND UDOP is currently under development CND developers can request account at http udop osf disa smil mil udop newaccount html G-1 Enclosure G CJCSM 6510 01A 24 June 2009 d The USSTRATCOM JTF-GNO is the functional owner of the JCD The USSTRATCOM JTF-GNO maintains and manages the JCD Access to the JCD can be obtained through USSTRATCOM JTF-GNO on the SIPRNET 3 Joint Malware Catalog21 a The JMC is the central repository for storing malware and associated analysis It serves as the primary reporting mechanism for submitting software artifacts suspected of being adversarial tradecraft e g viruses rootkits and worms b The JMC is the basis for the Department of Defense’s capability to rapidly analyze malicious code and provide accurate understanding of its behavior and capabilities By maintaining a current malware repository the Department of Ddefense can leverage previous analytical experience identify and respond to new attack techniques and perform applied research to improve analysis capabilities c The C S As and field activities submit malware to the JMC Malware recorded in the JMC can then be analyzed viewed correlated and shared with other DOD organizations Some analytical results are produced automatically using automated run-time analysis tools More in-depth analysis may be conducted by technical analysts and recorded in the JMC to share with others d The USSTRATCOM JTF-GNO is the functional owner of the JMC The USSTRATCOM JTF-GNO maintains and manages the JMC Access to the JMC can be obtained through USSTRATCOM JTF-GNO 4 CND Intelligence Analysis Tools a The primary CND intelligence analysis tool suite used to derive CND intelligence information consists of the JTID and the JTIP b JTID is an analysis environment available via both the JWICS and SIPRNET networks that is intended to fuse intelligence with network incident reports synchronized from JCD c JTID data is comprised of all of the significant foreign-initiated computer intrusion or probe activity noted by incident analysts 21 The Joint MALWARE Catalog is currently under development CND developers interested in participating should contact the JTF-GNO G-2 Enclosure G CJCSM 6510 01A 24 June 2009 d Intelligence analysts research the TTPs used by the adversary during each incident to ascertain what adversary may be responsible and if there is any additional associated suspicious activity with this or other DOD hosts e Both classified and open source research is used in the analysis and any derived intelligence is included in the JTID f The information and accompanying intelligence is provided in order to document this activity and to help determine common methodologies and trends used by threat actors g The JTIP is an information source for intelligence research intended to consolidate data from several sources of CND threat intelligence information h The JTIP system is available only via the JWICS network and consists of JTID data as well as the JWICS Web site contents of several DOD CND organizations e g JTF-GNO and NTOC 5 DOD Protected Traffic List a The USSTRATCOM JTF-GNO maintains the DOD Protected Traffic List at the following URL http www jtfgno smil mil This list ensures critical DOD systems are not affected inadvertently by responses to CND events b This list includes Internet-NIPRNET traffic enclave traffic and key allied interoperability traffic This technical data list includes IP addresses and transmission control protocol Internet protocol TCP IP ports as well as operational impacts if protected traffic is blocked c C S As and field activities notify the JTF-GNO of any actions taken that affect the DOD Protected Traffic List Systems on the DOD Protected Traffic List may be affected under extreme circumstances therefore it is imperative to identify the operational impact of actions taken prior to blocking traffic that may be on the protected traffic list 6 DOD Enterprise Incident Sets a Incident sets are groups of related incidents and associated data requiring centralized management at the DOD level b Incident sets may span multiple C S As and field activities or merit DOD-level attention based on the scope or implications of the incidents c Due to the strategic concern and implications of incident sets USSTRATCOM JTF-GNO notifies STRATJIC IO Division of incidents and actions taken G-3 Enclosure G CJCSM 6510 01A 24 June 2009 d The USSTRATCOM JTF-GNO is the central manager for all DOD Enterprise Incident Sets Incident sets are identified to the network operations community using CTOs which designate 1 Incident set unique name 2 Summary description 3 POC information 4 Incident set signature indicators 5 Response action guidance for incidents meeting incident set criteria 6 Special reporting guidance for both technical reporting and operational reporting e Tier Two entities develop capabilities to track ongoing incident sets and determines if detected intrusions match criteria for inclusion f Intrusions and or alert data matching a defined incident set signatures are reported immediately to the USSTRATCOM JTF-GNO g Coordination and deconfliction activities with the LE CI community for USSTRATCOM JTF-GNO managed incident sets occur via the LE CI Center at JTF-GNO 7 DOD Network Deception Projects a DOD entities deploying network deception programs e g honeypots report the device and or program to the USSTRATCOM JTF-GNO for situational awareness prior to connection to any DOD network b This information is used to deconflict sensor reports of suspicious activities or potentially vulnerable systems c Trusted agents within the USSTRATCOM JTF-GNO safeguard system information Information on deception projects include 1 Mission intent and purpose of the project 2 Location internet address es and types of device s must include the WAN routable IP addresses 3 Type of data to be collected G-4 Enclosure G CJCSM 6510 01A 24 June 2009 4 POC for the device s to include telephone e-mail and organization 8 Information Operations Condition INFOCON a Commanders may raise INFOCON levels to re-establish the confidence level of systems based on the tradeoff in resources Alternatively they may execute tailored readiness options to respond to specific intrusions or threats b Changes to INFOCON may require coordination with other C S As and field activities Additional information about INFOCON is available in reference z G-5 Enclosure G 6510 01A 24 June 2009 INTENTIONALLY BLANK Enclosure CJCSM 6510 01A 24 June 2009 ENCLOSURE H REFERENCES a DOD 5200 1-R 14 January 1997 “Information Security Program” b CJCSI 6211 02 Series “Defense Information System Network DISN Policy and Responsibilities” c NIST Special Publication 800-61 March 2008 “Computer Security Incident Handling Guide” d CJCSI 6510 01 Series “Information Assurance IA and Computer Network Defense CND ” e Federal Information Security Management Act Title III Information Security f OMB Circular No A-130 “Management of Federal Information Resources” g DODI O-8530 2 9 March 2001 “Support to Computer Network Defense CND ” h DODI O-3600 02 28 November 2005 “Information Operation IO Security Classification Guidance” i DODI 5505 3 21 June 2002 “Initiation of Investigation by Military Criminal Investigative Organizations” j ASD C3I memorandum 26 February 2003 “Guidance for Computer Network Defense Response Actions” k CJCSM 3150 03 Series “Joint Reporting Structure Event and Incident Reports” l DOD 5400 11-R 14 May 2007 “Department Of Defense Privacy Program” m Privacy Act of 1974 5 U S C Section 552a n OMB memorandum M-07-16 22 May 2007 “Safeguarding Against and Responding to the Breach of Personally Identifiable Information” o OMB memorandum M-06-16 23 June 2006 “Protection of Sensitive Agency Information” H-1 Enclosure H CJCSM 6510 01A 24 June 2009 p OMB memorandum M-06-19 12 July 2006 “Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency Information Technology Investments ” q NIST Special Publication 800-86 August 2006 “Guide to Integrating Forensic Techniques into Incident Response” r 18 U S C section 2510 et seq s 18 U S C section 31212 et seq t 18 U S C section 2701 et seq u Federal Rules of Evidence Exception 803 6 v Electronic Communications Privacy Act ECPA w DOD Instruction 8500 2 6 February 2006 “Information Assurance IA Implementation” x NIST Special Publication 800-60 “Volume 1 Guide for Mapping Types of Information and Information Systems to Security Categories” y 18 USC 2511 2 a i z SD 527-1 27 January 2006 “Department of Defense DOD Information Operations Condition INFOCON System Procedures” aa Joint Publication 1-02 Series “Department of Defense Dictionary of Military and Associated Terms” bb DODI 8510 01 28 November 2007 “DOD Information Assurance Certification and Accreditation Process DIACAP ” cc Committee on National Security Systems Instruction CNSSI 4009 “National Information Assurance IA Glossary” dd DOD O-8530 1-M 17 December 2003 “Department of Defense Computer Network Defense CND Service Provider Certification and Accreditation Process” ee DOD Directive 8100 1 19 September 2002 “Global Information Grid GIG Overarching Policy” ff DOD Directive 8500 01E 24 October 2002 “Information Assurance IA ” H-2 Enclosure H CJCSM 6510 01A 24 June 2009 gg Joint Concept of Operations for Global Information Grid Network Operations hh DODI 8552 01 23 October 2006 “Use of Mobile Code Technologies in DoD Information Systems” ii Department of Justice DOJ National Institute of Justice Investigations Involving the Internet and Computer Networks http www ojp usdoj gov nij pubs-sum 210798 htm H-3 Enclosure H 6510 01A 24 June 2009 INTENTIONALLY BLANK Enclosure CJCSM 6510 01A 24 June 2009 GLOSSARY ACL - access control lists AOR – area of responsibility ARP – address resolution protocol ASD C3I - Assistant Secretary of Defense for Command Control and Communications and Intelligence AS W – attack sensing and warning AV – anti-virus B B P C S- base post camp station BDA – battlefield damage assessment C C2 – command and control CAT - category CCC – C4 Control Center C S A – Combatant Command Service Agency CCIR – Commander’s Critical Information Requirement CERT – computer emergency response team CI - counterintelligence CIO – chief information officer CIRT – computer incident response team CND - Computer Network Defense CNDSP – Computer Network Defense Service Provider COA - course of action CSIRT – Computer Security Incident Response Team CTO – communications tasking order CUI – controlled unclassified information D DAA - Designated Accrediting Authority DAA DCIO – Defense Criminal Investigative Organization DHS – Department of Homeland Security DIB – Defense Industrial Base DISA – Defense Information Systems Agency DLL – Dynamic-link Library DOD - Department of Defense DODI – Department of Defense Instruction DOJ - Department of Justice DOS – Department of State D DoS – denial of service GL-1 Glossary CJCSM 6510 01A 24 June 2009 DSN – Defense Switch Network DTG – date time group E ECPA - Electronic Communications Privacy Act ESG – Enterprise Sensor Grid F FISMA – Federal Information Security Management Act FISS – Foreign Intelligence and Security Services G GIG – Global Information Grid GNCC – Global Network Control Center GNSC – Global Network Support Center H HQ – headquarters I I W – Indications and Warning IA – Information Assurance IAPC - Information Assurance Protection Center IAVM – information assurance vulnerability management IAW – in accordance with IC – Intelligence Community ICCWG – International CND Coordination Working Group IC-IRC – Intelligence Community – Incident Response Center IDS – intrusion detection system IIMG – Interagency Incident Management Group IM –instant messaging INFOCON – Information Operations Condition IO – information operations IP - Internet Protocol IPS – intrusion prevention system IS – information system ISP – Internet Service Provider IT – information technology J JCD – joint CERT database JMC – Joint Malware Catalog JTF-GNO – Joint Task Force – Global Network Operations J JTID - Joint Threat Intelligence Database GL-2 Glossary CJCSM 6510 01A 24 June 2009 JTIP - Joint Threat Intelligence Portal JTIP JWICS – Joint Worldwide Intelligence Communications System L LAN - Local Area Network LE – law enforcement LECIC – Law Enforcement and Counterintelligence Center LES - law enforcement sensitive M MAC – mission assurance category MB – megabyte N NAI - named area of interest NCRCG – National Cyber Response Coordination Group NIPRNET – Non-Secure Internet Protocol Router Network NIR- Network Intelligence Report NIST – National Institute of Standards and Technology NGA - National Geospatial-Intelligence Agency NMCC - National Military Command Center NOSC - Network Operations Security Center NRO – National Reconnaissance Office NSA – National Security Agency NSC – Network Service Centers NTOC - National Security Agency Central Security Service Threat Operations Center O OCA – original classification authority OI – operational impact OMB – Office of Management and Budget OODA – observe orient decide act OPORDS – operational order OPREP – Operational Report OPSEC – operations security OS – operating system OSD – Office of the Secretary of Defense P P2P- Peer-to-peer PAA – Principal Accrediting Authority PDA – Personal Digital Assistant P PII - personally identifiable information GL-3 Glossary CJCSM 6510 01A 24 June 2009 POC – point of contact RA – Response Actions RAM - Random-Access Memory R S SA – situational awareness SCI – sensitive compartmented information SIPRENT – SECRET Internet Protocol Router Network SIR - Strategic Intelligence Report SJA – Staff Judge Advocate STIG - Security Technical Implementation Guides STRATJIC – USSTRATCOM Joint Intelligence Center T TCCC – Theater C4I Control Center TCP - Transmission Control Protocol TDY – temporary duty TI – technical impact TID - Threat Identification Database records TNC – Theater NetOPs Center TNCC – Theater Network Control Center TPFDD – time-phased force deployment data TRO – tailored readiness option TS – TOP SECRET TTP – tactics techniques and procedures U UDOP – User-Defined Operational Picture URG - Urgent URL - Uniform Resource Locators USB – universal serial bus US-CERT – United States – Computer Emergency Readiness Team USSTRATCOM – United States Strategic Command WAN – wide area network W GL-4 Glossary CJCSM 6510 01A 24 June 2009 PART II – DEFINITIONS The following terminology is chiefly specialized for information assurance and computer network defense and is intended for use in this publication and the activities described herein Unless indicated by a parenthetic phrase after the definition that indicates the source publication or document these terms have not been standardized for general DOD-wide use and inclusion in the Department of Defense Dictionary of Military and Associated Terms JP 1-02 reference aa In some cases JP 1-02 may have a general DOD-wide definition for a term used here with a specialized definition for this instruction Accreditation Decision See reference bb Attack Sensing and Warning AS W See reference cc Availability See reference cc Blue Team Blue Teams plan and execute pre-exercise vulnerability assessments and surveys prior to an exercise to permit corrective action on discrepancies and to allow development of a readiness “baseline” for that activity Coordination for Blue Team participation in a combatant command Service exercise is completed prior to or early in the exercise planning cycle Blue Teams may be provided by the NSA DISA and the Services or are formed as required to support a specific exercise Normal duties and responsibilities of Blue Teams include the following System Vulnerability Analysis Component Configurations and Vulnerability Discovery Command Authority See definition of “command” in reference aa Commander’s Critical Information Requirement CCIR See reference aa Component CND Authority See reference dd Computer Network See reference g Computer Network Defense CND See reference aa Computer Network Defense CND Operational Hierarchy See reference dd Computer Network Defense Response Actions CND RAs See reference j Computer Network Defense CND Services See reference dd GL-5 Glossary CJCSM 6510 01A 24 June 2009 Computer Network Defense Service Provider CNDSP See reference dd Confidentiality See reference cc Counterintelligence See reference aa Counterintelligence Activities The four functions of counterintelligence are operations investigations collection and reporting and analysis production and dissemination Counterintelligence Investigation See reference aa Enclave See reference cc Enterprise CND Sensor Grid A coordinated constellation of decentrally owned and implemented intrusion and anomaly detection systems deployed throughout DOD information systems and computer networks The CND sensor grid supports sensing capabilities for NetOps Event See reference cc General Service Network or System GENSER See reference dd Global Information Grid GIG See reference ee Incident See reference aa Incident Handling The detection analysis and response to any event or incident for the purpose of mitigating any adverse operational or technical impact Indications and Warning I W See reference dd Information Assurance IA See reference ff Information Assurance Vulnerability Management IAVM The comprehensive distribution process for notifying C S As and field activities about vulnerability alerts bulletins technical advisories and countermeasures information The IAVM program requires C S A and field activity receipt acknowledgment and provides specific time parameters for implementing appropriate countermeasures depending on the criticality of the vulnerability Information Operations Condition INFOCON See reference z GL-6 Glossary CJCSM 6510 01A 24 June 2009 Integrity See reference cc Joint CERT Database The Joint CERT Database is the central DOD database providing enhanced data querying and the capability to report and or upload network incident data Joint Malware Catalog The Joint Malware Catalog is the central DOD repository for storing malware and associated analysis It serves as the primary reporting mechanism for submitting software artifacts suspected of being adversarial tradecraft e g viruses rootkits and worms Joint Threat Intelligence Database The Joint Threat Intelligence Database is the central DOD repository for network intelligence across DOD USG and ally boundaries Mission Assurance Category See reference ff Network Operations NetOps NetOps is defined as the operational construct consisting of the essential tasks GIG Network Defense GIG Enterprise Services and Content Staging Information Dissemination Management Situational Awareness SA and C2 that the USSTRATCOM will use to operate and defend the GIG The three desired effects of NetOps are Assured System and Network Availability Assured Information Protection and Assured Information Delivery reference gg Red Team See reference cc Reportable Event An event that may or may not result in an incident but is required to be reported in accordance with this manual or other DOD reporting guidelines e g OPREP 3 Reporting Special Enclave DOD information systems and or computer networks with special security requirements e g Special Access Programs Special Access Requirements System See reference ff Trusted Media Media provided by a Trusted Source that is adjudged to provide reliable software code and or information and whose identity can be verified by authentication Trusted Source A software and or information source that is adjudged to provide reliable software code and or information and whose identity can be verified by authentication reference hh GL-7 Glossary CJCSM 6510 01A 24 June 2009 Trusted Toolkit Tools provided by a Trusted Source that is adjudged to provide reliable software code and or information and whose identity can be verified by authentication Vulnerability Assessment See reference cc GL-8 Glossary
OCR of the Document
View the Document >>