As cybersecurity professionals our scope doesn’t end with physical and logical security. We also need to be well versed in incident response. There are many different tools and deployment strategies we can employ to protect our assets and recovery from a data and/or security breach.
Your assignment for this week is to imagine your enterprise has just been informed of an incident with data theft. The DLP server has alerted your cybersecurity team of confidential data and PHI being exported out from an identified workstation in the server room. You will create a scenario in which you respond to this incident, apprehend the intruder, and secure the scene for the police department’s forensics team to come and retrieve the data.
Data Exfiltration at Acumen Corp.
Scenario:
10:15 AM: The Data Loss Prevention (DLP) server at Acumen Corp. triggers an alert. Confidential data, including personal health information (PHI), is being exported from an unauthorized workstation in the server room. The security team receives immediate notification.
10:16 AM:
10:25 AM:
10:30 AM:
10:45 AM:
11:00 AM onwards:
Key Points:
This scenario demonstrates a well-coordinated incident response to a data exfiltration incident. By adhering to these principles and procedures, organizations can minimize the impact of cyberattacks, secure valuable data, and bring perpetrators to justice.