Book Image

Incident Response in the Age of Cloud

By : Dr. Erdal Ozkaya
Book Image

Incident Response in the Age of Cloud

By: Dr. Erdal Ozkaya

Overview of this book

Cybercriminals are always in search of new methods to infiltrate systems. Quickly responding to an incident will help organizations minimize losses, decrease vulnerabilities, and rebuild services and processes. In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book uses frameworks such as MITRE ATT&CK® and the SANS IR model to assess security risks. The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply these strategies, with discussions on incident alerting, handling, investigation, recovery, and reporting. Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence and the procedures involved in IR in the cloud. Finally, the book concludes with an “Ask the Experts” chapter wherein industry experts have provided their perspective on diverse topics in the IR sphere. By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently.
Table of Contents (18 chapters)
16
Other Books You May Enjoy
17
Index

IR readiness in the cloud

Adversaries are using every opportunity that they can find to "penetrate," infect, harm, and disrupt your networks, regardless of whether you are in a traditional IT environment, cloud environment, or hybrid. Threat actors are well aware that even after nearly 50 years of computers being used commonly, IT teams still make misconfiguration mistakes. Looking at the cloud, which is fairly new compared to traditional IT, threat actors know that critical data will be duplicated poorly, and be unprotected and unsupervised in cloud environments. Chapter 11, Incident Response in the Cloud, explored how you can address cybersecurity incidents in the cloud, but here are a few reminders in the context of incident readiness:

  • Know the differences and common points between your cloud and traditional environments. Implement security measures to protect your cloud environments. Keep in mind that in the cloud, you'll need to focus more on applications...