Incident Response Plan
Incident Response Plan
Tyler Higgins
Author Note
This paper was prepared for NTS405 – Incident Response, taught by Greg Mile
FINAL PROJECT 2
The Scenario
My company is an aviation maintenance school, this is my real company but will call it
Aero Mech to cover it, that has very relaxed IT staff that never follow cybersecurity best
practices. For example, there are multiple users on the network that use a domain admin account
for their daily duties. They also do not have any remote monitoring and management solutions in
place and improper update management solutions in place. Worst of all, they do not rotate or use
complex passwords to keep high privileged accounts secured. All this has led to a ransomware
The Events
In this scenario, one of the of the domain admis, who is not IT staff, has been tricked into
opening a malicious email that contained ransomware, this was a new type of ransomware, and it
was able to bypass the anti-virus solution used by the school. Because the victim had domain
admin permissions, this one attack was able to propagate through the entire network, encrypting
every system connected when the attack was launched, plus any new devices that may connect
latter.
Next, once all the data has been encrypted by the ransomware the company is faced with
a major challenge; pay the ransom or risk the data being leaked on the dark web. Since this is a
school, the data that has been encrypted is not just employee and company data; it is also student
date that is protected by federal laws, FERPA for example. The good news, Aero Mech has
decent data backup that are stored offsite and the systems they use are hosted at their corporate
FINAL PROJECT 3
offices. The only danger Aero Mech is facing is the release of protected student information and
employee files.
The Response
This is a multi-level response plan. The first part of the response is to pay the ransom,
since we cannot afford the damage to our reputation with a massive data leak of student
information. While it is not best to pay a ransom, since it will make you a larger target in the
future, it is the only option Aero Mech can pick to keep the student data safe.
Once the ransom has been paid and the decryption key has been received the data can be
fully recovered. Now that the data has been recovered, we must prevent this type of attack from
happening again. To do this the first step is to remove the standard process of running domain
admin accounts as a daily drive account and remove the number of people that have access to the
credentials to the domain admin account. Passwords will be changed, and a new password policy
will be put in place, not just for the domain admin account but for all accounts, that will set a
minimum length along with complexity requirements. To be extra safe, passwords will also be
Now that all the accounts have been secured, it is time to move on to the rest of the
network. The update solution that is not working will be replaced with a simple PowerShell
script that will be run daily as a task to check for and install updates. A proper remote monitoring
and management solution will also be deployed, like PulseWay, to monitor our network for
Lastly, as a final step to help keep our network safe, we will be deploying a more in-
depth firewall solution and anti-virus system. We will be using a complete endpoint defense and
FINAL PROJECT 4
recovery solution like the SentinelOne Singularity XDR system to prevent ransomware attacks to
Conclusion
In conclusion, now days we cannot be relaxed and just simple do what we have always
done when it comes to cybersecurity and defense. We must be proactive when it comes to
defending our systems and using old practices to keep a modern network safe is a recipe for
disaster. While I did use my real company for this paper, I truly hope this type of event never
happens to our campus or any campus tied to our corporation. I know that if this were to happen
it would most likely be the end of our company or at the very least it would cost of a lot to
recover this an attack like the one outlined in this paper. I also truly hope my corporate IT team
gets their heads out of their backsides and get with the times to keep our networks safer than they
currently are.
FINAL PROJECT 5
References
ment. https://www.pulseway.com/
ity-xdr/