RSA Archer Security Operations Management
RSA Archer Security Operations Management
Operations Management 1
Practitioner Guide
Contact Information
Go to the RSA corporate web site for regional Customer Support telephone and fax numbers:
http://www.emc.com/support/rsa/index.htm.
Trademarks
RSA, the RSA Logo, RSA Archer, RSA Archer Logo, and EMC are either registered trademarks or trademarks of EMC
Corporation ("EMC") in the United States and/or other countries. All other trademarks used herein are the property of their
respective owners. For a list of RSA trademarks, go to www.rsa.com/legal/trademarks_list.pdf.
License agreement
This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may
be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This
software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by EMC.
Third-party licenses
This product may include software developed by parties other than RSA.
Note on encryption technologies
This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption
technologies, and current use, import, and export regulations should be followed when using, importing or exporting this
product.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Copyright © 2014 EMC Corporation. All Rights Reserved. Published in the USA.
January 2014
Practitioner Guide
Contents
Preface 6
About This Guide 6
RSA Archer Documentation 6
RSA Archer Security Operations Management Documentation Set 6
RSA Archer Security Operations Management Data Dictionary 7
Support and Service 7
Chapter 1: Security Operations Management 9
Security Operations Management 9
Challenges in Security Operations Management 10
RSA Archer Security Operations Management 10
Solution Sources, Standards, and Frameworks 12
Architecture Overview 13
RSA SOC Reference Architecture 13
RSA Archer Security Operation Management Architecture 14
Key Personas in Security Operations Management 15
SOC Manager 16
Incident Coordinator 17
L1 Incident Handler 18
L2 Incident Handler 19
CSO/CISO 20
IT Helpdesk Analyst 21
Cyber Threat Intel Analyst 21
Business Unit Manager 22
Corporate Compliance/Privacy Officer 23
RSA Archer Security Operations Management Workflow Overview 23
Solution Dashboards 25
L1/L2 Incident Handler Dashboards 26
Incident Coordinator Dashboard 27
SOC Manager Dashboard 28
Breach Response Dashboard 29
IT Helpdesk Dashboard 29
Solution Implementation 30
Managing SOC Readiness 30
Responding to Incidents 31
Responding to Data Breaches 32
Remediating Issues 32
Chapter 2: Managing SOC Readiness 34
Managing SOC Staff and Contacts 34
Document Solution Users 34
Document SOC Staff Skill Sets 35
Document SOC Teams and Team Members 35
Managing SOC Policies and Procedures 36
SOC Policies 36
SOC Policy Review Process 37
Document SOC Policies 37
3
Practitioner Guide
4
Practitioner Guide
5
Practitioner Guide
Preface
Documentation Location
RSA continues to assess and improve the documentation. Check the RSA Archer
Community and RSA Archer Exchange for the latest documentation.
Guide Description
Preface 6
Practitioner Guide
Guide Description
You can access the RSA Archer Security Operations Management solution
documentation from the Documents page on the RSA Archer Exchange at
https://community.emc.com/community/connect/grc_ecosystem/rsa_archer_
exchange.
7 Preface
Practitioner Guide
The Community enables collaboration among GRC clients, partners, and product
experts. Members actively share ideas, vote for product enhancements, and discuss
trends that help guide the RSA Archer product roadmap.
The Exchange is an online marketplace dedicated to supporting GRC initiatives.
The Exchange brings together on-demand applications along with service, content,
and integration providers to fuel the success of RSA Archer clients.
Preface 8
Practitioner Guide
Note: Incident response centers are known by several names. The most common
ones are Security Operations Center (SOC), Critical Incident Response Center
(CIRC), Computer Security Incident Response Team (CSIRT), and Critical
Incident Response Team (CIRT). In this document, the term Security Operations
Center (SOC) team will refer to the overall team of individuals charged with
identifying and resolving security issues.
Standard Description
NIST This publication provides guidelines and best practices for incident
SP800-61 management. A key part of this document is the phases of incident
management, especially post-incident analysis. The RSA Archer Security
Operations Management solution uses several of these concepts within the
solution design.
http://csrc.nist.gov/publications/nistpubs/800-61rev2/SP800-
61rev2.pdf
US-CERT In the RSA Archer Security Operations Management solution, you can
extend the Threat Category enumeration to include the seven incident
categories (CAT0 – CAT6) that US-CERT uses. You can also create
response procedures for each of these categories in the SOC Procedure
Library application, and then automatically generate incident response
tasks for incident handlers.
https://www.us-cert.gov/government-users/reporting-
requirements
SANS 20 The RSA Archer Security Operations Management solution provides the
Critical capability to track all of the security controls deployed in your
Security organization, such as the SANS top 20, and monitor their effectiveness at
Controls detecting, preventing, or investigating security incidents.
http://www.sans.org/critical-security-controls/
Verizon The RSA Archer Security Operations Management solution uses the VERIS
VERIS framework for taxonomy and enumerations, enabling standard incident
Framework reporting and consistent information sharing with others.
http://www.verizonenterprise.com/resources/whitepapers/wp_
verizon-incident-sharing-metrics-framework_en_xg.pdf
Architecture Overview
RSA SOC Reference Architecture
The RSA Archer Security Operations Management solution is part of a broader
architecture to respond to today's security attacks. A security operations
management program depends on multiple technologies to identify and respond to an
active attack. As shown in the following diagram, RSA Archer Security Operations
Management (denoted as RSA SecOps) provides the overlay of program
enablement to the incident response process.
events occurring on the network and hosts. The business criticality of a given
asset (as defined by RSA Archer Enterprise Management) should also drive
forensic and monitoring priorities in RSA Security Analytics. The integration
between RSA Archer and RSA Security Analytics streamlines this process.
l RSA ECAT represents the host level forensics capabilities to deal with today’s
malware attacks. Many security threats today utilize malware as launching
points to larger security breaches. Security operations need this type of capability
to analyze and identify malicious software at the host level.
l RSA Live Intelligence. With today’s constant change in security threats, security
operations need a constant flow of security intelligence to adapt and focus on
emerging threats. RSA Live represents the need for an up-to-date feed of
security information to adjust security operation priorities based on the latest
security intel such as indicators of compromise (IOCs), threat attach vectors,
known bad hosts, or malicious threat actors.
SOC Manager
Job Description
The SOC Manager runs the SOC and owns the SOC budget which eventually rolls
up to CISO/CSO. The SOC Manager is responsible for the following (but not
limited to) tasks:
l Preventing successful cyber-attacks and leakage of sensitive information from
the organization as much as possible by deploying various types of security
controls.
l Effectively responding to security incidents to minimize impacts to the business.
l Providing visibility to CISO/CSO & Business Managers on ongoing incidents and
possible cyber threats that affect the organization through a combination of
periodic reports and real time dashboards.
l Tracking SOC KPI/KRIs and managing the SOC resources and budget in the
most effective way to meet objectives above.
Key Challenges
Most SOC teams rely on a collection of manual processes, home grown tools and
scripts and an IT Helpdesk system for managing security incidents and cyber threat
intelligence. The SOC Manager faces the following challenges:
l Needs business, asset, identity, and threat intelligence context for an effective
response to security incidents, but this information is difficult to organize.
Primary Tasks
l Managing SOC Readiness
l Responding to Incidents
l Responding to Data Breaches
Incident Coordinator
Job Description
The Incident Coordinator manages the Level 1 and Level 2 teams at an operational
site. In a large organization, there are typically one or more Incident Coordinators
(sometimes considered Shift Managers) to help drive 24x7 coverage for the SOC.
The Incident Coordinator is responsible for ensuring that incident response SLAs
(service-level agreements) are met and high priority incidents are contained and
remediated immediately. The Incident Coordinator achieves this by completing the
following tasks:
l Defining and managing the incident response process.
l Ensuring response procedures are in place.
l Monitoring incident queues to ensure the SOC meets its SLAs such as MTTR
(mean time to resolution) for security incidents.
l Coordinating shift hand-offs by creating a daily shift handover report which is
used by his counterparts running shifts at different sites.
Key Challenges
l The incident response process is many times managed manually through separate
documents or through some ticket system which is not security oriented.
l Required to manage and respond to security alerts from multiple tools:
o Collection of security alerts from these tools and aggregation (grouping) of
similar alerts into a single incident is not automated.
o Varying alert priorities from different sources are not normalized to incident
priorities based on business, asset, and identity context as well as cyber threat
intelligence data.
l While triaging security incidents, incident handlers may spend 40 to 60% of their
time gathering contextual and threat intelligence data for internal and external
systems and identities involved in the incident. This consumes a significant
amount of the handlers' time and needs to be minimized by connecting incident
management tools with enterprise asset and user repositories.
l Needs defined incident response procedures for various categories of security
incidents to enforce consistent triage and review processes for responding to
incidents.
l Spends a lot of time summarizing the work done on high priority incidents during
the shift so that the next incident coordinator can pick them up from where the
previous incident handlers leyft them.
l Needs a real-time dashboard to monitor incident metrics such as status and SLAs
that are currently in L1 and L2 incident queues as well as pending remediation
from IT Operations.
Primary Tasks
l Managing SOC Readiness
l Managing Shift Handovers
l Managing Incident Handler Workloads
l Ensuring Timely Response to Incidents
l Responding to Incidents
L1 Incident Handler
Job Description
The L1 Incident Handler is a member of the Level 1 Incident Handler team and
reports to the Incident Coordinator. The L1 Incident Handler is typically an
intermediate level security expert responsible for the following tasks:
l Reviewing incidents in their incident queue first thing in the morning and
working through them in the prioritized order.
l If done with current issues and the Incident Coordinator has not yet added
anything to their queue, checking on the overall L1 incident queue for the shift,
adding appropriate incidents to their queue and working through them.
l During an incident review and triage process, spending the majority of his or her
review time gathering context and intel.
Key Challenges
l Could benefit from economy of scale by grouping multiple similar alerts together
into an incident, instead of working on an individual security alert as an incident.
l Spends 40 to 60% of his or her time gathering context and threat intelligence for
systems, applications, and users involved in an incident.
l Could significantly benefit from incident response checklists for each category of
incident, so that all required procedures are executed for a given incident before
escalating or closing them.
l It is time consuming to manually create IT Helpdesk tickets and track the status
for all open security incidents.
l During the incident review process, the L1 Handler needs to take notes on
actions performed during incident response for reporting and historical audit
reasons. However, it is tedious to take notes in a paper notebook and then type
them into the incident management tool.
l Needs an L1 Incident Handler dashboard to track assigned queue, status of all
the incidents and their SLAs, as well as any open tasks.
Primary Tasks
l Responding to Incidents
l Remediating Issues
L2 Incident Handler
Job Description
The L2 Incident Handler is a member of the Level 2 Incident Handler team, reports
to the Incident Coordinator, and is typically a more senior security expert with
advanced skills in network and host forensics and malware reverse engineering. A
typical day at work includes the following tasks:
l Reviewing incidents in their incident queue first thing in the morning and
working through them in the prioritized order.
l If done with current issues and the Incident Coordinator has not yet added
anything to the queue, checking on the overall L2 incident queue for the shift,
adding incidents appropriate incidents to the queue, and working through them.
l During an investigation, using multiple network forensic tools such as RSA
Security Analytics and host forensic tools such as RSA ECAT to perform in-
depth analysis. After completing the analysis, records the observations of the
forensic investigation into the incident management tool and justifies whether the
system is compromised or not. If needed, can take steps to contain the
intrusion/infection immediately to minimize the impact of the attack.
l Creating tickets in an IT Helpdesk system for remediating a given incident and
tracking their completion before closing the incident.
Key Challenges
Many of the L2 incident handler’s issues are similar to those of the L1, although the
following issues are more important:
l Collect and visualize context (asset, data, user and file) and cyber threat
intelligence within the incident review tool so that he can significantly enhance
his productivity.
l During forensic analysis, needs to work with one or more security tools and has
to log into those tools and manually create filters to locate the alerts under
investigation.
l While performing forensic analysis, needs to take multiple notes and screenshots
that must be captured and organized for documentation of the investigation.
Primary Tasks
l Responding to Incidents
l Performing Forensic Analysis
l Recommending Issues for Remediation
l Remediating Issues
CSO/CISO
Job Description
(For purposes of this document, only the responsibilities related to Security
Operations are included.) The CSO/CISO is accountable for providing effective IT
security to the enterprise and responsible for the security tools and staff. The
CSO/CISO needs to receive consistent security incident summaries but is also part
of the escalation of any high impact security incident. If an incident results in a data
breach or loss, the CSO/CISO may take the lead role for driving the breach
management program.
Key Challenges
l Needs a consistent, real-time summary of security incidents and cyber threats to
the organization. Would prefer to have a dashboard that summarizes the metrics
instead of a weekly report from the SOC Manager and regular meetings to
discuss the details.
l Wants to be able to track SOC investments in security tools closely and measure
the efficacy of these controls, instead of asking the board or CFO for more
money.
Primary Tasks
l Managing SOC Readiness
l Monitoring Incident Metrics and Status
l Responding to Data Breaches
IT Helpdesk Analyst
Job Description
The IT Helpdesk Analyst is responsible for working through the queue of tickets
created by L1/L2 Incident Handlers for remediating security incidents. The analyst
assigns remediation tasks to system administrators in IT Operations.
Primary Tasks
l Remediating Issues
Job Description
The Cyber Threat Intel Analyst is the lead for the Cyber Threat Intelligence team.
Typically this role is a security expert with advanced skills in cyber threat
intelligence gathering and tracking new attack patterns from adversaries by using
feeds from partnering SOCs, industry (such as FS-ISAC, REN-ISAC, and ENISA)
and government (such as DOD DC3, DSIE, and DIB) government sources. A
typical day at work includes the following tasks:
l Reviewing unstructured and relevant cyber threat intelligence feeds from one or
more sources.
l Identifying feeds that are relevant to the organization, creating new IOCs
(indictors of compromise) and attack patterns and feeding them to SIEM/SEM
tools such as RSA Security Analytics (via Live) to:
o Check if a similar pattern has occurred within his organization, but went
unnoticed
o Automatically detect events that match the IOC going forward by updating the
correlation rules.
l Sharing new threat intel with the industry and partners, based on the
organization’s policies and NDAs.
Key Challenges
l Manually reviews the threat intelligence data from various portals (such as DoD
and DHS portals) blogs, emails, and information sharing groups. This is just too
much information to review in a timely fashion. There is concern that important
intelligence data is missing because there is time to review only 10-20% of the
data available via these sources.
l Knows that threat intelligence sharing is a two-way road to effectively combat
advanced threats. Sharing new threat intelligence data with internal and outside
parties is minimal and done manually via emails or over phone, which is very
time consuming.
l The current process for reviewing and managing threat intel data is ad hoc.
Primary Tasks
l Investigating New Threat Intel
Note: There is no out of the box access role built for the Cyber Threat Intel
Analyst, however it is a role that you should consider as you develop your full SOC
management process.
Job Description
The Business Unit (BU) Manager persona is a generic term for the individuals
outside of IT that are responsible for a line of business or department and may be
involved in identifying the business impact (if any) from security incidents and
recovering from them. A BU Manager may be involved in assisting with issue
remediation, depending on the nature of the incident.
Primary Tasks
Monitoring and ensuring remediation of issues:
l Reviewing a Finding
l Reviewing an Exception Request
l Reviewing a Remediation Plan
Job Description
Depending on the size or structure of an organization, the title of this persona may
differ, but the role is responsible for ensuring that the policies and control
procedures required to meet regulatory requirements and follow industry best
practices have been implemented in the organization. For RSA Archer Security
Operations Management, this role is mostly concerned with the root cause of
security incidents and how they map to control procedures and regulatory
frameworks. This persona will most likely be engaged if there is a security incident
that results in data compromise or disclosure of regulatory related or personal
information and may take the lead role for driving the breach management program.
Primary Tasks
l Responding to Data Breaches
The major personas are included from the initial identification of a possible security
event through the various escalations until closure. This workflow highlights the
importance of defining the hand-offs and communication methods between
personas. The RSA Archer Security Operations Management solution provides the
mechanism to manage these various workflows while engaging the different
personas.
The following points about the high-level workflow are important to consider:
l The escalation of events and alerts from the security event infrastructure may be
automated or manual. This will depend on the nature of the infrastructure. The
critical point is to define how an event is identified and how the SOC team is
notified of a possible security incident. The quicker this process happens, the
more likely the organization will be able to respond and contain security
incidents and prevent serious data disclosures, disruptions or negative impacts.
l The Level 1 and Level 2 analyst roles acknowledge that most organizations have
a mix of security resources with differing skills and experiences. In companies
with limited security resources, these roles may actually be assigned to one
singular team or resource. However, as a SOC matures, there will be the need to
expand resources into varying levels – leveraging the skills of experienced
security practitioners as Level 2 analysts while building the experience of Level
1 analysts.
l The supporting functions of the SOC team are varied. Security, IT, and Business
resources outside the SOC play an important role in understanding and properly
remediating a security incident. This communication is important to build a
support function that can input into the process when needed.
l The CISO and SOC manager have multiple responsibilities, but the following are
the main responsibilities:
o The security response program management need is growing in importance for
organizations. Incident Response can no longer be an ad-hoc process and
leveraging the skills and resources of the SOC is extremely critical. The SOC
Manager provides the frontline management while the CISO provides the
executive oversight for the entire program.
o Control Efficacy is also a growing need. Security organizations must invest in
high impact technologies and processes, and the security incident process can
give strong visibility into how well the controls are operating. The SOC
Manager can provide the CISO with frontline information on which controls
are working and which technologies are providing the most impact. The CISO
can then leverage this insight to guide security investments.
o Operational Procedures within the SOC are necessary to streamline response
and triage of incidents and leverage experience and skills across the security
team. These procedures should also be connected to the overall security
policy to ensure proper practices are implemented.
o The SOC Manager must ensure the Escalation Readiness is in place to move
an incident “up the chain” when warranted, especially in terms of data
breaches and disclosures. The CISO must also ensure that organization is
properly prepared for a data disclosure event with the right connections to the
business and compliance teams. Compliance and reputational risks can be
substantial when related to a data breach and the organization needs to have
proper processes in place to be prepared for a data breach.
o Reporting upwards from the SOC to the CISO to the business and executive
management will be very important. The SOC Manager should provide the
right level of empirical data (metrics) and anecdotal information (such as
lessons learned and threat trends) so the CISO can put this information in the
context of the overall health of the security of the company.
Solution Dashboards
The RSA Archer Security Operations Management solution has six dashboards that
provide detailed summary information for each of the solution's primary users:
l SOC Manager
l Incident Coordinator
l L1 Incident Handler
l L2 Incident Handler
l Compliance/Privacy Officer (Breach Response Lead)
l IT Helpdesk Analyst
Each dashboard serves as the primary point of entry to the solution for that user, and
the majority of all tasks that each user needs to perform begin from their dashboard.
When each user logs on, they see their particular dashboard in the center of the
screen, the solution applications on the left, and the Security Operations
Management and Enterprise Management workspace tabs at the top.
Note: All of the screenshots in this guide show a UI configured with the SecOps
theme. For instructions on creating this theme and using it in your own environment,
see Appendix B: Configure the SecOps Theme.
IT Helpdesk Dashboard
The IT Helpdesk dashboard provides a summary view of all tickets (findings) that
need to be remediated for either an incident or a breach. You can view all open
tickets, all tickets that match a particular remediation type or action, and the most
critical open tickets.
Only users assigned to the IT Helpdesk role can view the IT Helpdesk dashboard.
Solution Implementation
There are many items to consider when implementing the RSA Archer Security
Operations Management solution. The chapters of this Practitioner Guide outline
the details of the different phases, but the following sections highlight some
important initial considerations.
The SOC Manager should document the different security controls within the
infrastructure. Security controls could be both technology (such as tools, platforms,
and systems) as well as manual controls (such as a manual log review process).
The inventory of security controls enables the SOC manager to track the
effectiveness of the controls as they pertain to security incidents. The SOC
Manager should itemize security controls in the early phases – to set a baseline set
of controls – but also maintain this catalog over time as new technologies or
processes are implemented based on lessons learned from monitoring control
efficacy.
Policies and procedures for incident management will solidify the overall SOC team
strategy. Policies and procedures are important pieces of maintaining a methodical
approach to triaging and responding to security events. The solution allows the SOC
team to document specific procedures for different types of security incidents.
These procedures will enable the team to maintain a common set of steps based on
the profile of incidents and assist not only in the immediate response but also build a
common knowledgebase for information sharing between security team members.
This should be an active part of the overall SOC program management.
Call trees are necessary to itemize personnel relevant to different types of security
incidents. Building a call tree upfront (or as different types of incidents and events
are investigated and resolved) streamlines the communications necessary to handle
security events.
Responding to Incidents
The next phase of the implementation will focus on building the workflow and
mechanics of identifying a possible security event and escalating through the
different layers of the SOC team for investigation and resolution.
Some actions to consider for this phase:
l If the RSA Archer Security Operations Management solution is integrated with
RSA Security Analytics, this phase will include ensuring the integrations are
working properly. Planning should be instituted to run through various testing
cycles to ensure the data is properly flowing and the team understands how
security alerts are correlated into security incidents.
l The team should be trained extensively on the mechanics of the process
including how to create an incident, assign an incident and move an incident
through the workflow. This will require some training sessions that should be
part of the initial implementation. Ongoing training (for new team members)
should be considered as standard processes as the SOC team progresses.
Remediating Issues
Many times a security event will require non-security team involvement. For
example, a virus infection on an end-user device could spawn a security alert. The
remediation of that alert could be the re-imaging of the infected device by the IT
desktop management function. Just like data breach management, these users may
not be daily RSA Archer users and may require special training.
Some actions to consider for this phase:
l Personnel that are designated or planned to be part of the remediation cycle
should be briefed and trained on the process. This will require both an initial
rollout training program and an ongoing periodic training offering to ensure new
resources are trained.
Procedure
1. Create a contacts record for the user:
a. In the Security Operations Management solution, in the Navigation menu,
click Contacts > Add New.
b. Complete the required fields in the General Information section, and fill out
any other information as needed.
Note: If you are creating a Contacts record for someone other than yourself
and want that user to have the ability to edit or update the record, assign
them as a Record Owner.
Note: You may require your Solution Admin to create the Archer user
accounts, depending on what administrative access you have been granted.
b. Click Administration > Access Control > Manage Users > Add New.
c. Fill out the General Information and Contact Information sections.
d. Click the Groups tab, and click Lookup.
e. Expand the Groups list, and select the group to which the user belongs.
When you assign a user to a group, the user also inherits the access roles
associated with the group. Each SOC user group is associated with the
related SOC access role.
f. Save the user account.
Procedure
1. In the Contacts application, open the user record.
2. Click the Education tab.
3. In the Skills and Capabilities field, select the user's skills.
4. In the Degrees and Certifications section, click Add New.
5. Fill out and save the record. If you also want to document training courses that
support the degree or certification, click Add New in the Training Courses
section, and fill out the record.
6. Repeat steps a-b for each degree or certification the team member holds.
7. (Optional) Document other training courses.
a. In the Training Courses section. click add Add New
b. Fill out and save the record.
c. Repeat steps a through b for all the user's training courses.
Procedure
1. Create a team record:
a. From the Navigation menu, click Teams > Add New.
b. Enter a team name and description, and select the team manager.
c. Click Apply to save the Teams record.
2. Add team members to the team:
a. In the Members section, click Add New.
b. Select the name of the team member and their role.
c. Click Save.
d. Repeat steps a through c for each member of the team.
3. Save the team record.
SOC Policies
SOC policies define the processes, terms, and standards that your SOC team is
bound to follow. For example, your SOC might be required to respond to an incident
within a set amount of time depending on the incident's priority level. RSA Archer
Security Operations Management allows you to document all of your SOC policies
and to manage the process of reviewing and approving them with all required
stakeholders.
Establishing SOC policies around the following list of subjects up front will also
help you manage subsequent SOC processes for handling incidents and responding
to breaches in the RSA Archer Security Operations Management solution.
Incident Priority What does each priority level mean to your organization?
Classification How should they be assigned to incidents?
Incident Handling SLA How quickly must incidents be looked at, investigated,
Requirements resolved? How does this vary based on incident priority?
IT Operations How quickly must a ticket be resolved? How does this vary
Remediation SLA based on criticality?
Requirements
Breach Handling Who should be responsible for managing the entire breach
response process?
When you create and save a new SOC policy record, notifications are sent to each
assigned stakeholder to tell them that a new policy requires their review. Each
stakeholder must review the policy and either approve or reject the policy.
When all stakeholders have reviewed and approved the policy, the status becomes
Approved. If all stakeholders have not yet reviewed the policy or some have
rejected it, the status remains as Under Review.
Procedure
1. In the Security Operations Management solution, in the Navigation menu, click
Security Policies > Add New.
2. Enter a policy name, description, owner, and stakeholders.
3. Click Save.
4. Repeat steps 1-3 for each security policy that you want to document in RSA
Archer Security Operations Management.
Procedure
1. In the Security Operations Management solution, in the Navigation menu, click
SOC Procedure Library > Add New.
2. Enter a name and description for the procedure.
3. Select the type of procedure: Incident or Breach.
4. Select the priority level of the incident or breach to which this response
procedure should apply.
5. Select whether the procedure is required or optional.
6. Assign a default user group who should implement the procedure.
7. For an incident procedure, select the category of incident to which this
procedure should apply.
8. For a breach procedure, select any applicable regulations to which this
procedure should apply.
9. Save the record.
Call Trees
A call tree is a list of persons, roles, and/or organizations that you may need to
notify in a particular sequence in the event of a breach. You may have call trees for
internal contacts, such as a list of senior management who need to stay informed
about the response to a breach, or external contacts, such as a list of government
bodies that you are required to notify in the case of a breach.
Procedure
1. In the Security Operations Management solution, in the Navigation menu, click
Call Trees > Add New.
2. Complete the General Information Section.
3. In the Call Initiator section, select the user who is responsible for contacting
others in the event of a breach.
4. In the Call Recipients section, add or lookup the user or users who need to be
contacted.
5. In the Message section, enter the message that the Call Initator is required to
deliver.
6. Click Save.
Security Controls
Security controls are all of the tools or technologies that your SOC uses to detect,
prevent, and investigate security incidents. RSA Archer Security
Operations Management allows you to document all of your security controls,
including each control owner, deployment status, control category, and fixed and
annual operational costs.
Procedure
1. In the Security Operations Management solution, in the Navigation menu, click
Security Controls > Add New.
3. In the Site Location section, add a cross-reference to the facility to which the
control applies.
4. Click Save.
Procedure
l To view your overall security controls efficacy:
o In the Security Operations Management workspace, select the SOC Manager
dashboard.
o In the Navigation menu, click Security Controls > Reports > Security Controls
Efficacy.
The Security Tools Efficacy report shows a summary of the top 10 most
effective security controls.
l To view the efficacy of a particular security control, open the security control
record.
The Control Efficacy section shows the overall efficacy of the control and its
efficacy over the last 3 years. The Effective Controls section displays the
incidents that the control was effective in detecting, in preventing, or at
investigating an incident. The Ineffective Controls section displays the incidents
in which the control was not effective.
l To view the efficacy of security tools for a particular incident or investigation:
1. Open the incident or investigation record.
2. Click the Results tab.
3. In the Controls Efficacy section, view the detective, preventive, and
investigative controls that the incident handlers deemed effective and
ineffective.
Note: Only notifications that are a key part of the workflows are included in the
diagrams. For a complete list of notifications, see the Data Dictionary.
Alerts vs Incidents
Security Alert Security Incident
RSA Archer Security Operations Management can collect alerts from RSA
Security Analytics and can aggregate alerts into incidents or allows you to create an
incident manually.
One security incident can be made up of multiple security alerts, however a
security alert can only be tied to one security incident. All alerts must be tied to an
incident.
has occurred once. The incident also shows the time (10:45) that the incident
was first created.
2. After the 10:48 alert, Incident A increments its counter to say that the alert has
occurred two times and updates the time at which the incident was last updated.
A separate incident based upon the 10:48 alert is not created. The incident still
notes the time (10:45) at which the incident was first created.
3. After the 10:50 alert, Incident A again increments its counter to say that the
alert has occurred three times and updates the time at which the incident was
last updated. A separate incident based upon the 10:50 alert is not created. The
incident still notes the time (10:45) that the incident was first created.
For as long as Incident A remains in the New status, future alerts triggered based
upon the same rule, Source IP, and Destination IP continue to cause Incident A to
increment its counter. No new incidents are created. Once Incident A is assigned,
however, any future alerts triggered based on the same rule cause Incident B to be
created.
Aggregation Example 2
You configure the rule to aggregate based on Source IP only.
On your RSA Security Analytics system, the alert is triggered multiple times:
l 10:45 – Criticality Alert fires for SRC=10.10.10.1, DST=10.10.10.2
l 10:48 – Criticality Alert fires for SRC=10.10.10.1, DST=10.10.10.4
l 10:50 – Criticality Alert fires for SRC=10.10.10.3, DST=10.10.10.2
Incident Status
The status of the incident record reflects where in the overall workflow you
currently are.
Incident
What it Means
Status
Assigned Incident has been assigned to an L1 Incident Handler, but the Handler
has not yet started working on the incident.
Returned to The L2 Incident Handler has reviewed the incident found that the escal-
Level 1 ation is not valid. For example, the L1 Incident Handler may have
missed checks before they escalated the incident.
Remediation The L2 Incident Handler has completed their analysis and found items
Requested that require remediation.
Resolved All tasks have been resolved and the incident is not tied to any open
investigations or breaches.
Invalid After review, the information in the incident does not reflect a security
compromise or malicious activity.
Declared Incidents
Your organization may have hundreds of incidents to investigate, but not every
incident necessarily reflects an attack or breach. For example, an incident handler
may investigate and discover than an incident was a false positive. RSA Archer
Security Operations Management allows you to flag an incident as a Declared
Incident for those incidents which you want to provide management visibility into or
those that are confirmed issues that require remediation.
When a handler flags an incident as Declared, the SOC Manager and Incident
Coordinator groups are notified and the incident appears in the Declared Incidents
report on the SOC Manager and Incident Coordinator dashboards.
RSA recommends that you establish a SOC policy about what a declared incident
means to your organization and which incidents should be declared.
Confidential Incidents
Some incidents may be highly sensitive and require that you restrict who has access
to the record. For example, an investigation might be occurring about a SOC staff
member, in which case you do not want them to have access to the incident record.
When you flag an incident as Confidential, only members of the SOC Manager and
Incident Coordinators groups are granted access.
RSA recommends that you establish a SOC policy about what a confidential
incident means to your organization, which incidents should be marked confidential,
and who should maintain access to these records.
Creating an Incident
In RSA Archer Security Operations Management, there are three ways that
incidents can be created:
l Automatically, using the RCF to aggregate Security Analytics alerts into
incidents
l Manually, in the RSA Archer Security Incidents application.
l Manually, from Security Analytics (if your Solution Administrator configured the
custom context menu option).
Procedure
1. In the Security Operation Management solution, in the Navigation menu, click
Security Incidents > Add New.
2. In the Overview tab, enter a title, summary, and any other initial information
that you have.
3. Save the record.
If you assign an incident owner, the incident will appear in that user's queue. If
you do not assign an owner, the incident will appear in the L1 Incident Handler
queue for any member of the team to begin work on the incident.
Procedure
Right-click any meta data value and select External Lookup > Create Archer
Incident.
If an Archer session is already open in your browser, a blank Add New Record
page opens in the Security Incidents application and you can fill out the details. If
an Archer session is not currently open in your browser, you must log on, and then
the blank Add New Record page opens. Only the Date/Time Reported, Status, and
Priority fields are populated by default; you must enter all other values as
necessary.
Assigning Incidents
Once an incident is assigned, no additional alerts can be tied to the incident by the
RSA Connector Framework. You can manually associate new alerts to an assigned
incident.
Procedure
1. From the Security Operations Management workspace, and select the L1 or L2
Incident Handler dashboard.
2. From the L1 or L2 Incident Queue iView, click the ID of the incident that you
want to work on.
Procedure
1. From the Security Operations Management workspace, and select the Incident
Coordinator dashboard.
2. (Optional) Review the Analyst Workload iView. These reports show you the
total number of incidents assigned to each L1 and L2 Incident Handler.
3. From the Unassigned Incidents Queue iView, click the ID of the incident that
you want to assign.
4. Review the incident record, then in the Incident Owner field, select the incident
handler who you want to assign to the incident.
5. Save the incident record.
Review an Incident
User: L1 Incident Handler
Procedure
1. Review all the existing information:
l The Incident Summary section provides basic information, such as the title,
summary, basic details, and the source of the incident.
l The Incident Status section provides the current status, date created, incident
owner, and the priority of the incident.
The Priority field is initially populated with the highest priority level of all the
associated alerts, as follows:
1-2 P3
3-5 P2
6-8 P1
9-10 P0
l The Alerts tab shows all of the individual alerts that comprise the incident.
You can click the Security Analytics Link to launch the Investigation UI in-
context of the given alert for additional investigation.
You can drill down into each alert to view more details in the alert record.
l The Alert Summary tab displays alert metadata, such as the source of the
alert, its category and severity, as well as the raw alert message.
l The Alert Data tab display information parsed from the raw alert, such as
source and destination IP addresses, user data, and location information.
You can also use the pre-generated links to look up WHOIS and
Geolocation information.
Using Investigations
An investigation record allows you to tie together multiple related incidents for
faster handing and resolution. You can also create an investigation in order to look
into suspicious activity, threat intelligence, or other information reported outside of
RSA Archer Security Operations Management. For example, a Cyber Threat Intel
Analyst might create an investigation and assign it to a L1 or L2 Incident Handler in
order to have the handler find and document any traffic associated with specific
new threat intelligence.
Create an Investigation
User: L1 or L2 Incident Handler, Cyber Threat Intel Analyst
Procedure
1. Do either of the following:
l In the Security Operation Management solution, in the Navigation menu,
click Incident Investigations > Add New.
l From an existing incident or investigation record, click the Overview tab, and
in the Related Mappings section, click Add New.
2. In the Overview tab, enter a title, summary, and any other initial information
that you have.
3. In the Related Mappings section, click Lookup, and add any related incidents or
investigations.
4. Save the record.
Close an Investigation
User: L1 or L2 Incident Handler
Procedure
1. Open the investigation record, and in the Related Mappings section, verify that
that all related security incidents have been closed.
2. Change the investigation status to Closed.
3. Save the investigation record.
Note: You can also complete response tasks for an Incident Investigation record.
Procedure
1. In the Security Incident record, click the Incident Response Tasks tab. You can
see which tasks are required and which are optional, and you can see which
tasks that have not been completed (status = Not Implemented).
Note: You can also add shift notes to an Incident Investigation record.
Procedure
1. In the Security Incident record, click the Incident Journal tab.
2. Click Add New.
3. In the Journal Entry field, enter any information that you want to provide the
next incident handler.
4. In the IR Milestone field, select either a stage in the attack process or a stage in
the incident response process, depending on what notes you are adding.
Escalate an Incident
User: L1 Incident Handler
Procedure
1. Open the incident record.
2. Change the Incident Status to Escalated.
3. Save the incident record.
The incident is automatically moved to the L2 Incident Handlers queue, so that
an L2 incident handler can begin work on it.
Procedure
1. From the Security Operations Management workspace, and select the L2
Incident Handler dashboard.
2. From the Level 2 Incident Queue iView, open an incident to review.
3. Change the Escalation Status to Assigned, and select yourself as the Escalation
Owner.
4. Review the incident details and work done to date and determine whether the
escalation is valid.
Procedure
1. In the Security Incident record, change the Escalation Status to Forensic
Analysis In Progress.
2. Click the Forensic Analysis tab.
3. Document host forensic analysis:
a. In the Host Forensic Analysis section, click Add New.
b. Document information about the host that was targeted. Save the Target
Host record.
Once you have confirmed a security compromise, you must document the impact of
the incident. You can document the business, corporate policy, confidentiality,
integrity, and availability impact of the incident.
Note: You can also document impact analysis for an Incident Investigation record.
Procedure
1. In the Security Incident record, click the Impact Analysis tab.
2. Document the business impact of the incident. If you have licensed the RSA
Archer Risk Management solution, you can tie the incident to an existing risk
register record.
3. Document the confidentiality impact. If you find that data has been disclosed,
create a data breach record for the breach response team to track and resolve.
For more information, see Create a Breach Record.
4. Document the integrity impact.
5. Document the availability impact. If you have licensed the RSA Archer
Business Continuity Management solution, you can create a crisis event record
for your crisis event team to track and resolve.
6. Document the corporate policy impact.
7. Save the incident record.
Note: You can also log issues for remediation from an Incident Investigation
record.
Procedure
1. In the Security Incident record, click the Remediation tab.
2. In the Remediation Required field, select Yes.
3. In the Specify Remediation Action field, select the types of remediation action
required.
For each action type you select, a new section appears in the Remediation tab.
4. In each section, click Add New.
5. In the Findings record, enter the following:
a. Enter a name and description of the action that needs to be completed.
b. Select a criticality for the finding.
c. In the Source Override field, select Security Operations.
Note: You can also document the overall results for an Incident Investigation
record.
Procedure
1. In the Security Incident record, click the Results tab.
2. Capture the results of the incident. Confirm the incident and your confidence
rating, and the attack category and method of discovery.
3. Capture the actors, tactics, and techniques that contributed to the incident.
4. Capture details about the target of the incident.
5. Look up and add the security controls that were effective in discovering the
incident and those that were not effective.
6. Save the incident record.
Close an Incident
User: Incident Owner (L1 or L2 Incident Handler)
An incident cannot be closed if it has:
l An open investigation or breach tied to it
l Open tasks that are marked as Required, if the incident has a priority of P0 or
P1. You can close P2 or P3 incidents even if they have required tasks that remain
open.
l Open findings
Procedure
1. Open the incident record.
2. Change the Incident Status to Resolved.
3. Save the incident record.
Shift Handovers
If your SOC is manned 24x7 or has teams in multiple locations, the Incident
Coordinator of each shift should create a daily shift handover report for the Incident
Coordinator of the next shift. The shift handover report provides a summary of
incidents closed, incidents that still require follow-up, and any other information
that the next Incident Coordinator needs to take over incident handling coverage.
Procedure
1. In the Security Operation Management solution, in the Navigation menu, click
Shift Handover > Add New.
2. In the Shift Overview tab, fill out the shift location, coordinator, start and end
times, and a summary of the shift.
3. In the Items Closed tab, add cross-references to any incidents or investigations
that were closed during the shift.
4. In the Items for Follow Up tab, add cross-references to any incidents or
investigations that remain open and should be picked up by the next shift.
5. In the Analyst Blogs tab, add any summary information about the shift, such as
Procedure
1. From the Security Operations Management workspace, and select the Incident
Coordinator dashboard.
2. In the Daily Shift Handover iView, open the shift handover report that you want
to review.
Note: Only notifications that are a key part of the workflow are included in the
diagram. For a complete list of notifications, see the Data Dictionary.
Procedure
1. Create a new record from any of the following locations:
l In an incident or investigation record, click the Impact Analysis tab, and in
the Confidentiality Impact Assessment section, click Add New.
l In the Navigation Menu, click Data Breach Response > Data Breaches >
Add New.
2. In the breach record, document the following:
l In the Overview tab:
o A name and description of the breach
o The breach type
Procedure
1. In the data breach record, in the Data Disclosure tab, document the data
disclosed by region.
The location where the data was disclosed affects which regulations or privacy
laws may have been impacted and what response you will need to take to
remediate the breach.
2. In the Overview tab, assign users to the following roles:
l Business Manager
l Legal Analyst
l Customer Support
l Public Relations
l Compliance/Privacy Officer
l IT Manager
l Other Members
3. Save the record.
When a breach record is created and saved, notifications are automatically sent to
each member of the breach response team to inform them that they must review the
breach record and provide an impact assessment.
Procedure
1. Open the breach record, and click the Impact Analysis tab.
2. Depending on your role, enter your analysis about the impact rating, possible
fines, and your notes in the appropriate section.
Procedure
1. In the breach record, click the Breach Risk Assessment tab.
2. In the Breach Risk Assessment section, click Add New.
3. Complete and submit the assessment.
When you submit the completed assessment, the assigned Reviewer is notified
that the assessment is ready for review. You are then notified when the
Reviewer either approves or rejects the assessment.
Based on the assessment results, the values in the Assessment Results section
are then automatically populated.
Procedure
1. In the breach record, click the Breach Risk Assessment tab.
2. In the Assessment Results section, fill out the following:
l Impacted Regulations. Select any regulations that have been impacted by the
breach.
Based on the regulations you select, any response procedures in the
SOC Procedure Library that match that selected regulations will be copied
into the Breach Tasks application and will appear in the Breach Tasks tab in
the breach record.
l Declared Breach. Select Yes or No.
l Notification Decision. Select whether to send a notifications to affected
parties. If you decide to send notifications, you must execute and document
those notifications in the Notifications tab.
Procedure
1. In the breach record, click the Breach Tasks tab.
2. In the Breach Tasks section, click Add New.
3. Assign an owner.
The Task Owner will be notified that they have a new task to complete.
4. Save the breach task record.
5. Repeat steps 2-4 for all the tasks that need to be completed to close the breach.
Procedure
1. In the breach record, click the Breach Tasks tab.
2. Open any task that is assigned to you or which has your role assigned as the
Target Analyst.
3. Complete and save the task record.
Procedure
1. Open the breach record, and click the Notifications tab.
2. In the Notification Details section, click Add New.
3. Fill out the Notification Record.
4. If the notification is part of a documented call tree, you can associate the call
tree record. In the Notification/Call Tree section, click Lookup and select the
call tree. You can associate the notification with more than one call tree.
Procedure
1. In the Data Breaches record, click the Remediation tab.
2. In the Remediation Required field, select Yes.
3. In the Findings section, click Add New.
4. In the Findings record, do the following:
a. Enter a name and description of the action that needs to be completed.
b. Select a criticality for the finding.
c. In the Source Override field, select Security Operations.
Procedure
1. Open the data breach record, click the Breach Tasks tab, and verify that all
associated required tasks have been completed.
2. Click the Overview tab, and change the breach status to Closed.
3. Save the breach record.
Issue Remediation
The Issue Management subsolution allows the IT Helpdesk Analyst to manage the
remediation process for any tickets that are logged for remediation in the course of
investigating a security incident or responding to a data breach. Tickets are logged
as records in the Findings application, in which the analyst can document the
remediation performed and track the ticket to closure.
For tickets that require more extensive remediation, you can create a Remediation
Plan from the Finding. You can also tie multiple Findings to in a single Remediation
Plan in order to track the remediation in a single location.
For tickets that cannot be remediated, you can create an Exception Request from
the Finding to track and manage the risk of not performing the remediation.
Findings Process
The following figure shows the process of remediating a finding.
Resolve a Finding
User: IT Helpdesk Analyst
Procedure
1. In the IT Helpdesk dashboard, from the All Open Tickets iView, open a Finding
to begin work on.
2. In the Assigned to field, assign yourself to the Finding.
3. Complete the work required in the Finding.
4. Click the Response tab.
5. In the Response field, select either Accept Risk or Remediate Risk.
l If you select Accept Risk, create a new Exception Request.
l If you select Remediate Risk, complete the Remediation section. If the
necessary remediation is extensive, create a new Remediation Plan.
6. Once all associated Exception Requests and Remediation Plans are closed,
click the Workflow tab.
7. In the Reviewer field, assign a user to review the Finding.
You may want to assign the incident handler who created the ticket as the
reviewer, but this may depend on your organization's procedures and is not
required.
8. Change the Submission Status to Submitted.
The Review Status changes to Awaiting Review.
9. Save the record.
A notification is sent to the assigned Reviewer to inform them that the Finding
requires review.
Review a Finding
User: Finding Reviewer
Procedure
1. In the Finding record, review the work that was completed.
2. In the Review Status field, select either Rejected or Approved.
l If you select Rejected, a notification is sent to the Finding owner to continue
work on the Finding and resubmit it.
l If you select Approved, the Finding is automatically closed.
3. Save the record.
Procedure
1. In the Exception Request record, enter a description and business justification
for the exception.
2. Change the Submission Status to Submit for Review.
3. Save the record.
A notification sent to the Exceptions Review Group that there is a new
exception request to review.
Procedure
1. In the Exception Request record, click the Review and Approvals tab.
2. In the Reviewer field, assign a user to review the exception request.
3. Save the record.
Procedure
1. In the Exception Request record, review the request and determine whether the
documentation is acceptable.
l If the documentation is not acceptable:
a. Assign a risk rating.
b. Change the Review Status to Denied.
l If the documentation is acceptable:
a. Perform risk analysis and document any risks the exception poses.
b. Change the Review Status to Approved.
c. Assign an initial expiration date.
d. Assign a risk rating.
2. Save the record.
If you assigned a risk rating of Low or Medium, the exception request is tracked
until the expiration date.
If you assigned a risk rating of High, a notification is sent to the management
reviewer to determine whether the documentation and exception risks are
acceptable.
Procedure
1. In the Remediation Plan record, enter a name and description, and select a
remediation type.
2. Assign either yourself or another user as the Remediation Plan Owner.
3. Assign a user as the Remediation Plan Manager.
4. Create and assign remediation tasks as necessary.
5. Enter an estimated cost, start date, and completion date for the remediation
work.
6. Change the Submission Status to Submitted.
7. Save the record.
A notification is sent to the Remediation Plan Manager to review the
remediation plan.
Important: Even though you have submitted the remediation plan, you must
still complete the remediation work and update the record when it is complete.
Procedure
1. In the Remediation Plan record, review the plan, and in the Review Status field,
select either Approved or Rejected.
2. Save the record.
If you selected Approved, the remediation plan is automatically closed. A
reminder notification is sent to the Remediation Plan Owner if the plan is not
closed within 30 days of the expected completion date.
If you selected Rejected, the Remediation Plan Owner is notified.
Procedure
1. Click Administration > Appearance > Manage Themes.
2. Click Add New.
3. Ensure that Create a new theme from scratch is selected, and click OK.
4. On the Theme tab, select the following: