Csirt Services: Service Categories
Csirt Services: Service Categories
Csirt Services: Service Categories
One of the primary issues to be addressed in creating a computer security incident response team
(CSIRT) is deciding what services the CSIRT will provide to its constituency. This process also in-
volves naming and defining each provided service, which is not always an easy task. Experience has
shown that there is often great confusion about the names used for CSIRT services. The purpose of
this document is to present a list of CSIRT services and their definitions.1 This list provides a common
framework for a consistent and comparable description of CSIRTs and their corresponding services.
Although this white paper focuses on services provided by CSIRTs, many of these same services can
also be provided by system, network, and security administrators who perform ad-hoc incident han-
dling as part of their normal administrative work when there is no established CSIRT. We refer to this
type of ad-hoc team as a "security team." The following service definitions can be used by any of
these organizational teams or others in the computer security field.
A CSIRT must take great care in choosing the services it will offer. The set of services provided will
determine the resources, skill sets, and partnerships the team will need to function properly. The selec-
tion of services should first and foremost support and enable the business goals of the CSIRT's constit-
uency or parent organization. The services provided should be those that the team can realistically and
honestly provide based on the team size and range of expertise. It is better to offer a few services well
than a large range of services poorly. As a CSIRT gains the trust and respect of its constituency, it can
look to expand its services as staff and funding permit.2
Service Categories
There are many services that a CSIRT can choose to offer. Each CSIRT is different and provides ser-
vices based on the mission, purpose, and constituency of the team. Providing an incident handling ser-
vice is the only prerequisite to being considered a CSIRT.
• Reactive services. These services are triggered by an event or request, such as a report of a com-
promised host, widespread malicious code, software vulnerability, or something that was identi-
fied by an intrusion detection or logging system. Reactive services are the core component of
CSIRT work.
• Proactive services. These services provide assistance and information to help prepare, protect,
and secure constituent systems in anticipation of attacks, problems, or events. Performance of
these services will directly reduce the number of incidents in the future.
• Security quality management services. These services augment existing and well-established
services that are independent of incident handling and are traditionally performed by other areas
of an organization such as the IT, audit, or training departments. If the CSIRT performs or assists
The services are listed in the following table and described in detail below.
• Artifact Handling
o Artifact analysis
o Artifact response
o Artifact response coordination
It should be noted that some services have both a reactive and proactive side. For example, vulnerabil-
ity handling can be done in response to the discovery of a software vulnerability that is being actively
exploited. But it can also be done proactively by reviewing and testing code to determine where vul-
nerabilities exist, so the problems can be fixed before they are widely known or exploited.
Service Descriptions
This section describes the various services that are available: reactive services, proactive services, and
security quality management services.
This service involves disseminating information that describes an intruder attack, security
vulnerability, intrusion alert, computer virus, or hoax, and providing any short-term rec-
ommended course of action for dealing with the resulting problem. The alert, warning, or
advisory is sent as a reaction to the current problem to notify constituents of the activity
and to provide guidance for protecting their systems or recovering any systems that were
affected. Information may be created by the CSIRT or may be redistributed from vendors,
other CSIRTs or security experts, or other parts of the constituency.
Incident Handling
Incident handling involves receiving, triaging,3 and responding to requests and reports, and analyzing
incidents and events. Particular response activities can include
• taking action to protect systems and networks affected or threatened by intruder activity
• providing solutions and mitigation strategies from relevant advisories or alerts
• looking for intruder activity on other parts of the network
• filtering network traffic
• rebuilding systems
• patching or repairing systems
• developing other response or workaround strategies
Since incident handling activities are implemented in various ways by different types of CSIRTs, this
service is further categorized based on the type of activities performed and the type of assistance
given:
• Incident analysis. There are many levels of incident analysis and many sub-services. Essentially,
incident analysis is an examination of all available information and supporting evidence or arti-
facts related to an incident or event. The purpose of the analysis is to identify the scope of the in-
cident, the extent of damage caused by the incident, the nature of the incident, and available re-
sponse strategies or workarounds. The CSIRT may use the results of vulnerability and artifact
analysis (described below) to understand and provide the most complete and up-to-date analysis
of what has happened on a specific system. The CSIRT correlates activity across incidents to de-
termine any interrelations, trends, patterns, or intruder signatures. Two sub-services that may be
done as part of incident analysis, depending on the mission, goals, and processes of the CSIRT,
are
• Forensic evidence collection: the collection, preservation, documentation, and analysis of evi-
dence from a compromised computer system to determine changes to the system and to assist in
Incident response support. The CSIRT assists and guides the victim(s) of the attack in recovering
from an incident via phone, email, fax, or documentation. This can involve technical assistance in the
interpretation of data collected, providing contact information, or relaying guidance on mitigation and
recovery strategies. It does not involve direct, on-site incident response actions as described above.
The CSIRT instead provides guidance remotely so that site personnel can perform the recovery them-
selves.
Incident response coordination. The CSIRT coordinates the response effort among parties involved
in the incident. This usually includes the victim of the attack, other sites involved in the attack, and
any sites requiring assistance in the analysis of the attack. It may also include the parties that provide
IT support to the victim, such as Internet service providers, other CSIRTs, and system and network
administrators at the site. The coordination work may involve collecting contact information, notify-
ing sites of their potential involvement (as victim or source of an attack), collecting statistics about the
number of sites involved, and facilitating information exchange and analysis. Part of the coordination
work may involve notification and collaboration with an organization's legal counsel, human resources
or public relations departments. It would also include coordination with law enforcement. This service
does not involve direct, on-site incident response.
Vulnerability handling involves receiving information and reports about hardware and software vul-
nerabilities;5 analyzing the nature, mechanics, and effects of the vulnerabilities; and developing re-
sponse strategies for detecting and repairing the vulnerabilities. Since vulnerability handling activities
are implemented in various ways by different types of CSIRTs, this service is further categorized
based on the type of activities performed and the type of assistance given:
• Vulnerability analysis. The CSIRT performs technical analysis and examination of vulnerabili-
ties in hardware or software. This includes the verification of suspected vulnerabilities and the
technical examination of the hardware or software vulnerability to determine where it is located
and how it can be exploited. The analysis may include reviewing source code, using a debugger to
determine where the vulnerability occurs, or trying to reproduce the problem on a test system.
• Vulnerability response. This service involves determining the appropriate response to mitigate
or repair a vulnerability. This may involve developing or researching patches, fixes, and worka-
rounds. It also involves notifying others of the mitigation strategy, possibly by creating and dis-
tributing advisories or alerts.6 This service can include performing the response by installing
patches, fixes, or workarounds.
• Vulnerability response coordination. The CSIRT notifies the various parts of the enterprise or
constituency about the vulnerability and shares information about how to fix or mitigate the vul-
nerability. The CSIRT verifies that the vulnerability response strategy has been successfully im-
plemented. This service can involve communicating with vendors, other CSIRTs, technical ex-
perts, constituent members, and the individuals or groups who initially discovered or reported the
vulnerability. Activities include facilitating the analysis of a vulnerability or vulnerability report;
coordinating the release schedules of corresponding documents, patches, or workarounds; and
synthesizing technical analysis done by different parties. This service can also include maintain-
ing a public or private archive or knowledgebase of vulnerability information and corresponding
response strategies.
Artifact Handling
An artifact is any file or object found on a system that might be involved in probing or attacking sys-
tems and networks or that is being used to defeat security measures. Artifacts can include but are not
limited to computer viruses, Trojan horse programs, worms, exploit scripts, and toolkits.
Artifact handling involves receiving information about and copies of artifacts that are used in intruder
attacks, reconnaissance, and other unauthorized or disruptive activities. Once received, the artifact is
reviewed. This includes analyzing the nature, mechanics, version, and use of the artifacts; and devel-
oping (or suggesting) response strategies for detecting, removing, and defending against these arti-
facts. Since artifact handling activities are implemented in various ways by different types of CSIRTs,
this service is further categorized based on the type of activities performed and the type of assistance
given as follows:
• Artifact analysis. The CSIRT performs a technical examination and analysis of any artifact found
on a system. The analysis done might include identifying the file type and structure of the artifact,
Proactive Services
Proactive services are designed to improve the infrastructure and security processes of the constitu-
ency before any incident or event occurs or is detected. The main goals are to avoid incidents and to
reduce their impact and scope when they do occur.
Announcements
Announcements include, but are not limited to, intrusion alerts, vulnerability warnings, and security
advisories. Such announcements inform constituents about new developments with medium- to long-
term impact, such as newly found vulnerabilities or intruder tools. Announcements enable constituents
to protect their systems and networks against newly found problems before they can be exploited.
Technology Watch
The CSIRT monitors and observes new technical developments, intruder activities, and related trends
to help identify future threats. Topics reviewed can be expanded to include legal and legislative rul-
ings, social or political threats, and emerging technologies. This service involves reading security
mailing lists, security websites, and current news and journal articles in the fields of science, technol-
ogy, politics, and government to extract information relevant to the security of the constituent systems
and networks. This can include communicating with other parties that are authorities in these fields to
ensure that the best and most accurate information or interpretation is obtained. The outcome of this
service might be some type of announcement, guidelines, or recommendations focused at more me-
dium- to long-term security issues.
Obtaining upper management approval is required before conducting such audits or assessments.
Some of these approaches may be prohibited by organizational policy. Providing this service can in-
clude developing a common set of practices against which the tests or assessments are conducted,
along with developing a required skill set or certification requirements for staff that perform the test-
ing, assessments, audits, or reviews. This service could also be outsourced to a third part contractor or
managed security service provider with the appropriate expertise in conducting audits and assess-
ments.
This information can be developed and published by the CSIRT or by another part of the
organization (IT, human resources, or media relations), and can include information from
external resources such as other CSIRTs, vendors, and security experts.
The following descriptions explain how CSIRT expertise can benefit each of these security quality
management services.
Risk Analysis
CSIRTs may be able to add value to risk analysis and assessments. This can improve the organiza-
tion's ability to assess real threats, to provide realistic qualitative and quantitative assessments of the
risks to information assets, and to evaluate protection and response strategies. CSIRTs performing this
service would conduct or assist with information security risk analysis activities for new systems and
business processes or evaluate threats and attacks against constituent assets and systems.
Security Consulting
CSIRTs can be used to provide advice and guidance on the best security practices to implement for
constituents' business operations. A CSIRT providing this service is involved in preparing recommen-
dations or identifying requirements for purchasing, installing, or securing new systems, network de-
vices, software applications, or enterprise-wide business processes. This service includes providing
guidance and assistance in developing organizational or constituency security policies. It can also in-
volve providing testimony or advice to legislative or other government bodies.
Awareness Building
CSIRTs may be able to identify where constituents require more information and guidance to better
conform to accepted security practices and organizational security policies. Increasing the general se-
curity awareness of the constituent population not only improves their understanding of security issues
but also helps them perform their day-to-day operations in a more secure manner. This can reduce the
occurrence of successful attacks and increase the probability that constituents will detect and report
attacks, thereby decreasing recovery times and eliminating or minimizing losses.
CSIRTs performing this service seek opportunities to increase security awareness through developing
articles, posters, newsletters, websites, or other informational resources that explain security best prac-
tices and provide advice on precautions to take. Activities may also include scheduling meetings and
seminars to keep constituents up to date with ongoing security procedures and potential threats to or-
ganizational systems.
Summary
This document outlines and defines various incident handling services and several other services that
can be provided by a CSIRT. Some teams may offer many services from this list; others may only be
able to provide a few; still other teams may share the responsibility for providing these services with
other parts of their parent or host organization, or they may outsource some services to an incident re-
sponse or managed security services provider. As mentioned at the beginning of this document, to be
considered a CSIRT, a team must provide one or more of the incident handling services: incident anal-
ysis, incident response on site, incident response support, or incident response coordination.
Experience has shown that whatever services a CSIRT staff chooses to offer, the parent organization
or management must ensure that the team has the necessary resources (people, technical expertise,
equipment, and infrastructure) to provide a valued service to their constituents, or the CSIRT will not
be successful and their constituents will not report incidents to them.8
In addition, as changes occur in technology and internet use, other services may emerge that need to
be provided by CSIRTs. This list of services will therefore need to evolve and change over time.
Notes
1. The list was originally based on the example CSIRT services on page 20 of the Handbook for
Computer Security Incident Response Teams (CSIRTs) [1]. An extended and updated list was de-
veloped by Klaus-Peter Kossakowski in the book Information Technology Incident Response Ca-
pabilities [2]. When Kossakowski became involved with the Trusted Introducer for CSIRTs in
Europe [3], the new list was utilized to help teams describe themselves based on established ser-
vice names. In an effort to consolidate CSIRT service terminology, the Trusted Introducer service
worked with the CSIRT Development Team of the CERT Coordination Center, Pittsburgh, PA, to
produce this updated and more comprehensive list of CSIRT services.
3. Triaging refers to the sorting, categorizing, and prioritizing of incoming incident reports or other
CSIRT requests. It can be compared to triage in a hospital, where patients who need to be seen
immediately are separated from those who can wait for assistance.
4. Note that "incident response" is used here to describe one type of CSIRT service. When used in
team names such as "Incident Response Team," the term typically has the broader meaning of in-
cident handling.
5. A vulnerability is the existence of a flaw or weakness in hardware or software that can be ex-
ploited resulting in a violation of an implicit or explicit security policy.
6. Other CSIRTs might further redistribute these original advisories or alerts as part of their services.
7. Industry standards and methodologies might include Operationally Critical Threat, Asset, and
Vulnerability Evaluation (OCTAVE), CCTA Risk Analysis and Management Method (CRAMM),
Information Security Forum's Fundamental Information Risk Management (FIRM), Commonly
Accepted Security Practices and Regulations (CASPR), Control Objectives for Information and
(Related) Technology (COBIT), Methode d' Evaluation de la Vulnerabilite Residuelle des Sys-
temes d'Informa (MELISA), ISO 13335, ISO 17799, or ISO 15408.
8. If the CSIRT does not provide the services but outsources the activities to another organization
such as a managed security services provider, it must still ensure that the same standards for staff-
ing, equipment, and infrastructure are adhered to, in order to protect the CSIRT and organizational
data and services.
References
[1] West-Brown, Moira J.; Stikvoort, Don; & Kossakowski, Klaus-Peter. Handbook for Computer
Security Incident Response Teams (CSIRTs) (CMU/SEI-98-HB-001). Pittsburgh, PA: Software
Engineering Institute, Carnegie Mellon University, 1998. Note that this document was super-
ceded by the 2nd edition (CMU/SEI-2003-HB-002), published in April 2003.
[3] Kossakowski; Klaus-Peter & Stikvoort, Don. A Trusted CSIRT Introducer in Europe. Amers-
foort, Netherlands: M&I/Stelvio, February, 2000. (see "Appendix E, Basic Set of Information").
Acknowledgements
The CSIRT Development Team thanks all those in the CSIRT community who reviewed and provided
comments on this document. Your valuable insight and contributions helped to improve the quality
and usefulness of this document.
This material is based upon work funded and supported by the Department of Defense under Contract No.
FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a feder-
ally funded research and development center.
Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s)
and do not necessarily reflect the views of the United States Department of Defense.
[Distribution Statement A] This material has been approved for public release and unlimited distribution. Please
see Copyright notice for non-US Government use and distribution.
Internal use:* Permission to reproduce this material and to prepare derivative works from this material for internal
use is granted, provided the copyright and “No Warranty” statements are included with all reproductions and deriv-
ative works.
External use:* This material may be reproduced in its entirety, without modification, and freely distributed in written
or electronic form without requesting formal permission. Permission is required for any other external and/or com-
mercial use. Requests for permission should be directed to the Software Engineering Institute at permis-
sion@sei.cmu.edu.
DM-0004390