All suspicious events detected throughout the organization must be reviewed to determine the impact and the potential risk to business operations. In every instance, depending on the level of risk identified, a decision needs to be made for how different incidents will be handled throughout the organization.
Table 11.1
Functional Impact Prioritization
Category | Criteria |
None | No effect to business operations, functions, or services |
Low | Minimal effect to business operations, functions, or services; no critical services have been impacted |
Medium | Moderate effect to business operations, functions, or services; a subset of critical services have been impacted |
High | Significant effect to business operations, functions, or services; all critical services have been impacted |
Table 11.2
Informational Impact Prioritization
Category | Criteria |
None | No information was exfiltrated, lost, or otherwise compromised |
Privacy breach | Sensitive information was exfiltrated, lost, or otherwise compromised (ie, personally identifiable information) |
Proprietary breach | Internal information was exfiltrated, lost, or otherwise compromised (ie, architectural diagrams) |
Integrity breach | Sensitive or proprietary information was exfiltrated, lost, or otherwise compromised (ie, financial records) |
Table 11.3
Recoverability Impact Prioritization
Category | Criteria |
Regular | Restoration time is predictable and can be achieved using existing resources |
Supplemented | Restoration time is predictable but requires additional resources |
Extended | Restoration time is unpredictable and requires assistance from existing, additional, and external resources |
Not recoverable | Restoration time is unpredictable and not realistically possible |
Table 11.4
Life Span | Storage Type | Data Type |
As short as a single clock cycle | CPU storage | Registers |
Caches | ||
Video | RAM | |
Until host is shut down | System storage | RAM |
Kernel tables | Network connections | |
Login sessions | ||
Running processes | ||
Open files | ||
Network configurations | ||
System date/time | ||
Until overwritten or erased | Nonvolatile data | Paging/swap files |
Temporary/cache files | ||
Configuration/log files | ||
Hibernation files | ||
Dump files | ||
Registry | ||
Account information | ||
Data files | ||
Slack space | ||
Removable media | Floppy disks | |
Tapes | ||
Optical disc (read/write only) | ||
Until physically destroyed | Optical disc (write only) | |
Outputs | Paper printouts |