Brute force attack investigation
- Get link
- X
- Other Apps
Responsibility Index
Phase | Responsibility |
---|---|
Identification | L1 Analyst:- GSOC Monitoring Team |
Investigation | L2 Analyst:-This includes individuals from Network Team/GSOC |
Containment | L2 Analyst: - This includes individuals from Network Team/ Server team |
Remediation | L2 Analyst:-This includes Network Team/Server Team/GSOC |
Recovery | L2 Analyst:-This includes Network Team/Server Team/GSOC |
Brute Force attack Procedure
Identification Stage
Stage | Source |
---|---|
Identification | Brute Force incident is reported by
|
Investigating Stage
Stage | Actions by Respective Team
| |||||
---|---|---|---|---|---|---|
Investigation | ||||||
Security team checks | If the Brute Force attack is identified and an alert generated via SIEM below parameters are considered for investigating:
Validating the Source:
https://www.virustotal.com/ https://www.abuseipdb.com/
https://exchange.xforce.ibmcloud.com/
Firewall Action:
Investigating Destination:
User account Evaluation:
|
Stage | Actions to be taken by Respective Teams |
---|---|
Containment | Server Team
Network Team
|
Remediation
Stage | Actions by Respective Teams |
---|---|
Remediation | GSOC team
Server Team
Network Team
|
Stage | Actions By Respective team |
---|---|
Recovery | GSOC team
Server Team
Network team
|
- Get link
- X
- Other Apps
Comments