TY - GEN
T1 - Model-Based Incident Response Playbooks
AU - Shaked, Avi
AU - Cherdantseva, Yulia
AU - Burnap, Pete
N1 - Publisher Copyright:
© 2022 ACM.
PY - 2022/8/23
Y1 - 2022/8/23
N2 - Inevitably, all systems are vulnerable, and none are impervious to attack. Incident response is an important element in maintaining the cyber security posture of organizations. Incident response practitioners often rely on process descriptions in the form of playbooks as recipes for handling incidents as they occur. However, current practices and mechanisms do not offer a disciplined approach to designing and representing playbooks, risking the effectiveness of the playbooks in directing and coordinating incident response. In this paper, we propose a formal, model-based design approach to designing cyber security incident response playbooks. We provide a tool prototype for the approach, developed using the Eclipse framework, and demonstrate how it can accommodate playbooks. Finally, we discuss how the approach can improve aspects of incident response throughout its lifecycle, by correctly prescribing and coordinating response actions as well as supporting organizational learning.
AB - Inevitably, all systems are vulnerable, and none are impervious to attack. Incident response is an important element in maintaining the cyber security posture of organizations. Incident response practitioners often rely on process descriptions in the form of playbooks as recipes for handling incidents as they occur. However, current practices and mechanisms do not offer a disciplined approach to designing and representing playbooks, risking the effectiveness of the playbooks in directing and coordinating incident response. In this paper, we propose a formal, model-based design approach to designing cyber security incident response playbooks. We provide a tool prototype for the approach, developed using the Eclipse framework, and demonstrate how it can accommodate playbooks. Finally, we discuss how the approach can improve aspects of incident response throughout its lifecycle, by correctly prescribing and coordinating response actions as well as supporting organizational learning.
KW - Cyber Security
KW - Incident Response
KW - Metamodeling
KW - Model-based Design
KW - Playbooks
KW - Process Models
UR - http://www.scopus.com/inward/record.url?scp=85137002034&partnerID=8YFLogxK
U2 - 10.1145/3538969.3538976
DO - 10.1145/3538969.3538976
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:85137002034
T3 - ACM International Conference Proceeding Series
BT - Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022
PB - Association for Computing Machinery
T2 - 17th International Conference on Availability, Reliability and Security, ARES 2022
Y2 - 23 August 2022 through 26 August 2022
ER -