Computer Security Incident Handling Guide Logo

Computer Security Incident Handling Guide

0
Free
Visit Website

The NIST Special Publication 800-61 Revision 2 is a comprehensive guide for computer security incident handling, providing organizations with guidelines for establishing incident response capabilities and handling incidents efficiently and effectively. It outlines the importance of incident response planning, incident classification, incident containment, eradication, recovery, and post-incident activities. The guide also covers incident handling procedures, including incident detection, reporting, and response strategies. The publication provides a structured approach to incident response, emphasizing the need for a comprehensive incident response plan, incident response team, and continuous improvement of incident response capabilities.

FEATURES

ALTERNATIVES

A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.

A comprehensive Windows command-line reference guide for security professionals, system administrators, and incident responders.

A comprehensive guide to securing Industrial Control Systems (ICS) from cyber threats, published by NIST.

A new approach to computer network defense that leverages knowledge about advanced persistent threats, using a kill chain model to describe phases of intrusions and map adversary kill chain indicators to defender courses of action.

A comprehensive analysis of AWS IAM Access Analyzer, evaluating its capabilities, limitations, and effectiveness in identifying publicly exposed AWS resources.

A structured approach to managing and responding to suspected security events or incidents.

APFS is a proprietary file system developed by Apple for macOS, offering improved performance, security, and reliability.

SecTemplates offers free, comprehensive security program templates and resources for infosec professionals and startups lacking dedicated security teams.