logo

NJP

GRC Series Article 1: GRC, Security Ops and Security Incident Response

Import · Sep 08, 2020 · article

The ServiceNow Governance, Risk, and Compliance (GRC) applications help transform inefficient processes across your extended enterprise into an integrated risk program. Through continuous monitoring and automation, ServiceNow delivers a real-time view of compliance and risk, improves decision making, and increases performance across your organization and with vendors. Only ServiceNow can connect the business, security, and IT with an integrated risk framework that transforms manual, siloed, and inefficient processes into a unified program built on a single platform.
* Risk Management–Detect, and assess the likelihood as well as business impact of an event based on data aggregated across your extended enterprise, and respond to critical changes in risk posture.
* Policy and Compliance Management–Automate best practice lifecycles, unify compliance processes, and provide assurances around their effectiveness.
* Audit Management–Scope and prioritize audit engagements using risk data and profile information to eliminate recurring audit findings, enhance audit assurance, and optimize resources around internal audits.
* Vendor Risk Management–Institute a standardized and transparent process to manage the lifecycle for risks assessments, due diligence, and risk response with business partners and vendors.

The GRC solution can be configured for many scopes, at any level. Yet, keep in mind that SecOps is IT focussed, while GRC is at its best when focussing at the highest Corporate level.

https://community.servicenow.com/community?id=community_question&sys_id=84e0700fdb30bfc8fece0b55ca96...

This link gives a very good description of relation between GRC and Security Ops.

Although there can be many relations and applications between GRC and Security ops, the following is one take:

image

The Security Operations ecosystem can be configured in any number of ways, depending on the needs of your company and the Security Operations products you license.

  1. The first step is to use the ServiceNow Discovery application to find applications and devices on your network, and then update the ServiceNow Configuration Management Database (CMDB).
  2. Integrate your existing Security Information and Event Manager (SIEM) tools with Security Operations applications to import threat data (via APIs or email alerts), and automatically create prioritized security incidents.
  3. Use workflows and the Vulnerability Response application to instantly prioritize events, security incidents and vulnerabiliies.
  4. Enrich data using the Threat Intelligence application, as well as other machine learning or artificial intelligence operations capabilities.
  5. Use Risk Management and other Governance, Risk, and Compliance applications to identify, assess, respond to, and continuously monitor Enterprise and IT risks that may negatively impact business operations.
  6. Workflows built into all Security Operations applications take the guesswork and the busywork out of remediation.
  7. Instantly see detailed information about your security posture using dashboards.

At the heart of the Security Operations ecosystem is the Security Incident Response (SIR) application. Security Incident Response simplifies the process of identifying critical incidents by applying powerful workflow and automation tools that speed up remediation. Integrate your existing Security Information and Event Manager (SIEM) tools with Security Operations applications to import threat data (via APIs or email alerts), and automatically create prioritized security incidents.

There are many avenues within the Security Operations ecosystem for automatically and manually creating security incidents, as illustrated.

The integration with Secureworks is managed from the ServiceNow platform. Every few minutes (configurable) a REST API call is sent to SecureWorks to obtain new and updated alerts. Security incidents are created or updated at which time SIR automation kicks in. This includes assigning to a triage team, pulling in threat intelligence, scoring risk based on multiple factors including the business criticality level of the at-risk asset, and execution of the workflow.

Security Incident Response. Track security incidents as they progress from detection and analysis through containment, eradication, recovery, and closure.

Security incidents can be logged or created in the following ways.

  • From the Security Incident form image
  • From events that are spawned internally, or created by external monitoring or vulnerability tracking systems via alert rules, or manually image
  • From external monitoring or tracking systems

image

image

image

- Draft - The request initiator adds information about the security incident, but it is not yet ready to be worked on.

- Analysis -This is where the analysis of the opened incident happens.The incident has been assigned and the issue is being analyzed.

Depending on the selected view, you are using (default, Non-IT Security, Security ITIL, and so on), the Security Incident form can show any combination of vulnerabilities, incidents, changes, problems, tasks on the affected CI and affected CI groups. The system can identify malware, viruses, and other areas of vulnerability by cross-referencing the National Institute of Standards and Technology (NIST) database, or other third-party detection software. As security incidents are resolved, you can use any incident to create a security knowledge base article for future reference.

Perform further analysis using a business service map to locate other affected systems or business services that can be infected.

- Containment, Eradication and Recovery

As you monitor and analyze vulnerabilities, you can create and assign tasks to other departments. You can use a business service map to create tasks, problems, or changes for all affected systems, documents, activities, SMS messages, bridge calls, and so forth.

- Contain -The issue has been identified and the security staff is working to contain it and perform damage control. These actions can include taking servers offline, disconnecting equipment from the Internet, and verifying that backups exist.

- Eradicate -The issue has been contained and the security staff is taking steps to fix the issue.

- Recover - The issue is resolved and the operational readiness of the affected systems is being verified*.*

- Review - The security incident is complete and all systems are back to normal function, however, a post incident review is still needed.

- Closed - The incident is complete but before a security incident can be closed, you must fill out the information on the Closure Information tab.

- Review

After the incident is resolved, other steps can take place before closure. You can perform a post incident review. Creating knowledge base articles can help with future similar incidents. Significant incidents may require a post-incident resolution review. This review can take several forms. For example:
* Conduct a meeting to discuss the incident and gather responses.
* Write and distribute to those teams who worked on an incident a list of resolution review questions designed for each category or priority of incident.
* Incident managers can write the report and gather information on their own.

Add response task adds task

image

image

The following process definitions are used for security incident tasks.

Ready - The task is ready to be worked on once it is assigned to an agent

Assigned - The task is assigned to an agent

Work In Progress - The assigned agent is working on the task

Complete - The task is complete

Canceled - The task was canceled

Please comment / like or bookmark if this article helps you.

Labels:

image

View original source

https://www.servicenow.com/community/grc-articles/grc-series-article-1-grc-security-ops-and-security-incident/ta-p/2306958