IT Securitity Topics

From Federal Burro of Information
Revision as of 16:29, 25 January 2012 by David (talk | contribs) (Created page with " == DDOS Reponse - Best Practice == * Develop a checklist or Standard Operating Procedure (SOP) to follow in the event of a DDoS attack. One critical point in a checklist or SOP...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigationJump to search

DDOS Reponse - Best Practice

  • Develop a checklist or Standard Operating Procedure (SOP) to follow in the event of a DDoS attack. One critical point in a checklist or SOP is to have contact information for your ISP and hosting providers. Identify who should be contacted during a DDoS, what processes should be followed, what information is needed, and what actions will be taken during the attack with each entity.
  • The ISP or hosting provider may provide DDoS mitigation services. Ensure your staff is aware of the provisions of your service level agreement (SLA).
  • Maintain contact information for firewall teams, IDS teams, network teams and ensure that it is current and readily available.
  • Identify critical services that must be maintained during an attack as well as their priority. Services should be prioritized beforehand to identify what resources can be turned off or blocked as needed to limit the effects of the attack. Also, ensure that critical systems have sufficient capacity to withstand a DDoS attack.
  • Have current network diagrams, IT infrastructure details, and asset inventories. This will assist in determining actions and priorities as the attack progresses.
  • Understand your current environment and have a baseline of daily network traffic volume, type, and performance. This will allow staff to better identify the type of attack, the point of attack, and the attack vector used. Also, identify any existing bottlenecks and remediation actions if required.
  • Harden the configuration settings of your network, operating systems, and applications by disabling services and applications not required for a system to perform its intended function.
  • Implement a bogon block list at the network boundary.
  • Employ service screening on edge routers wherever possible in order to decrease the load on stateful security devices such as firewalls.
  • Separate or compartmentalize critical services:
  • Separate public and private services
  • Separate intranet, extranet, and internet services
  • Create single purpose servers for each service such as HTTP, FTP, and DNS
  • Review the US-CERT Cyber Security Tip Understanding Denial-of-Service Attacks.