Expected from the Operational cell

Identify the source of compromise

The Operational cell will have the task of finding the entry point of the attacker. It is not a question here of finding whether it is Josiane from accounting or Robert from the communication department, but of knowing how the attacker entered the network in order to plug this flaw to prevent the new infrastructure from being subject to the same vulnerability.

Date of initial compromise

Now that we know how the attacker operates within the infrastructure, we potentially have a date when the threat appeared. This information is very important because it makes it possible to determine which backups are compromised and which are, a priori, reliable.

Indicators of Compromise

If we know the attack vector as well as the date of initial compromise, it becomes possible to generate indicators of compromise in order to verify that the restored backups are healthy.

Rebuild the new infra

In parallel with the investigation, it is crucial to rebuild an infrastructure in isolation for the members of the various services.

Hardenning

Very often, after an attack, the target realizes that his hardening was insufficient. The operational team will then have to implement the new hardening.

Last updated