Recovery and restoration tools and techniques
Common recovery and restoration tools
Imaging software
Spare/replacement hardware
Device management suites
Change and configuration base lining tools and documentation
System monitoring suites
Most of these will already exist as part of normal IT operations
Imaging software
Infected or destroyed systems need to be re-imaged
May be under the umbrella of IT
Verify images are not compromised before using
Hardware
Some incidents may require replacement of hardware
Physical intrusion and compromise
Physical intrusion where equipment is destroyed
DDoS that causes CPUs to get so hot that motherboard is damaged
Device management suites
Some of the restoration activities may be part of these suites already
Makes it easier and more efficient when restarting large numbers of devices
Work with IT on access and/or licensing
Change and configuration base lining tools
Official baselines will help you establish "normal" operations
There may be lag time between system updates and image refreshes
In larger organizations, changes to systems may still be happening during the incident
Smaller organizations without change management should rely on baseline documentation
System monitoring tools
Need to be able to monitor systems for any recurring abnormal behavior
Can also help with establishing new baselines
I.e., updates to new hardware or software due to breach may cause slight change in system behavior
Abnormal or new behavior may not be malicious
Last updated