First published: 02 Sep 2020
Last updated: 02 Sep 2020

Content written for

Large organisations & infrastructure
Government

Overview

This joint advisory is the result of a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States. It highlights technical approaches to uncovering malicious activity and includes mitigation steps according to best practices.

Key takeaways

When addressing potential incidents and applying best practice incident response procedures:

First, collect and remove for further analysis:

  • relevant artefacts
  • logs, and
  • data.

Next, implement mitigation steps that avoid tipping off the adversary that their presence in the network has been discovered.

Finally, consider soliciting incident response support from a third-party IT security organisation to:

  • provide subject matter expertise and technical support to the incident response
  • ensure that the actor is eradicated from the network, and
  • avoid residual issues that could result in follow-up compromises once the incident is closed.

Download

 

.

Was this helpful?
Yes this was helpful
No this was not helpful

Thanks for your feedback!

We welcome additional feedback below.

Rate this product’s level of technical advice:
Rate this product’s usefulness:
Rate the product’s quality of analysis:
Rate the product’s timeliness: