Process:

  1. Source IP Address Investigation:

    • Identify the source IP address triggering the alert.
    • Investigate historical data associated with the source IP to determine if it has been involved in previous incidents.
    • Evaluate the source IP’s reputation and any known malicious activity.
  2. Destination IP Address Analysis:

    • Determine the role and function of the destination IP address within the organization.
    • Assess whether the destination IP is a critical asset, server, or endpoint.
    • Analyze any historical patterns of communication involving the destination IP.
  3. Activity Patterns:

    • Examine the patterns of activity leading to the alert.
    • Look for anomalies or deviations from typical behavior.
    • Consider whether the alert is part of a larger pattern of incidents.
  4. Historical Context:

    • Review historical data related to similar incidents or alerts.
    • Identify any recurring themes or trends that could provide insights into the current incident.
    • Consider past incident resolutions and their effectiveness.
  5. Asset Sensitivity:

    • Evaluate the sensitivity of assets involved in the incident.
    • Identify if the incident involves access to sensitive data or critical systems.
    • Determine the potential impact on the organization based on the sensitivity of the assets.
  6. Communication Context:

    • Understand the nature of communication between the source and destination IPs.
    • Analyze the protocols, ports, and services involved in the communication.
    • Consider the legitimacy of the communication based on organizational policies.
  7. External Correlation:

    • Correlate internal alerts with external threat intelligence.
    • Check for any indicators of compromise (IOCs) associated with the incident.
    • Determine if the incident aligns with known threat actor TTPs (Tactics, Techniques, and Procedures).

Outcome: The context gathering process should provide the analyst with a more nuanced understanding of the incident, enabling informed decision-making regarding the severity, impact, and appropriate response actions. The information collected during this phase contributes to a more accurate incident categorization and risk assessment.

Previous & Next