Templates for playbooks and best practices
As mentioned, there are a few different ways to create playbooks in a list, flowchart, and automated fashion. The first rough template I’ll show is for ransomware. The first format is for ransomware that was found using an endpoint detection and response (EDR) tool in a list format:
- An alert is triggered via an EDR tool (Carbon Black, Crowdstrike, Sentinel One, and so on).
- Does the tool that triggered the alert have the ability to quarantine? If so, quarantine the system. If not, access a tool that does and quarantine the system. Coordinate with the IT team to possibly block the system via your master data management (MDM) tool,
Jamf
. - Open an incident response ticket with the preliminary information on the incident response (IR) board and establish a timeline.
- Work with the IT team to determine whether any other Toast systems have been affected.
- Set up a C2 comms channel in Slack or Teams, inviting your security...