forensicate.cloud

Open Source Resources for Forensics in the Cloud

EC2 DFIR Workshop

Module Overview: Why Forensicate?

Reasons to Perform a Forensic Analysis

*Attribution is difficult and may not be meaningful. Similarly determining attacker motivation generally assumes clear attribution.

NIST Incident Response Life Cycle

NIST Incident Response Life Cycle IMAGE 1: NIST Incident Response Life Cycle, NIST SP 800-61R2

Crucial Forensic Outputs DURING Incident Response

During an incident, it is critical to determine its SCOPE

Forensic analysis of select systems may be used to identify:

PICERL Incident Response Life Cycle

PICERL Incident Response Life Cycle IMAGE 2: PICERL Incident Response Life Cycle

Preparation

EXAMPLES

Identification

“Um, so, yeah…we had an EC2 instance that seemed to have malware, so we terminated it…just wanted to let you know”

Containment

Incident Handler’s Focus:

Forensicator’s Focus:

Eradication & Recovery

Lessons Learned

Recommendations