4.3.1. Investigation Checklist
Please print a copy of this and keep updates on it until such a time comes that you have verified that shared storage or email mediums are safe for communication. Alternatively keep an encrypted up to date copy of this. If multiple machines have been compromised it is essential that the attacker not know what you know.
Investigation Checklist
Complete | List Item |
---|
| Timeline Created. |
| Disk images / snapshots are stored in a safe location. |
| Notified those who are aware of the issue that it is to remain private and that all communications should now go through To be filled out or security team. |
| Initial damage assessment sent to management and legal department for review. |
| To be filled out notified that at least one announcement will go out once formulated. |
| To be filled out, To be filled out, and management have agreed on language of each communication. |
| Forensics script created that can scan machines remotely and/or locally for attacks similar or identical to that of the host(s) in question. |
| Comprehensive scan of all relevant hosts using the forensics script complete. |
| Once root attack vector has been fixed, final comprehensive scan of all relevent hosts using forensics script complete. |