security-incident-reporting
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseSecurity Incident Reporting
安全事件报告撰写
Comprehensive framework for documenting and analyzing security incidents, drawing from NIST SP 800-61 and SANS methodologies.
基于NIST SP 800-61和SANS方法论的安全事件记录与分析综合框架。
When to Use
适用场景
- After a security incident (DDoS, breach, vulnerability exploitation)
- Creating post-mortem documentation
- Communicating with stakeholders (C-level, legal, security teams)
- Correlating attack patterns with known CVEs
- Establishing incident response metrics (MTTR, dwell time)
- 发生安全事件后(如DDoS攻击、数据泄露、漏洞利用)
- 撰写事后复盘文档
- 与利益相关方沟通(高管、法务、安全团队)
- 将攻击模式与已知CVE关联
- 建立事件响应指标(MTTR、潜伏时间)
Related Skills
相关技能
- security-audit - Pre-incident vulnerability assessment
- typo3-security - TYPO3 hardening
- SKILL-TYPO3.md - TYPO3-specific incident reporting
- security-audit - 事前漏洞评估
- typo3-security - TYPO3系统加固
- SKILL-TYPO3.md - 针对TYPO3的事件报告撰写
1. Incident Response Framework
1. 事件响应框架
NIST SP 800-61 / SANS Harmonization
NIST SP 800-61与SANS框架对齐
| Phase | NIST | SANS | Documentation Focus |
|---|---|---|---|
| 1 | Preparation | Preparation | Runbooks, contacts, tools |
| 2 | Detection & Analysis | Identification | Initial detection, triage |
| 3 | Containment | Containment | Isolation actions, timeline |
| 4 | Eradication | Eradication | Root cause removal |
| 5 | Recovery | Recovery | Service restoration |
| 6 | Post-Incident | Lessons Learned | Post-mortem, improvements |
| 阶段 | NIST | SANS | 文档重点 |
|---|---|---|---|
| 1 | Preparation | Preparation | 运行手册、联系人、工具 |
| 2 | Detection & Analysis | Identification | 初始检测、分类筛选 |
| 3 | Containment | Containment | 隔离操作、时间线 |
| 4 | Eradication | Eradication | 根因消除 |
| 5 | Recovery | Recovery | 服务恢复 |
| 6 | Post-Incident | Lessons Learned | 事后复盘、改进措施 |
Documentation Principle
文档记录原则
Logbuch-Prinzip: Document in real-time during the incident, then consolidate into the post-mortem report. Never create reports retrospectively from memory.
实时记录原则:事件发生期间实时记录,之后整理成事后复盘报告。切勿仅凭记忆回溯撰写报告。
2. Severity Rating Systems
2. 严重程度评级系统
NCISS (National Cyber Incident Scoring System)
NCISS(国家网络事件评分系统)
| Level | Score | Description |
|---|---|---|
| Emergency (1) | 100 | Nation-state attack, critical infrastructure |
| Severe (2) | 80-99 | Significant impact, data exfiltration |
| High (3) | 60-79 | Service disruption, potential data loss |
| Medium (4) | 40-59 | Limited impact, contained breach |
| Low (5) | 20-39 | Minor incident, no data loss |
| Baseline (6) | 0-19 | Informational, false positive |
| 级别 | 分数 | 描述 |
|---|---|---|
| 紧急(1) | 100 | 国家级攻击、关键基础设施受影响 |
| 严重(2) | 80-99 | 重大影响、数据泄露 |
| 高(3) | 60-79 | 服务中断、潜在数据丢失 |
| 中(4) | 40-59 | 有限影响、已遏制的泄露 |
| 低(5) | 20-39 | 轻微事件、无数据丢失 |
| 基线(6) | 0-19 | 信息性事件、误报 |
DDoS Resiliency Score (DRS)
DDoS弹性评分(DRS)
| Level | Description | Typical Bandwidth |
|---|---|---|
| 1-2 | Simple Floods | < 1 Gbps |
| 3-4 | Sophisticated Multi-Vector | 1-5 Gbps |
| 5-6 | Advanced (State-Actor Level) | 5-100 Gbps |
| 7 | Extreme (Hyper-Volumetric) | > 100 Gbps |
| 级别 | 描述 | 典型带宽 |
|---|---|---|
| 1-2 | 简单洪水攻击 | < 1 Gbps |
| 3-4 | 复杂多向量攻击 | 1-5 Gbps |
| 5-6 | 高级(国家级攻击者水平) | 5-100 Gbps |
| 7 | 极端(超大流量) | > 100 Gbps |
CVSS Integration
CVSS集成
For vulnerability-based incidents, include CVSS v3.1 base score from the security-audit skill.
针对基于漏洞的事件,需包含来自security-audit技能的CVSS v3.1基础评分。
3. Incident Report Template
3. 事件报告模板
Module A: Metadata & Executive Summary
模块A:元数据与执行摘要
markdown
undefinedmarkdown
undefinedSecurity Incident Report
Security Incident Report
Metadata
Metadata
| Field | Value |
|---|---|
| Incident ID | SIR-2026-001 |
| Classification | Confidential |
| Status | Closed / Active / Under Investigation |
| Detection Time | 2026-01-21 14:32 UTC |
| Resolution Time | 2026-01-21 15:17 UTC |
| MTTR | 45 minutes |
| Severity | High (NCISS: 65) |
| Lead Analyst | Jane Doe |
| Affected Systems | web-cluster-01, cdn-edge-eu |
| Field | Value |
|---|---|
| Incident ID | SIR-2026-001 |
| Classification | Confidential |
| Status | Closed / Active / Under Investigation |
| Detection Time | 2026-01-21 14:32 UTC |
| Resolution Time | 2026-01-21 15:17 UTC |
| MTTR | 45 minutes |
| Severity | High (NCISS: 65) |
| Lead Analyst | Jane Doe |
| Affected Systems | web-cluster-01, cdn-edge-eu |
Executive Summary (max 200 words)
Executive Summary (max 200 words)
On [DATE], our monitoring systems detected [INCIDENT TYPE] targeting [SYSTEMS].
The attack [IMPACT DESCRIPTION]. Through [RESPONSE ACTIONS], normal operations
were restored within [TIMEFRAME]. [DATA IMPACT STATEMENT].
On [DATE], our monitoring systems detected [INCIDENT TYPE] targeting [SYSTEMS].
The attack [IMPACT DESCRIPTION]. Through [RESPONSE ACTIONS], normal operations
were restored within [TIMEFRAME]. [DATA IMPACT STATEMENT].
Business Impact
Business Impact
- Service Availability: [Degraded/Offline for X minutes]
- Data Impact: [None/Potential exposure of X records]
- Financial Impact: [Estimated cost]
- Reputation Impact: [Public/Internal]
undefined- Service Availability: [Degraded/Offline for X minutes]
- Data Impact: [None/Potential exposure of X records]
- Financial Impact: [Estimated cost]
- Reputation Impact: [Public/Internal]
undefinedModule B: Timeline (Chronological Analysis)
模块B:时间线(时序分析)
markdown
undefinedmarkdown
undefinedIncident Timeline
Incident Timeline
| Time (UTC) | Event | Source | Action Taken |
|---|---|---|---|
| 14:32 | Traffic spike detected | Cloudflare Alert | On-call notified |
| 14:35 | 5x baseline traffic confirmed | Grafana | Incident declared |
| 14:38 | Geo-blocking activated | Cloudflare | EU/US traffic filtered |
| 14:42 | Attack vector identified: UDP amplification | DPI Analysis | Null-route for UDP/427 |
| 14:55 | Traffic normalized | Monitoring | Mitigation confirmed |
| 15:17 | All systems stable | Status page | Incident closed |
| Time (UTC) | Event | Source | Action Taken |
|---|---|---|---|
| 14:32 | Traffic spike detected | Cloudflare Alert | On-call notified |
| 14:35 | 5x baseline traffic confirmed | Grafana | Incident declared |
| 14:38 | Geo-blocking activated | Cloudflare | EU/US traffic filtered |
| 14:42 | Attack vector identified: UDP amplification | DPI Analysis | Null-route for UDP/427 |
| 14:55 | Traffic normalized | Monitoring | Mitigation confirmed |
| 15:17 | All systems stable | Status page | Incident closed |
Dwell Time Analysis
Dwell Time Analysis
- Time to Detection (TTD): 0 minutes (automated)
- Time to Containment (TTC): 10 minutes
- Time to Eradication (TTE): 23 minutes
- Time to Recovery (TTR): 45 minutes
undefined- Time to Detection (TTD): 0 minutes (automated)
- Time to Containment (TTC): 10 minutes
- Time to Eradication (TTE): 23 minutes
- Time to Recovery (TTR): 45 minutes
undefinedModule C: Technical Analysis & IoCs
模块C:技术分析与IoC
markdown
undefinedmarkdown
undefinedTechnical Analysis
Technical Analysis
Attack Vectors (MITRE ATT&CK)
Attack Vectors (MITRE ATT&CK)
- T1498: Network Denial of Service
- T1498.001: Direct Network Flood
- T1498.002: Reflection Amplification
- T1498: Network Denial of Service
- T1498.001: Direct Network Flood
- T1498.002: Reflection Amplification
Indicators of Compromise (IoCs)
Indicators of Compromise (IoCs)
Network Artifacts
Network Artifacts
| Type | Value | Context |
|---|---|---|
| IP Range | 192.0.2.0/24 | Source (spoofed) |
| ASN | AS12345 | Amplification source |
| Port | UDP/427 | SLP Amplification |
| Signature | \x00\x00\x00\x00SLP | Payload pattern |
| Type | Value | Context |
|---|---|---|
| IP Range | 192.0.2.0/24 | Source (spoofed) |
| ASN | AS12345 | Amplification source |
| Port | UDP/427 | SLP Amplification |
| Signature | \x00\x00\x00\x00SLP | Payload pattern |
System Artifacts
System Artifacts
| Type | Value | Hash (SHA256) |
|---|---|---|
| Modified File | /var/www/shell.php | a1b2c3... |
| New User | backdoor_admin | N/A |
| Cron Job | /tmp/.hidden/beacon | d4e5f6... |
| Type | Value | Hash (SHA256) |
|---|---|---|
| Modified File | /var/www/shell.php | a1b2c3... |
| New User | backdoor_admin | N/A |
| Cron Job | /tmp/.hidden/beacon | d4e5f6... |
Root Cause Analysis (5-Whys)
Root Cause Analysis (5-Whys)
- Why did the attack succeed? → Amplification ports were exposed
- Why were ports exposed? → Firewall rules not updated after migration
- Why weren't rules updated? → No automated validation in deployment
- Why no automation? → Security review not in CI/CD pipeline
- Why not in pipeline? → Technical debt, prioritized features
Root Cause: Missing security validation in deployment pipeline
---- Why did the attack succeed? → Amplification ports were exposed
- Why were ports exposed? → Firewall rules not updated after migration
- Why weren't rules updated? → No automated validation in deployment
- Why no automation? → Security review not in CI/CD pipeline
- Why not in pipeline? → Technical debt, prioritized features
Root Cause: Missing security validation in deployment pipeline
---4. DDoS Post-Mortem Analysis
4. DDoS事后分析
Metrics Table
指标表格
| Metric | Value | Threshold | Status |
|---|---|---|---|
| Peak Bandwidth | 45 Gbps | 10 Gbps | Exceeded |
| Peak Packets/sec | 12M PPS | 5M PPS | Exceeded |
| Peak Requests/sec | 850K RPS | 100K RPS | Exceeded |
| Unique Source IPs | 145,000 | N/A | Amplification |
| Attack Duration | 45 min | N/A | - |
| Geographic Spread | 89 countries | N/A | Global botnet |
| 指标 | 数值 | 阈值 | 状态 |
|---|---|---|---|
| 峰值带宽 | 45 Gbps | 10 Gbps | 已超标 |
| 峰值数据包数/秒 | 12M PPS | 5M PPS | 已超标 |
| 峰值请求数/秒 | 850K RPS | 100K RPS | 已超标 |
| 唯一源IP数 | 145,000 | N/A | 放大攻击 |
| 攻击时长 | 45 min | N/A | - |
| 地域分布 | 89个国家 | N/A | 全球僵尸网络 |
Attack Vector Classification
攻击向量分类
| Vector | % of Traffic | Type | Mitigation |
|---|---|---|---|
| UDP Flood | 60% | Volumetric | Null-route |
| SYN Flood | 25% | Protocol | SYN cookies |
| HTTP Flood | 15% | Application | Rate limiting |
| 攻击向量 | 流量占比 | 类型 | 缓解措施 |
|---|---|---|---|
| UDP洪水攻击 | 60% | 流量型 | 空路由阻断 |
| SYN洪水攻击 | 25% | 协议型 | SYN Cookie防护 |
| HTTP洪水攻击 | 15% | 应用层 | 速率限制 |
Multi-Vector Detection
多向量攻击检测
Was this a smoke-screen attack?
├── Volumetric attack started: 14:32
├── Application-layer probing detected: 14:38
├── Login brute-force attempts: 14:40-14:45
└── Conclusion: Coordinated multi-vector attackWas this a smoke-screen attack?
├── Volumetric attack started: 14:32
├── Application-layer probing detected: 14:38
├── Login brute-force attempts: 14:40-14:45
└── Conclusion: Coordinated multi-vector attack5. CVE Correlation for DDoS
5. DDoS攻击的CVE关联
Map attack signatures to known vulnerabilities for threat intelligence.
将攻击特征与已知漏洞关联以生成威胁情报。
Amplification Vector CVE Table
放大攻击向量CVE表格
| Attack Type | Port | Amplification Factor | CVE | Description |
|---|---|---|---|---|
| NTP Monlist | UDP/123 | 556x | CVE-2013-5211 | NTP mode 7 monlist |
| Memcached | UDP/11211 | 51,000x | CVE-2018-1000115 | UDP reflection |
| CLDAP | UDP/389 | 70x | CVE-2020-9490 | LDAP reflection |
| SLP | UDP/427 | 2,200x | CVE-2023-29552 | Service Location Protocol |
| DNS | UDP/53 | 54x | Various | Open resolver abuse |
| SSDP | UDP/1900 | 30x | Various | UPnP reflection |
| Chargen | UDP/19 | 358x | CVE-1999-0103 | Character generator |
| 攻击类型 | 端口 | 放大倍数 | CVE | 描述 |
|---|---|---|---|---|
| NTP Monlist | UDP/123 | 556x | CVE-2013-5211 | NTP模式7 monlist |
| Memcached | UDP/11211 | 51,000x | CVE-2018-1000115 | UDP反射 |
| CLDAP | UDP/389 | 70x | CVE-2020-9490 | LDAP反射 |
| SLP | UDP/427 | 2,200x | CVE-2023-29552 | 服务定位协议 |
| DNS | UDP/53 | 54x | Various | 开放解析器滥用 |
| SSDP | UDP/1900 | 30x | Various | UPnP反射 |
| Chargen | UDP/19 | 358x | CVE-1999-0103 | 字符生成器 |
Analysis Example
分析示例
markdown
undefinedmarkdown
undefinedCVE Correlation Analysis
CVE Correlation Analysis
Traffic analysis shows 40% of UDP flood originated from port 427.
Deep Packet Inspection confirmed payloads typical for CVE-2023-29552.
Conclusion: Botnet leveraging unpatched VMware ESXi instances as
SLP reflectors. Recommend:
- Verify our infrastructure is not acting as reflector
- Block UDP/427 at edge
- Report to upstream provider
---Traffic analysis shows 40% of UDP flood originated from port 427.
Deep Packet Inspection confirmed payloads typical for CVE-2023-29552.
Conclusion: Botnet leveraging unpatched VMware ESXi instances as
SLP reflectors. Recommend:
- Verify our infrastructure is not acting as reflector
- Block UDP/427 at edge
- Report to upstream provider
---6. Impact Assessment Matrix
6. 影响评估矩阵
Operational Impact
业务运营影响
| Category | Level | Description |
|---|---|---|
| Availability | Critical | Complete outage for 15 minutes |
| Performance | High | 50% degradation for 30 minutes |
| Collateral | Medium | API gateway affected |
| 类别 | 级别 | 描述 |
|---|---|---|
| 可用性 | 严重 | 完全中断15分钟 |
| 性能 | 高 | 性能下降50%达30分钟 |
| 附带影响 | 中 | API网关受影响 |
Financial Impact
财务影响
| Category | Estimated Cost |
|---|---|
| Lost Revenue | $15,000 |
| Scrubbing Overage | $2,500 |
| Incident Response | $5,000 (8 person-hours) |
| Total | $22,500 |
| 类别 | 预估损失 |
|---|---|
| 营收损失 | $15,000 |
| 流量清洗超额费用 | $2,500 |
| 事件响应成本 | $5,000(8人时) |
| 总计 | $22,500 |
Reputation Impact
声誉影响
| Channel | Severity | Action Required |
|---|---|---|
| Social Media | Medium | Prepared statement |
| B2B Partners | Low | Direct notification |
| Press | None | No external coverage |
| 渠道 | 严重程度 | 需采取的行动 |
|---|---|---|
| 社交媒体 | 中 | 准备声明 |
| B2B合作伙伴 | 低 | 直接通知 |
| 媒体 | 无 | 无需对外披露 |
7. Blameless Post-Mortem
7. 无责事后复盘
Principles
原则
- Focus on systems, not individuals: "Why did the process allow X?" not "Who did X?"
- Assume good intentions: Everyone acted with the best information available
- Learn, don't punish: Goal is improvement, not blame
- Share openly: Publish internally for organizational learning
- 聚焦系统而非个人:应问“流程为何允许X发生?”而非“谁导致了X?”
- 假设善意:所有人都是基于当时可得的最优信息采取行动
- 学习而非惩罚:目标是改进而非追责
- 公开分享:内部发布复盘结果以促进组织学习
Post-Mortem Template
事后复盘模板
markdown
undefinedmarkdown
undefinedPost-Mortem: [Incident Title]
Post-Mortem: [Incident Title]
What Happened
What Happened
[Factual description of the incident]
[Factual description of the incident]
What Went Well
What Went Well
- Detection was automated (0 min TTD)
- On-call responded within SLA
- Communication was clear
- Detection was automated (0 min TTD)
- On-call responded within SLA
- Communication was clear
What Went Wrong
What Went Wrong
- Firewall rules were outdated
- No alerting for UDP traffic spikes
- Runbook was incomplete
- Firewall rules were outdated
- No alerting for UDP traffic spikes
- Runbook was incomplete
Action Items
Action Items
| ID | Action | Owner | Due Date | Status |
|---|---|---|---|---|
| 1 | Add security validation to CI/CD | @devops | 2026-02-01 | Open |
| 2 | Update runbook with DDoS procedures | @security | 2026-01-28 | Open |
| 3 | Implement UDP traffic alerting | @sre | 2026-02-05 | Open |
| ID | Action | Owner | Due Date | Status |
|---|---|---|---|---|
| 1 | Add security validation to CI/CD | @devops | 2026-02-01 | Open |
| 2 | Update runbook with DDoS procedures | @security | 2026-01-28 | Open |
| 3 | Implement UDP traffic alerting | @sre | 2026-02-05 | Open |
Lessons Learned
Lessons Learned
- Automated security gates prevent configuration drift
- Regular runbook reviews are essential
- Multi-vector attacks require layered defense
---- Automated security gates prevent configuration drift
- Regular runbook reviews are essential
- Multi-vector attacks require layered defense
---8. Report Distribution
8. 报告分发
Classification Levels
保密级别
| Level | Audience | Content |
|---|---|---|
| Executive | C-Level, Board | Summary, business impact, remediation status |
| Technical | Security Team, SOC | Full IoCs, TTPs, forensic details |
| Legal | Legal, Compliance | Data impact, regulatory implications |
| Public | Customers, Press | Sanitized summary, no technical details |
| 级别 | 受众 | 内容 |
|---|---|---|
| 高管层 | 高管、董事会 | 摘要、业务影响、整改状态 |
| 技术层 | 安全团队、SOC | 完整IoC、TTP、取证细节 |
| 法务层 | 法务、合规部门 | 数据影响、合规影响 |
| 公众层 | 客户、媒体 | 经过脱敏的摘要,不含技术细节 |
Retention Requirements
留存要求
| Document Type | Retention | Storage |
|---|---|---|
| Full Incident Report | 7 years | Encrypted archive |
| IoC Data | 2 years | Threat Intelligence Platform |
| Logs & Evidence | 1 year | Immutable storage |
| 文档类型 | 留存期限 | 存储方式 |
|---|---|---|
| 完整事件报告 | 7年 | 加密归档 |
| IoC数据 | 2年 | 威胁情报平台 |
| 日志与证据 | 1年 | 不可变存储 |
9. Checklists
9. 检查清单
Pre-Incident Preparation
事前准备
- Incident response runbooks documented
- On-call rotation established
- Communication templates prepared
- Evidence collection tools ready
- Stakeholder contact list updated
- 已编写事件响应手册
- 已建立轮值待命机制
- 已准备沟通模板
- 取证工具就绪
- 利益相关方联系人列表已更新
During Incident
事件处置中
- Incident declared and logged
- Timeline documentation started
- Evidence preserved (logs, packets)
- Stakeholders notified
- Status page updated
- 已宣布事件并记录
- 已开始记录事件时间线
- 已留存证据(日志、数据包)
- 已通知利益相关方
- 已更新状态页面
Post-Incident
事件处置后
- Full incident report completed
- Post-mortem meeting scheduled
- Action items assigned and tracked
- Lessons learned documented
- Controls validated/improved
- 已完成完整事件报告
- 已安排事后复盘会议
- 已分配并跟踪行动项
- 已记录经验教训
- 已验证/改进控制措施
References
参考资料
Credits & Attribution
致谢与归属
This skill draws from the "Handbuch für Advanced Security Incident Reporting" methodology,
incorporating elements of NIST SP 800-61, SANS frameworks, and industry best practices.
Developed by webconsulting.at for the Claude skill collection.
本技能基于《高级安全事件报告手册》方法论开发,整合了NIST SP 800-61、SANS框架及行业最佳实践。
由webconsulting.at为Claude技能集开发。