Udostępnij za pośrednictwem


Microsoft security incident management: Post-incident activity

Postmortem

Some security incidents, especially those incidents that are customer impacting or result in a data breach, are subject to a full incident postmortem. The security response team conducts a detailed postmortem with all the parties involved in security incident response to:

  • Document the sequence of events that caused the incident.
  • Create a technical summary of the incident as supported by the evidence that includes the actors involved in the breach (if known). This summary includes how the response was executed and other key takeaways.
  • Identify technical lapses, procedural failures, manual errors, process flaws, and communication glitches, and/or any previously unknown attack vectors that were identified during the security incident response.

The postmortem directly influences Microsoft online service improvement, operational processes, and documentation by setting new priorities in the Microsoft online services engineering development cycle.

Documentation

All key technical findings in the postmortem process are captured in a report and service investments or fixes in the form of bugs or development change requests. These findings are followed-up with the appropriate engineering teams. For process failures and cross-organizational issues, issues are documented in the security response team's database and followed-up with the appropriate groups to address them.

Process improvement

Responding to a security incident in Microsoft online services involves coordination with multiple groups spread across different organizations within Microsoft, and potentially even appropriate external organizations such as law enforcement. We know that it's critical to evaluate our responses after every security incident for both sufficiency and completeness. For any identified improvements or changes, the security response team evaluates the suggestions in consultation with the appropriate teams and stakeholders, and where appropriate incorporates them into standard operating procedures. All required changes, bugs, or service improvements identified during the security incident response or postmortem activity are logged and tracked in an internal Microsoft engineering database. All potential bugs or features are assigned to the appropriate owner. The Microsoft security response team reviews all entries until the issue is resolved.