Discipline Under Fire: Learning Cyber Incident Response from Military Tactics
In the heat of contact, there’s no room for indecision. As a former Royal Marines Commando, we are taught that commanders at all levels must rapidly assess the situation, make critical decisions, and act while maintaining a strict command structure and discipline. This precision under pressure ensures not only the success of the mission but also the safety of the soldiers.
The same can be said in cybersecurity incident response, leaders must act with informed urgency. When a breach occurs, the speed of your response is crucial to limit damage. But this isn’t a blind race against time. It's about quick, yet measured actions — triaging the threat, containing the breach, and understanding the full scope of threat actors’ access before developing a solid eviction plan. All while maintaining clear communication and command. Here, as on the battlefield, a disciplined approach under duress defines the difference between a successful counter-intrusion operation and a hasty, unsuccessful eradication with long-lasting consequences.
Throughout my time in incident response, I've have witnessed organisations that do manage crises just as I’ve talked about above, with “military precision”. More recently (and worryingly) however, the scenario is one of chaos - hurried and disorderly actions driven by panic at the senior leadership level that exacerbates the situation, inflates costs, and prolongs the recovery. Ultimately this risks a future breach to save money (potentially driven by organisations wanting to spend less due to the economic climate? – but that's a blog for another day). Haste is often counterproductive, underscoring the necessity for a measured, strategic response akin to a well-executed military manoeuvre.
As an incident response (IR) manager, I’m often pulled in either just after or as these “panicked” decisions are being made – it’s my job to not only advise on the technical aspects but guide the clients through the incident with the ultimate goal to ensure the organisation comes out armed with the strategies and practices necessary to better withstand future cybersecurity threats.
The military's disciplined approach to high-pressure situations offers invaluable lessons for orchestrating a cohesive and effective response to cybersecurity threats. In this blog, we will delve into some of the key strategies incident response managers can learn from military operations at each phase of the incident response cycle.
Understanding the Parallels:
By linking the stages of an attack to the incident response life cycle, we can clearly see the parallels between the two:
Throughout all of these stages speed, precision, and coordination are all critical.
This structured approach, despite the urgency of combat, emphasises discipline and order, ensuring each phase is executed effectively and safely with the highest chance of success.
Strategic Haste vs. Reckless Speed:
All military commanders are taught that after coming under effective enemy fire, they need to pause, reflect, assess, and plan. This is known as the “condor moment”, and it allows the commander to formulate the best and safest plan that has the highest likelihood of success before moving forward with the next phase of the attack.
The biggest mistake I see from an external perspective are organisations not taking that “condor moment”. Instead, they rush headfirst into a “Wack-a-mole” style containment phase whilst trying to recover with a “restore as fast as possible” mindset (often at the expense of this investigation) which they believe will save them the most amount of money. This is often driven by senior leadership, who have unrealistic time to recover expectations – Often I must have the difficult conversation explaining that there is no magic bullet, it’s going to hurt – but if we do this properly, you’ll come out of it stronger and more prepared for your next incident.
领英推荐
So how should it be done?
From an investigation perspective we’re looking to answer three main questions:
Answering these allows us to develop a comprehensive eradication plan and follow-on actions that the organisation will need to take in addition to informing legal and communication teams.
Failure to properly conduct this aspect of incident response can lead to oversight of crucial details, misallocation of resources, or even aggravation of the breach. Intelligent action involves a structured response, where each step is deliberate and informed by best practices and situational awareness. This approach ensures that the response is not only quick but also effective and precise, addressing the root cause of the breach and mitigating potential fallout.
When is enough, enough?
In the eradication phase of incident response, as in the attack phase of combat, haste is indeed necessary, but it must be balanced with the need for thorough planning/investigation. Determining when to shift from investigation to action involves constantly assessing whether:
Deciding to eradicate the threat at any of these stages carries risks. Too soon, and you might not fully understand the breach; too late, and the damage could escalate. Each decision point should be carefully considered against the potential risks and benefits.
In each case, the risks range from incomplete eradication to extended system compromise. Balancing the need for detailed understanding with the need to limit damage is a critical skill in incident response management.
Key Takeaways:
I've covered a lot, but if you take nothing else away, remember these three points:
Preparation is key - Having a well-drilled, experienced incident response team ready to go at a moment’s notice is crucial, but your decision-makers need to be prepared too.
Assessment is critical - Before leaping into action, take a measured step back - your condor moment - to fully assess the situation. This pause can provide clarity and prevent costly mistakes.
Eradication is controlled - Execute eradication measures in a methodical and coordinated fashion. Rushed actions can lead to oversight and incomplete resolution of the security incident.
Director - PCN Projects
1 年Great read - There’s certainly a large trend that IR managers are ex Forces and this article just proves exactly why they are so successful!
Nuclear and Industrial Information Security
1 年Chris I enjoyed that. Some great points.
SCADA SR Systems Analyst at City of Riverside
1 年Great post! I couldn’t agree more.
Marine Corps Veteran | Security Operations | Insider Threat | Cyber Threat Intelligence | Incident Response
1 年Absolutely loved this post. I'm glad it popped up on my feed.
Vice President of Business Development at Dauntless Discovery - A Global Leader in eDiscovery Services | Colonel, U.S. Marine Corps (retired)
1 年Fantastic article!