1.17-Establish Mission Log
Task Establish Mission Log¶
Conditions¶
Given a network to defend establish system for mission logging
Standards¶
- Team conducts incident tracking utilizing Date-Time Group (DTG)
- Team provides incident description
- Team categorizes level of incident
- Team enumerates discovery and response
- Team utilizes report logs
End State¶
Mission log created within parameters of the standards
Manual Steps¶
-
How to use the 9-line
- Date/Time: Indicate when it was discovered
- Reporting Unit & Region: Input current org/unit representing(ie CALOES or CPT)
- POC: Person who discovered the anomaly
- File Name: Input the file name
- Type: Category of infection
- Hazards: Input understood method of infection
- Threat: Level of incident category and capabilities
- Impact: Determine level of impact
- Protective Measures: Determine steps of possible mitigation techniques
9-Line does not leave client's premises
-
How to use the Federal Agency Incidents Categories Document
- Reference all incident descriptions on the document.
Description
Column - By choosing the most applicable description, see the associated category (CAT) number. (left most column)
- Ensure to be aware of and follow any associated time limitations in the column labeled
Reporting Timeframe
- include selected
Category
in the Mission Log
- Reference all incident descriptions on the document.
-
How to Fill Out the Mission Log
- Date/Time column: Insert the current date and time of your entry.
- Category column: Reference the Federal Agency Incidents Categories (can be found in the References section below) in order to categorize the incident that is being worked on.
- System/IP column: Insert the host name and IP address of the asset that is being worked on.
- Technical Notes column: Insert the actions and modifications that were made on the asset being worked on (i.e. Name of script that was run, change of file permissions, copying of a file and moving it to another directory).
- Summary column: Give a breakdown of all activites performed at the date and time in order to simplify an explanation of course of action (COA).
- Operator column: Insert your name in this field following this format: RANK LASTNAME, FIRSTNAME MIDDLE INITIAL.
-
Team utilizes report logs
- Consolidate mission logs into a summary of all findings for the day
- Save consolidated mission log at the client*approved location
- Sanitize client/victim data from summary report. Save
sanitized
summary report in CPT archive
Running Script¶
N/A
Dependencies¶
Identify your limitations as far as utilization of tools on UNCLASSIFIED/CLASSIFIED networks
Other available tools¶
N/A
References¶
Federal Agency Incidents Categories Website
Mission Log document
Federal Agency Incidents Categories Spreadsheet
Malware 9-Line Report template