{"id":1942,"date":"2019-12-04T10:55:58","date_gmt":"2019-12-04T09:55:58","guid":{"rendered":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/"},"modified":"2020-01-22T00:28:37","modified_gmt":"2020-01-21T23:28:37","slug":"life-cycle-of-a-security-incident-from-detection-to-response","status":"publish","type":"post","link":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/","title":{"rendered":"Life-cycle of a security incident: from detection to response"},"content":{"rendered":"<p>Giovanni Merlos Mellini is the Head of Information, Systems and <span id=\"urn:enhancement-bcf3cc73\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/network_security\">Network Security<\/span> at Enav S.p.A., the Italian Air Navigation <span id=\"urn:enhancement-dd4ed958\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">Service<\/span> Provider. He is also the founder of the not-for-profit association Cyber Saiyan and the organiser of <strong>RomHack<\/strong>, a free <span id=\"urn:enhancement-2e25950c\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> event that took place in Rome on last September.<\/p>\n<p>During <strong>Codemotion Rome 2019<\/strong>, Giovanni delivered a speech explaining how, as <span id=\"urn:enhancement-d54f93a1\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> people, we must take care about <span id=\"urn:enhancement-fd727772\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> from the beginning of any <span id=\"urn:enhancement-e01c8861\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/project\">project<\/span>. This means implementing a <strong><span id=\"urn:enhancement-f9bea10e\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span>-by-design approach<\/strong>. You\u2019ll experience <span id=\"urn:enhancement-a17c965\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> issues sooner or later if you don\u2019t use this approach.<\/p>\n<h2 id=\"3kcrq\"><strong>Uploading a dangerous payload<\/strong><\/h2>\n<p>What happens if a system is not secured by design? If you are lucky enough to have an effective <span id=\"urn:enhancement-14168b79\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> process somewhere in your company, there is a chance you intercept the <span id=\"urn:enhancement-7353bd50\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/project\">project<\/span> before it goes live. However, during his speech Giovanni showed an example where a <span id=\"urn:enhancement-5498e884\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> issue was there in a production environment. We knew about this web <span id=\"urn:enhancement-bbcbc14\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_software\">application<\/span> only after the IT department deployed it and it was actively used by the <span id=\"urn:enhancement-c02c703e\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/user_computing\">users<\/span>.<\/p>\n<p>Giovanni <strong>scheduled a <span id=\"urn:enhancement-c8ff7ba3\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/penetration_test\">penetration test<\/span><\/strong> to check for <span id=\"urn:enhancement-85174271\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/vulnerability_computing\">vulnerabilities<\/span> on the target system. The test exposed a <strong><span id=\"urn:enhancement-9b78f61a\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/vulnerability_computing\">vulnerability<\/span><\/strong>: an upload form was not checking in the right way the file being uploaded. In particular, an attacker could upload arbitrary files to the <span id=\"urn:enhancement-4daa0fdb\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/server_computing\">server<\/span>. To exploit this <span id=\"urn:enhancement-ed40bdf1\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/vulnerability_computing\">vulnerability<\/span>, Giovanni tried to upload a simple ASPX web <span id=\"urn:enhancement-d443928c\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/shell_computing\">shell<\/span> using the vulnerable web page.<\/p>\n<p><span id=\"urn:enhancement-509af1b8\" class=\"textannotation disambiguated wl-place\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/world_wide_web\">The web<\/span> <span id=\"urn:enhancement-8f244c1d\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/shell_computing\">shell<\/span> will execute the <span id=\"urn:enhancement-eded71ad\" class=\"textannotation disambiguated wl-creative-work\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/microsoft_windows\">Windows<\/span> <em>cmd.exe<\/em> to interact with the system. Moreover, <span id=\"urn:enhancement-e30a90c1\" class=\"textannotation disambiguated wl-creative-work\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/microsoft_windows\">Windows<\/span> anti-malware protection system removes the web <span id=\"urn:enhancement-99182071\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/shell_computing\">shell<\/span> just after the uploading.<\/p>\n<p>In the first test, it was identified as malicious software. However, it was quite easy to bypass the protection: just rename <em>cmd.exe<\/em> to <em>Cmd.ExE<\/em>. This is funny and scary at the same time.<\/p>\n<h2 id=\"5cr3q\"><strong>Demo time: exploit the RCE<\/strong><\/h2>\n<p>This kind of attack is called <strong><span id=\"urn:enhancement-55e8ed73\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/arbitrary_code_execution\">RCE<\/span><\/strong>, <strong>R<\/strong>emote <strong>C<\/strong>ode <strong>E<\/strong>xecution, and is <strong>one of the worst <span id=\"urn:enhancement-bfdc75ed\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/vulnerability_computing\">vulnerabilities<\/span><\/strong>. It needs to be fixed as soon as possible.<\/p>\n<p>In real life, patching and validation tasks take time. Therefore, the aforementioned web <span id=\"urn:enhancement-af41aa35\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_software\">application<\/span> is exposed to a high risk until the issue is fixed.<\/p>\n<p>There are two possible solutions:<\/p>\n<ul>\n<li><strong>go offline<\/strong>: shutdown the system until developers fix the issue;<\/li>\n<li><strong>stay online<\/strong>: mitigate the risk while keeping the system online.<\/li>\n<\/ul>\n<h2 id=\"1strt\"><strong>Mitigate the risk of keeping the system online<\/strong><\/h2>\n<p>Let&#8217;s imagine to go for keeping the system online, trying to mitigate the <span id=\"urn:enhancement-eeffb494\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/vulnerability_computing\">vulnerability<\/span> risk. The first thing to do is <strong>understanding the scenario<\/strong> and <strong>collecting relevant logs<\/strong>. In the case shown by Giovanni, the web <span id=\"urn:enhancement-4e57b9e2\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/application_software\">application<\/span> run on an <span id=\"urn:enhancement-958e05b2\" class=\"textannotation disambiguated wl-creative-work\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/internet_information_services\">IIS<\/span> <span id=\"urn:enhancement-d84a2a4f\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/web_server\">Web server<\/span> with <span id=\"urn:enhancement-db4b015c\" class=\"textannotation disambiguated wl-creative-work\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/asp-net\">ASPX<\/span> on <span id=\"urn:enhancement-dca169a1\" class=\"textannotation disambiguated wl-creative-work\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/microsoft_windows\">Windows<\/span>.<\/p>\n<p>As a defender, <strong>you need to know your systems<\/strong>. One way to achieve this goal is to collect relevant <span id=\"urn:enhancement-89c8122f\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span> to analyse them. In this lab, Giovanni used <strong>Splunk<\/strong> to collect <span id=\"urn:enhancement-ce019e52\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span>, but there are a lot of other options (eg. <strong>Elastic Search<\/strong>).<\/p>\n<p>These are the actions to put in place:<\/p>\n<ul>\n<li>collect the logs;<\/li>\n<li>find the <span id=\"urn:enhancement-bf035f37\" class=\"textannotation disambiguated wl-creative-work\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/internet_information_services\">IIS<\/span> log directory;<\/li>\n<li>send the logs to a central log collector (configure a local agent to monitor in real-time the <span id=\"urn:enhancement-b2b3ef9c\" class=\"textannotation disambiguated wl-creative-work\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/internet_information_services\">IIS<\/span> logs and send them to the central collector that keep also a secure copy of the <span id=\"urn:enhancement-fbab5b41\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data_logger\">log files<\/span> &#8211; it can also be useful in case of forensic activities);<\/li>\n<li>analyse logs while the problem is happening;<\/li>\n<li>find attack patterns.<\/li>\n<\/ul>\n<h2 id=\"ah72h\"><strong>Write your own detection rule<\/strong><\/h2>\n<p>We are now ready to write our <strong>detection rule<\/strong>. To this end, we need to:<\/p>\n<ul>\n<li><strong>identify pattern unique fields<\/strong>: starting from the log analysis, we look for unique fields into the logs while the attack happens;<\/li>\n<li><strong>minimise the <span id=\"urn:enhancement-c1a5b8d3\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/false_positives_and_false_negatives\">false positives<\/span><\/strong>: the goal is to be accurate to reduce the number of <span id=\"urn:enhancement-bf968b14\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/false_positives_and_false_negatives\">false positives<\/span>, so security analysts will only work on real events;<\/li>\n<li><strong>schedule a search for the pattern<\/strong>: no one can identify the pattern by hand, we have to automate the detection phase;<\/li>\n<li><strong>create an alert<\/strong>: when the event happens an action will be executed, a script is called that will open a ticket on our service desk platform.<\/li>\n<\/ul>\n<p>At this point, we mitigated the <span id=\"urn:enhancement-6d29a2b4\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/vulnerability_computing\">vulnerability<\/span> risk; we could detect the event in real-time, generate an action and respond to the events.<\/p>\n<h2 id=\"9uug4\"><strong>Respond to the incident<\/strong><\/h2>\n<p>We are now ready to react to the <span id=\"urn:enhancement-18551edf\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/attack_computing\">attack<\/span>. While the <span id=\"urn:enhancement-3acff1ef\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/attack_computing\">attack<\/span> happens we are notified on our service desk and we can easily see the <span id=\"urn:enhancement-3e1c5013\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/attack_computing\">attack<\/span> details. Having all process phases and procedures in place, we can react.<\/p>\n<h2 id=\"d5pnp\"><strong>Final remarks<\/strong><\/h2>\n<p>It is clear that, in my view, <strong>security is an enabler and not a blocker<\/strong>!<\/p>\n<p>You must <strong>think secure from the beginning of the <span id=\"urn:enhancement-4ab1f458\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/project\">project<\/span><\/strong> and ask for security requirements.<\/p>\n<p>Remember, there is not a magic potion: <span id=\"urn:enhancement-44b88d35\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/vulnerability_computing\">security problems<\/span> are often a chain of missing <span id=\"urn:enhancement-8b441927\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security_controls\">controls<\/span> and missing <span id=\"urn:enhancement-29a1b535\" class=\"textannotation disambiguated wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security_controls\">controls<\/span> and configurations.<\/p>\n<p><!-- strchf script --><script>        if(window.strchfSettings === undefined) window.strchfSettings = {};    window.strchfSettings.stats = {url: \"https:\/\/codemotion.storychief.io\/life-cycle-of-a-security-incident-from-detection-to-response?id=576794472&type=2\",title: \"Life-cycle of a security incident: from detection to response\",id: \"66543c6c-96d5-4792-a44b-49339654b7a1\"};            (function(d, s, id) {      var js, sjs = d.getElementsByTagName(s)[0];      if (d.getElementById(id)) {window.strchf.update(); return;}      js = d.createElement(s); js.id = id;      js.src = \"https:\/\/d37oebn0w9ir6a.cloudfront.net\/scripts\/v0\/strchf.js\";      js.async = true;      sjs.parentNode.insertBefore(js, sjs);    }(document, 'script', 'storychief-jssdk'))    <\/script><!-- End strchf script --><\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>During Codemotion Rome 2019, Giovanni Merlos Mellini delivered a speech explaining how, as security people, we must take care about security from the beginning of any project. This means implementing a security-by-design approach.<\/p>\n","protected":false},"author":8,"featured_media":1943,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[],"tags":[4,38],"collections":[],"class_list":{"0":"post-1942","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"tag-codemotion-rome","8":"tag-security-manager","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security by Design: Life-cycle of a security incident - Codemotion<\/title>\n<meta name=\"description\" content=\"At Codemotion Rome 2019, Giovanni Mellini delivered a speech about considering security from the beginning of a project, with a security-by-design approach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Life-cycle of a security incident: from detection to response\" \/>\n<meta property=\"og:description\" content=\"At Codemotion Rome 2019, Giovanni Mellini delivered a speech about considering security from the beginning of a project, with a security-by-design approach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/\" \/>\n<meta property=\"og:site_name\" content=\"Codemotion Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codemotion.Italy\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-04T09:55:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-21T23:28:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"888\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leo Sorge\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:site\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leo Sorge\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/life-cycle-of-a-security-incident-from-detection-to-response\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/life-cycle-of-a-security-incident-from-detection-to-response\\\/\"},\"author\":{\"name\":\"Leo Sorge\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/person\\\/99fe84861e17797989e16094aac727d5\"},\"headline\":\"Life-cycle of a security incident: from detection to response\",\"datePublished\":\"2019-12-04T09:55:58+00:00\",\"dateModified\":\"2020-01-21T23:28:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/life-cycle-of-a-security-incident-from-detection-to-response\\\/\"},\"wordCount\":793,\"publisher\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/life-cycle-of-a-security-incident-from-detection-to-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg\",\"keywords\":[\"Codemotion Rome\",\"Security Manager\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/life-cycle-of-a-security-incident-from-detection-to-response\\\/\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/life-cycle-of-a-security-incident-from-detection-to-response\\\/\",\"name\":\"Security by Design: Life-cycle of a security incident - Codemotion\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/life-cycle-of-a-security-incident-from-detection-to-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/life-cycle-of-a-security-incident-from-detection-to-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg\",\"datePublished\":\"2019-12-04T09:55:58+00:00\",\"dateModified\":\"2020-01-21T23:28:37+00:00\",\"description\":\"At Codemotion Rome 2019, Giovanni Mellini delivered a speech about considering security from the beginning of a project, with a security-by-design approach.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/life-cycle-of-a-security-incident-from-detection-to-response\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/life-cycle-of-a-security-incident-from-detection-to-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/life-cycle-of-a-security-incident-from-detection-to-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg\",\"contentUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/12\\\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg\",\"width\":888,\"height\":675,\"caption\":\"Life-cycle of a security incident: from detection to response\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/uncategorized\\\/life-cycle-of-a-security-incident-from-detection-to-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Manager\",\"item\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/tag\\\/security-manager\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Life-cycle of a security incident: from detection to response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#website\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\",\"name\":\"Codemotion Magazine\",\"description\":\"We code the future. Together\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#organization\",\"name\":\"Codemotion\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/codemotionlogo.png\",\"contentUrl\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/codemotionlogo.png\",\"width\":225,\"height\":225,\"caption\":\"Codemotion\"},\"image\":{\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Codemotion.Italy\\\/\",\"https:\\\/\\\/x.com\\\/CodemotionIT\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/#\\\/schema\\\/person\\\/99fe84861e17797989e16094aac727d5\",\"name\":\"Leo Sorge\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g\",\"caption\":\"Leo Sorge\"},\"description\":\"I hold a degree in electronics. I talk and write about science and technology in both real and close-to-real worlds since 1976. I frankly believe that business plan and singularity are excellent starts for science-fiction stories.\",\"url\":\"https:\\\/\\\/www.codemotion.com\\\/magazine\\\/author\\\/leo-sorge\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security by Design: Life-cycle of a security incident - Codemotion","description":"At Codemotion Rome 2019, Giovanni Mellini delivered a speech about considering security from the beginning of a project, with a security-by-design approach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/","og_locale":"en_US","og_type":"article","og_title":"Life-cycle of a security incident: from detection to response","og_description":"At Codemotion Rome 2019, Giovanni Mellini delivered a speech about considering security from the beginning of a project, with a security-by-design approach.","og_url":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/","og_site_name":"Codemotion Magazine","article_publisher":"https:\/\/www.facebook.com\/Codemotion.Italy\/","article_published_time":"2019-12-04T09:55:58+00:00","article_modified_time":"2020-01-21T23:28:37+00:00","og_image":[{"width":888,"height":675,"url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg","type":"image\/jpeg"}],"author":"Leo Sorge","twitter_card":"summary_large_image","twitter_creator":"@CodemotionIT","twitter_site":"@CodemotionIT","twitter_misc":{"Written by":"Leo Sorge","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/#article","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/"},"author":{"name":"Leo Sorge","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/99fe84861e17797989e16094aac727d5"},"headline":"Life-cycle of a security incident: from detection to response","datePublished":"2019-12-04T09:55:58+00:00","dateModified":"2020-01-21T23:28:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/"},"wordCount":793,"publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg","keywords":["Codemotion Rome","Security Manager"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/","url":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/","name":"Security by Design: Life-cycle of a security incident - Codemotion","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/#primaryimage"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg","datePublished":"2019-12-04T09:55:58+00:00","dateModified":"2020-01-21T23:28:37+00:00","description":"At Codemotion Rome 2019, Giovanni Mellini delivered a speech about considering security from the beginning of a project, with a security-by-design approach.","breadcrumb":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/#primaryimage","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg","width":888,"height":675,"caption":"Life-cycle of a security incident: from detection to response"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/life-cycle-of-a-security-incident-from-detection-to-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codemotion.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Security Manager","item":"https:\/\/www.codemotion.com\/magazine\/tag\/security-manager\/"},{"@type":"ListItem","position":3,"name":"Life-cycle of a security incident: from detection to response"}]},{"@type":"WebSite","@id":"https:\/\/www.codemotion.com\/magazine\/#website","url":"https:\/\/www.codemotion.com\/magazine\/","name":"Codemotion Magazine","description":"We code the future. Together","publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codemotion.com\/magazine\/#organization","name":"Codemotion","url":"https:\/\/www.codemotion.com\/magazine\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","width":225,"height":225,"caption":"Codemotion"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codemotion.Italy\/","https:\/\/x.com\/CodemotionIT"]},{"@type":"Person","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/99fe84861e17797989e16094aac727d5","name":"Leo Sorge","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/60ef89012822fdaeb014dc2b17dcc78c3a835e1dfe86ede053fa46a91926fd29?s=96&d=mm&r=g","caption":"Leo Sorge"},"description":"I hold a degree in electronics. I talk and write about science and technology in both real and close-to-real worlds since 1976. I frankly believe that business plan and singularity are excellent starts for science-fiction stories.","url":"https:\/\/www.codemotion.com\/magazine\/author\/leo-sorge\/"}]}},"featured_image_src":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000-600x400.jpg","featured_image_src_square":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000-600x600.jpg","author_info":{"display_name":"Leo Sorge","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/leo-sorge\/"},"uagb_featured_image_src":{"full":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg",888,675,false],"thumbnail":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000-150x150.jpg",150,150,true],"medium":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000-300x228.jpg",300,228,true],"medium_large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000-768x584.jpg",768,584,true],"large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg",888,675,false],"1536x1536":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg",888,675,false],"2048x2048":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg",888,675,false],"small-home-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000.jpg",100,76,false],"sidebar-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000-180x128.jpg",180,128,true],"genesis-singular-images":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000-888x504.jpg",888,504,true],"archive-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000-400x225.jpg",400,225,true],"gb-block-post-grid-landscape":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000-600x400.jpg",600,400,true],"gb-block-post-grid-square":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/12\/cyber-security-1515836154wzI_e87c08295e4d0514d5fc1d3adf2b368a_2000-600x600.jpg",600,600,true]},"uagb_author_info":{"display_name":"Leo Sorge","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/leo-sorge\/"},"uagb_comment_info":0,"uagb_excerpt":"During Codemotion Rome 2019, Giovanni Merlos Mellini delivered a speech explaining how, as security people, we must take care about security from the beginning of any project. This means implementing a security-by-design approach.","lang":"en","_links":{"self":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/1942","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/comments?post=1942"}],"version-history":[{"count":2,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/1942\/revisions"}],"predecessor-version":[{"id":2957,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/1942\/revisions\/2957"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media\/1943"}],"wp:attachment":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media?parent=1942"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/categories?post=1942"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/tags?post=1942"},{"taxonomy":"collections","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/collections?post=1942"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}