Detection, response, and recovery

These three capabilities define effective blue teaming.

Detection strategies

Signature-based detection: Known malware signatures, exploit patterns, or attack indicators. Fast and accurate for known threats but blind to novel attacks.

Anomaly-based detection: Baseline normal behaviour and alert on deviations. Catches unknown attacks but generates more false positives. Requires understanding of what “normal” looks like.

Behaviour-based detection: Focus on attacker techniques rather than specific tools. Detects credential dumping behaviours even if the tool changes. More resilient to evasion.

Threat intelligence: Incorporate external IOCs (indicators of compromise) and TTPs from threat feeds. Detect known adversary infrastructure or techniques.

User and entity behaviour analytics (UEBA): Machine learning models identify unusual user activity, lateral movement patterns, or compromised accounts based on historical behaviour.

Detection layers

Network level: Traffic analysis, IDS/IPS, DNS monitoring, proxy logs, netflow data. Detect command and control communications, lateral movement, data exfiltration.

Endpoint level: EDR tools, process monitoring, file integrity monitoring, registry monitoring. Detect malware execution, persistence mechanisms, credential theft.

Application level: Application logs, authentication events, database activity monitoring. Detect account compromise, data access abuse, SQL injection, web attacks.

Cloud and identity: Cloud provider logs (AWS CloudTrail, Azure Monitor), identity provider logs (Azure AD, Okta), API activity monitoring. Detect cloud resource abuse, identity attacks.

Response procedures

Triage and validation: Determine if alert is real threat or false positive. Gather initial evidence. Assess scope and severity.

Containment: Isolate affected systems to prevent spread. Disconnect from network, disable accounts, block malicious infrastructure at firewall/proxy.

Eradication: Remove attacker presence completely. Delete malware, remove persistence mechanisms, revoke compromised credentials, close exploited vulnerabilities.

Evidence preservation: Maintain chain of custody for forensics. Capture memory images, disk images, logs. Document everything for investigation and potential legal action.

Recovery: Restore systems from known-good backups. Rebuild compromised systems from scratch if necessary. Validate that attacker presence is eliminated before reconnection.

Recovery priorities

Critical systems first: Business-critical services and systems supporting essential operations recover before less important systems.

Clean rebuild over quick fix: Don’t trust compromised systems. Rebuild from scratch rather than trying to “clean” attacker artifacts.

Validation before restoration: Test recovered systems in isolated environment before reconnecting to production. Verify no reinfection or persistence.

Enhanced monitoring: Temporarily increase logging and monitoring on recovered systems to catch any remaining attacker presence quickly.