CompTIA CySA+
1 Threat Management
1-1 Threat Landscape
1-1 1 Identifying Threat Actors
1-1 2 Understanding Threat Vectors
1-1 3 Threat Intelligence Sources
1-1 4 Threat Intelligence Lifecycle
1-2 Threat Hunting
1-2 1 Threat Hunting Concepts
1-2 2 Threat Hunting Techniques
1-2 3 Threat Hunting Tools
1-3 Threat Modeling
1-3 1 Threat Modeling Concepts
1-3 2 Threat Modeling Techniques
1-3 3 Threat Modeling Tools
1-4 Threat Mitigation
1-4 1 Threat Mitigation Strategies
1-4 2 Threat Mitigation Techniques
1-4 3 Threat Mitigation Tools
2 Vulnerability Management
2-1 Vulnerability Identification
2-1 1 Vulnerability Scanning
2-1 2 Vulnerability Assessment
2-1 3 Vulnerability Identification Tools
2-2 Vulnerability Analysis
2-2 1 Vulnerability Analysis Techniques
2-2 2 Vulnerability Analysis Tools
2-3 Vulnerability Prioritization
2-3 1 Vulnerability Prioritization Techniques
2-3 2 Vulnerability Prioritization Tools
2-4 Vulnerability Remediation
2-4 1 Vulnerability Remediation Techniques
2-4 2 Vulnerability Remediation Tools
3 Cyber Incident Response
3-1 Incident Response Planning
3-1 1 Incident Response Plan Development
3-1 2 Incident Response Team Roles
3-1 3 Incident Response Plan Testing
3-2 Incident Detection
3-2 1 Incident Detection Techniques
3-2 2 Incident Detection Tools
3-3 Incident Analysis
3-3 1 Incident Analysis Techniques
3-3 2 Incident Analysis Tools
3-4 Incident Response
3-4 1 Incident Response Techniques
3-4 2 Incident Response Tools
3-5 Incident Recovery
3-5 1 Incident Recovery Techniques
3-5 2 Incident Recovery Tools
4 Security Architecture and Tool Sets
4-1 Security Controls
4-1 1 Security Control Types
4-1 2 Security Control Implementation
4-1 3 Security Control Monitoring
4-2 Security Tools
4-2 1 Security Tool Categories
4-2 2 Security Tool Implementation
4-2 3 Security Tool Monitoring
4-3 Security Architecture
4-3 1 Security Architecture Concepts
4-3 2 Security Architecture Design
4-3 3 Security Architecture Implementation
5 Compliance and Assessment
5-1 Compliance Requirements
5-1 1 Compliance Standards
5-1 2 Compliance Audits
5-1 3 Compliance Reporting
5-2 Assessment Techniques
5-2 1 Assessment Methodologies
5-2 2 Assessment Tools
5-2 3 Assessment Reporting
5-3 Risk Management
5-3 1 Risk Management Concepts
5-3 2 Risk Management Techniques
5-3 3 Risk Management Tools
6 Software Development Security
6-1 Secure Coding Practices
6-1 1 Secure Coding Principles
6-1 2 Secure Coding Techniques
6-1 3 Secure Coding Tools
6-2 Software Development Lifecycle
6-2 1 SDLC Phases
6-2 2 SDLC Security Practices
6-2 3 SDLC Security Tools
6-3 Software Testing
6-3 1 Software Testing Techniques
6-3 2 Software Testing Tools
6-3 3 Software Testing Security
7 Security Operations
7-1 Security Operations Concepts
7-1 1 Security Operations Roles
7-1 2 Security Operations Processes
7-1 3 Security Operations Tools
7-2 Security Monitoring
7-2 1 Security Monitoring Techniques
7-2 2 Security Monitoring Tools
7-3 Security Incident Management
7-3 1 Incident Management Techniques
7-3 2 Incident Management Tools
7-4 Security Awareness Training
7-4 1 Security Awareness Training Concepts
7-4 2 Security Awareness Training Techniques
7-4 3 Security Awareness Training Tools
3-5 1 Incident Recovery Techniques

3-5 1 Incident Recovery Techniques

Incident recovery techniques are essential for restoring systems and operations after a security incident. The 3-5 1 approach is a structured method that focuses on three primary recovery actions, five secondary recovery actions, and one fallback recovery action. This layered approach ensures comprehensive recovery and minimizes downtime.

Key Concepts

1. Three Primary Recovery Actions

The three primary recovery actions are the core techniques used to restore systems and operations after a security incident. These actions are typically automated and provide immediate response capabilities.

a. System Isolation

System isolation involves disconnecting affected systems from the network to prevent the spread of the incident. This action helps contain the damage and allows for a controlled recovery process. For example, isolating a compromised server from the network prevents further data exfiltration.

b. Backup Restoration

Backup restoration involves restoring systems and data from known-good backups. This action ensures that the system is returned to a secure and operational state. For instance, restoring a database from a recent backup after a ransomware attack ensures data integrity.

c. Patching and Remediation

Patching and remediation involve applying security patches and fixing vulnerabilities that led to the incident. This action prevents future incidents of the same nature. For example, applying a critical security patch to a web server after a SQL injection attack prevents further exploitation.

2. Five Secondary Recovery Actions

The five secondary recovery actions complement the primary actions by providing additional layers of recovery. These actions are often manual or semi-automated and focus on specific areas of concern.

a. Incident Documentation

Incident documentation involves recording all details of the incident, including the timeline, affected systems, and response actions. This action helps in future analysis and compliance. For example, documenting a phishing attack includes details of the phishing email, affected users, and response measures.

b. User Notification

User notification involves informing affected users about the incident and any actions they need to take. This action ensures transparency and user awareness. For instance, notifying employees about a data breach and the steps to secure their accounts.

c. System Reconfiguration

System reconfiguration involves adjusting system settings to enhance security and prevent future incidents. This action includes hardening configurations and implementing additional security controls. For example, reconfiguring network firewalls to block known malicious IP addresses.

d. Security Training

Security training involves educating users and staff about security best practices and incident response. This action enhances overall security awareness. For example, conducting phishing awareness training after a successful phishing attack.

e. Incident Review

Incident review involves conducting a post-incident analysis to identify lessons learned and improve future response. This action helps in continuous improvement. For example, reviewing the response to a DDoS attack to identify areas for improvement in the incident response plan.

3. One Fallback Recovery Action

The fallback recovery action is a contingency plan that comes into play if the primary and secondary actions fail. This action is typically manual and relies on human intervention to recover systems and operations.

a. Manual Data Recovery

Manual data recovery involves manually reconstructing data from various sources if automated backups are unavailable. This action ensures data integrity and system functionality. For example, manually recovering customer records from email archives and shared drives after a catastrophic data loss.

Examples and Analogies

Consider a hospital as an example of an organization that needs to recover from a security incident. The three primary recovery actions are like isolating the affected ward to prevent the spread of an infection, restoring patient records from backups, and applying medical protocols to prevent future infections. The five secondary recovery actions are like documenting the outbreak, notifying patients and staff, reconfiguring the ward's hygiene protocols, conducting infection control training, and reviewing the response to improve future preparedness. The one fallback recovery action is like manually reconstructing patient records from various sources if electronic backups are unavailable.

By implementing the 3-5 1 incident recovery techniques, organizations can create a robust recovery framework that maximizes the chances of successful restoration and minimizes downtime.