On Mon, Jun 8, 2009 at 12:15 PM, Drexx Laggui
[personal]<[email protected]> wrote:
> 08Jun2009 (UTC +8)
>
> They all got good suggestions here. Do activate your company's
> Incident Response Plan.
>
> If you don't have one, and this is an ad hoc response, please
> *document* your every action before you start proceeding any further.
> Trust me, when a company does a post-mortem analysis later, sys admins
> get a lot of heat if upper management thinks they didn't respond well
> enough.

A good example of these would be post-mortem analyses of compromise
and intrusion reports of well-known FOSS projects.  Debian comes to
mind: in fact they do have some guidelines in their Securing HOWTO[1]
and their IRP for the 2003 compromise at wiggy's.[2]

[1]  
http://www.debian.org/doc/manuals/securing-debian-howto/ch-after-compromise.en.html
[2]  http://www.wiggy.net/debian/

-- 
Zak B. Elep  ||  zakame.net
1486 7957 454D E529 E4F1  F75E 5787 B1FD FA53 851D
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to