Question: Scenario 4 : Compromised Database Server On a Tuesday night, a database administrator performs some off - hours maintenance on several production database servers. The
Scenario : Compromised Database Server
On a Tuesday night, a database administrator performs some offhours maintenance on several
production database servers. The administrator notices some unfamiliar and unusual directory names
on one of the servers. After reviewing the directory listings and viewing some of the files, the
administrator concludes that the server has been attacked and calls the incident response team for
assistance. The teams investigation determines that the attacker successfully gained root access to the
server six weeks ago.
The following are additional questions for this scenario:
What sources might the team use to determine when the compromise had occurred?
Response: eg SIEM logs MSSP logs Change Management tickets
How would the handling of this incident change if the team found that the database server had
been running a packet sniffer and capturing passwords from the network?
Response: eg AdministrativePrivileged and nonadministrative account passwords would be
changed for all employees.
How would the handling of this incident change if the team found that the server was running a
process that would copy a database containing sensitive customer information including personally
identifiable information each night and transfer it to an external address?
Response: eg Notify appropriate authorities, ie local PD of potential PII exposure, notify impacted
employees of potential exposure
How would the handling of this incident change if the team discovered a rootkit on the server?
Response: eg Server would be removed from production environment for forensic evidence
collection. All servers would be scanned for identified rootkit. BCP process would be executed for
impacted server.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
