To handle a security event, you must first assess its impact and attack surface, identify any false positives, and perform immediate remediation. You can use recommended handling policies, update the event status, add items to a whitelist, or run playbooks to keep your system secure.
Security incident handling flowchart
Assess a security event
Before you handle a security event, you must assess its impact and attack surface and identify any false positives to avoid disrupting normal system operations. You can use the event details page to obtain information that helps with this assessment.
Go to the event details page
Log on to the Security Center console. In the upper-left corner of the console, select the region where your assets are located: China or Outside China.
In the navigation pane on the left, choose .
NoteIf you purchased the Cloud Threat Detection and Response (CTDR) service, in the navigation pane on the left, choose .
Select an Occurrence Time Range to find the security event.
ImportantThe Security Incident page displays events from the last 180 days only.
You can enable event notifications in . This lets you use information from the notifications, such as the event name, to quickly find the event.
In the Actions column, click Details to go to the event details page.
Methods and examples for assessing a security event
Assess an event's urgency, coverage, and whether it is a false positive using the and the information on the Overview, Timeline, Alert, and Entity tabs.
Overview area
Timeline
Alert
Entity
Response Activity
Handle a security event
Handling a security event involves handling malicious entities and their associated alerts. After you handle the entities and alerts, you must update the event status.
Use Recommended Handling Policy (Recommended)
Security Center provides event handling methods based on the experience of Alibaba Cloud security experts. These methods are called recommended handling policies. After you use a recommended handling policy to handle malicious entities in a security event, the event status and the status of its associated alerts are updated at the same time.
Not all entities support Use Recommended Handling Policy. If the Use Recommended Handling Policy panel is empty, it indicates that there are no built-in handling policies for the current entity.
Impact of the operation
This operation interacts with other Alibaba Cloud products for event response to handle malicious entities, for example, by blocking an IP address.
If you use the Use Recommended Handling Policy option to change an event's status to Handled, the system changes the status of all unhandled alerts associated with the event to Handled in the security incident. The event handling information is also added to the details of the alerts. Subsequently, new alerts are no longer associated with the current security event. Instead, they generate a new security event.
ImportantFor Cloud Workload Protection Platform (CWPP) "Precision Defense" alerts, the default status is "Handled" (defend only, no notification). Updating the security event status does not affect the status of these alerts.
If you use the Use Recommended Handling Policy option to change an event's status to Handling, the status of currently associated alerts is unaffected. You can still associate new alerts with the event.
Procedure
Go to the event details page. On the Entity tab, click Use Recommended Handling Policy.
NoteOn the Security Incident page, find the event. In the Actions column, click Response, or select Use Recommended Handling Policy.
In the Use Recommended Handling Policy panel, select the malicious entities that you want to handle.
(Optional) Modify the handling policy. In the Actions column for the entity, click Edit. In the Edit Policy panel, modify parameters such as the destination account and the action validity period for the blocking rule.
Action validity period: The period during which the handling policy is effective. The policy automatically becomes invalid after this period expires.
Destination account: The current account and manageable member accounts. For more information about how to manage member accounts, see Multi-account security management.
Click Confirm and update the incident status.. In the Update Incident Status dialog box, set Event Status to Handling or Handled, and then click OK.
ImportantAfter you complete this step, Security Center automatically creates a handling policy and executes a handling task. If the handling task fails, the event status changes to Failed. Otherwise, the event status changes to the status that you set here.
Handling: Indicates that in addition to the current handling operation, there are other actions related to event handling, such as immediate remediation, source tracing, and vulnerability fixing.
Handled: Indicates that there are no subsequent handling actions besides the current one. The impacts are as follows:
Updates the status of associated alerts to Handled in the security incident.
Subsequent alerts will generate a new security event and will no longer be associated with the current event.
Update the security event status
If you determine that an event is a false positive or if you have manually handled all associated security alerts and entities, you can change the event status to Handled.
Impact of the operation
The status of all unhandled alerts associated with the event is updated to Handled in the security incident. The event handling information is added to the alert details.
ImportantFor Cloud Workload Protection Platform (CWPP) "Precision Defense" alerts, the default status is "Handled" (defend only, no notification). Updating the security event status does not affect the status of these alerts.
Subsequent alerts are no longer associated with the current security event. They will generate a new security event.
Procedure
On the event details page, you can click the Incident Response drop-down list in the upper-right corner and select Update Incident Status. Alternatively, on the Security Events page, you can find the target event, click the Response drop-down list in the Actions column, and select Update Incident Status.
In the Update Incident Status dialog box, select Handled.
(Optional) Add a remark. You can add remarks such as 'I have handled this manually', 'Ignore', or 'Manually whitelisted'.
Add to a whitelist (alert whitelisting)
If Security Center generates alerts for normal program activities, you can add these alerts to a whitelist. This prevents Security Center from repeatedly generating alerts for normal programs or behaviors. Examples of normal activities that might trigger alerts include suspicious outbound TCP packets from a normal business process or scanning behavior from a normal network detection tool.
Impact of alert whitelisting
After an alert is whitelisted, notifications for the same or matching alerts will no longer be sent. Use this feature with caution.
For the current alert:
The current alert changes to "Handled", and the alert status is Manually Add to Whitelist.
If the same alert occurs again, a new alert will not be generated. Instead, the latest occurrence time of the current alert will be updated.
For subsequent alerts:
If you set a specific whitelist rule, Security Center no longer associates alerts that match this rule with the current event.
When an alert that matches a custom whitelist rule occurs again, it will automatically be added to the handled list with the status Automatically Add to Whitelist, and no alert notification will be sent.
For other alerts: A whitelist rule takes effect only for alerts with the specified alert name that meet the conditions. It does not affect other alerts for which no rules are set.
Procedure
Go to the event details page. On the Security Alerts tab, select the alert to whitelist and click Add Alert to Whitelist in the Actions column.
(Optional) Create a new alert whitelist rule. You can click Create Rule to configure multiple whitelist rules.
ImportantMultiple rules have an "AND" relationship, which means the rule takes effect only when all conditions are met.
Ensure the precision of the rules that you configure to avoid an overly broad scope. For example, setting "Path contains: /data/" might mistakenly whitelist other sensitive subdirectories, which increases security risks.
We recommend that you combine multiple conditions to set rules, such as "Path contains: /app/" and "Process name: test.exe", to achieve more refined whitelist management.
Each rule has four configuration boxes from left to right, as described below:
Alert information field: On the details page, under More Information, you can see which alert information fields are supported for the current alert.
Condition type: Supports operations such as regular expression matching, greater than, equal to, less than, and contains. Some rules are described as follows:
Regular expression: Use regular expressions to precisely match content with specific patterns. For example, to whitelist all content under the "/data/app/logs/" folder, you can set the rule "Path matches regex: ^/data/app/logs/.*$". This will match all files or processes in that folder and its subdirectories.
Contains keyword: Set a rule "Path contains: D:\programs\test\". All events whose paths contain this folder will be whitelisted.
Condition value: Supports constants and regular expressions.
Applicable assets:
All assets: Takes effect for newly added assets and all existing assets.
Only for the current asset: Takes effect only for the asset involved in the current alert.
Click OK.
Run Playbook
Based on the experience of Alibaba Cloud security experts, Security Center provides a set of built-in playbooks for handling malicious entities. Examples include host offline investigation, in-depth virus scanning, and interaction with WAF to block IP addresses.
Go to the event details page. On the Entity tab, find the entity that you need to process.
In the Actions column, click Run Playbook. On the run playbook configuration page, configure the playbook parameters as described below.
Playbook: The system automatically retrieves the corresponding built-in playbook based on the type of the current entity.
ImportantIf the built-in playbooks do not meet your needs, you can use the Response Orchestration feature provided by Threat Analysis and Response to create custom playbooks.
Action validity period: The period during which the playbook runs. The playbook will no longer be executed after this period expires.
Destination account: The current account and manageable member accounts. For more information about how to manage member accounts, see Multi-account security management.
Click OK.
Security hardening solutions
Upgrade Security Center
The Enterprise and Ultimate editions support automatic virus isolation to provide accurate defense. These editions support defense against common ransomware, DDoS Trojans, mining programs, trojans, malicious programs, backdoors, and worms. They also support more security check items.
Configure security groups for servers
The following are common security group configurations. If you use Alibaba Cloud ECS instances, see Manage security groups.
Allow only specified IP addresses to log on to your server using Remote Desktop Protocol (RDP) on port 3389 or SSH on port 22. This prevents hackers from scanning for or launching brute-force attacks on the management ports of your server.
In the security group, allow access only to required service ports, such as 80 and 443. Do not allow access to other ports.
For database ports, such as 1433, 3306, and 6379, allow access only from specified IP addresses. We recommend that you do not expose these ports to the internet.
Set complex server passwords
Create complex passwords that contain uppercase letters, lowercase letters, digits, and special characters. The passwords must be at least eight characters in length.
Upgrade software
Regularly upgrade applications to the latest versions. Do not use outdated software.
Create disk snapshots
Create snapshots for important servers periodically. If data is lost, deleted by mistake, or tampered with by hackers in an event such as a ransomware attack, you can use the snapshots to restore your data. If you use Alibaba Cloud ECS instances, see Create an automatic snapshot policy.
Fix vulnerabilities promptly
Use the vulnerability fixing feature of Security Center to fix high-risk system and application vulnerabilities promptly. Note: Before you fix a vulnerability, create a snapshot backup.
Reset the server system (use with caution).
If a virus deeply infects the system and is associated with underlying system components, we strongly recommend that you back up important data and then reset the server system. Follow these steps:
Create a snapshot to back up important data on the server. For more information, see Create a snapshot.
Initialize the operating system of the server. For more information, see Reinitialize a system disk.
Create a disk from the snapshot. For more information, see Create a data disk from a snapshot.
Attach the disk to the server on which the operating system was reinstalled. For more information, see Attach a data disk.
More operations
Export security event details
You can export security event details to a local Excel file. This facilitates cross-departmental collaboration in handling security events and improves internal information sharing and event tracking efficiency.
You can export up to 1,000 security event records. The exported file contains three tabs: a list of security event records, a list of assets involved in the security events, and a list of entities involved in the security events.
(Optional) On the Security Incident page, set filter conditions such as event risk level, status, and occurrence time.
Select the security events that you want to download and click the
icon in the upper-right corner of the security event list.After the file is exported, click Download to save the file to your local machine.
References
For more information about security alerts, see Overview of CWPP (Cloud Workload Protection Platform) security alerts and Analyze and handle security alerts.
For basic concepts of security events, see Overview of CWPP (Cloud Workload Protection Platform) security events and Overview of CTDR security events.
For the process of handling common mining programs, see Best practices for handling mining programs.
