]# Forensic Analysis
[[Forensic Analysis]] is a [[Incident Containment]] capability. Forensic analysis involves the systematic examination of digital evidence to identify, preserve, analyze, and present facts about cyber incidents. It is best developed when aligned with incident response plans, considering compliance requirements, and becomes operationalized when it can be used to support legal proceedings and improve security measures. As a process, it also provides the basis for understanding the scope and impact of security breaches. Forensic analysis aids in root cause analysis, allowing for incidents and control failures to be tr
## Map
``` mermaid <!-- element style="width:90%; height:auto" -->
graph TD
Top[[Cybersecurity]] --- E[[Incident Containment]]
E --- E.1[[Alert Correlation]]
E --- E.2[[Case Management]]
E --- E.3[[Incident Management]]
E --- E.4[[Forensic Analysis]]
E --- E.5[[Asset Restoration]]
E --- E.6[[Abuse Reporting]]
E --- E.7[[Failure Tracing]]
%% Class Definitions
%% =====================
class Top,A,A.1,A.2,A.3,A.4,A.5,A.6,B,B.1,B.2,B.3,B.4,B.5,C,C.1,C.2,C.3,C.4,D,D.1,D.2,D.3,D.4,D.5,E,E.1,E.2,E.3,E.4,E.5,E.6,E.7 internal-link,font-color:white;
class Top cssClassL0;
classDef cssClassL0 fill:black,stroke:black,stroke-width:4px,font-size:15px,font-color:white;
class A,B,C,D,E cssClassL1;
classDef cssClassL1 fill:darkblue,stroke:darkblue,stroke-width:4px,font-size:15px,font-color:white;
class A.1,A.2,A.3,A.4,A.5,A.6,B.1,B.2,B.3,B.4,B.5,C.1,C.2,C.3,C.4,D.1,D.2,D.3,D.4,D.5,E.1,E.2,E.3,E.4,E.5,E.6,E.7 cssClassL2;
classDef cssClassL2 fill:blue,stroke:blue,stroke-width:4px,font-size:15px,font-color:white;
class E.4 cssClassCurrent;
classDef cssClassCurrent fill:#2f9503,stroke:#2f9503,stroke-width:4px,font-size:15px,font-color:white;
```
## Definition
>[!success] Definition
>**Forensic Analysis** provides a method for examining digital evidence to uncover details about a cyber incident, how to contain it, supporting legal proceedings, and improving security measures.
## **Goals**
> [!cm-goal] Goal 1
> **Identify Evidence** - Develop a systematic approach to identify and collect digital evidence related to cyber incidents.
> [!cm-goal] Goal 2
> **Preserve Evidence Integrity** - Ensure the integrity and chain of custody of digital evidence to support legal proceedings.
> [!cm-goal] Goal 3
> **Complete Incident Analysis** - Perform detailed analysis to understand the scope, impact, and how to contain the incident.
> [!cm-goal] Goal 4
> **Support Legal Actions** - Provide accurate and reliable evidence to support legal actions and compliance requirements.
> [!cm-goal] Goal 5
> **Improve Security Posture** - Use findings from forensic analysis to enhance security measures and prevent future incidents.
## Scope
Forensic analysis applies to all incidents for systems and workers within the organization that require detailed review and analysis to comply with regulations or support legal proceedings.
## Process
```mermaid
flowchart LR
A1[Incident Detection] --> B[1. Evidence Collection]
A2[Compliance Requirements] --> B
A3[Threat Intelligence] --> B
B --> C[2A. Preserve Evidence]
B --> D[2B. Analyze Evidence]
B --> E[2C. Report Findings]
C --> F[4. Support Legal Actions]
D --> F
E --> F
F --> G[5. Stakeholders]
```
## Metrics
> [!cm-metric] Metric: [[% of Incidents with Preserved Evidence]]
> [!cm-metric] Metric: [[% of Forensic Analyses Leading to Legal Actions]]
## Inspiration & Resources
+ [NIST SP 800-86, Guide to Integrating Forensic Techniques into Incident Response](https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-86.pdf)
+ [Forensic investigation environment strategies in the AWS Cloud | AWS Security Blog (amazon.com)](https://aws.amazon.com/blogs/security/forensic-investigation-environment-strategies-in-the-aws-cloud/)
+ [Cybersecurity 101: The criticality of event logs | CSO Online](https://www.csoonline.com/article/558935/cybersecurity-101-the-criticality-of-event-logs.html)
+ https://www.nist.gov/programs-projects/digital-forensics
+ https://www.nist.gov/digital-evidence
+ https://www.sans.org/job-roles-roadmap/digital-forensics-incident-response/
+ https://www.digital-detective.net/digital-forensics-documents/ACPO_Good_Practice_Guide_for_Digital_Evidence_v5.pdf
+
##
[Cyber City Map](https://cybercitymap.com/) © 2023-2024 by [ThirdScore, Inc.](https://thirdscore.com/) All Rights Reserved.