Incident Response Policy
Purpose
To ensure that Information Technology (IT) properly identifies, contains, investigates, remedies, reports, and responds to computer security incidents.
Reference
National Institute of Standards and Technology (NIST) Special Publication (SP):
- NIST SP 800-53a
- Incident Response (IR), NIST SP 800-16, NIST SP 800-50, NIST SP 800-61, NIST SP 800-84, NIST SP 800-115
Policy
This policy is applicable to all departments and users of IT resources and assets.
INCIDENT RESPONSE TRAINING
The
entityshall:a. Provide incident response training to information system users consistent with assigned roles and responsibilities:
i. Within
entity defined time periodof assuming an incident response role or responsibility.ii. When required by information system changes, and
entity defined frequencythereafter.b. Incorporate simulated events into incident response training to facilitate effective response by personnel in crisis situations.
c. Employ automated mechanisms to provide a more thorough and realistic incident response training environment.
INCIDENT RESPONSE TESTING
The
entityshall:a. Test the incident response capability for the information system
entity defined frequencyusingAssignment: entity defined teststo determine the incident response effectiveness and documents the results.b. Coordinate incident response testing with entity contacts responsible for related plans such as Business Continuity Plans, Contingency Plans, Disaster Recovery Plans, Continuity of Operations Plans, Crisis Communications Plans, Critical Infrastructure Plans, and Occupant Emergency Plans.
INCIDENT HANDLING
The
entityshall:a. Implement an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery.
b. Coordinate incident handling activities with contingency planning activities.
c. Incorporate lessons learned from ongoing incident handling activities into incident response procedures, training, and testing/exercises, and implements the resulting changes accordingly.
INCIDENT MONITORING
The
entityshall:a. Employ automated mechanisms to assist in the tracking of security incidents and in the collection and analysis of incident information.
INCIDENT REPORTING
The
entityshall:a. Require personnel to report suspected security incidents to the incident response capability within
entity defined time period.b. Report security incident information to
entity defined authorities.INCIDENT RESPONSE ASSISTANCE
The
entityshall:a. Provide an incident response support resource, integral to the incident response capability that offers advice and assistance to users of the information system for the handling and reporting of security incidents.
INCIDENT RESPONSE PLAN
The
entityshall:a. Develop an incident response plan that:
i. Provides the entity with a roadmap for implementing its incident response capability.
ii. Describes the structure of the incident response capability.
iii. Provides a high-level approach for how the incident response capability fits into the overall entity.
iv. Meets the unique requirements of the entity, which relate to mission, size, structure, and functions.
v. Defines reportable incidents.
vi. Provides metrics for measuring the incident response capability within the entity.
vii. Defines the resources and management support needed to effectively maintain and mature an incident response capability.
viii. Is reviewed and approved by
entity defined personnel or roles.b. Distribute copies of the incident response plan to
entity defined incident response personnel (identified by name and/or by role).c. Review the incident response plan
entity defined frequency.d. Update the incident response plan to address system changes or problems encountered during plan implementation, execution, or testing.
e. Communicate incident response plan changes to
entity defined incident response personnel (identified by name and/or by role).f. Protect the incident response plan from unauthorized disclosure and modification.
Compliance
Employees who violate this policy may be subject to appropriate disciplinary action up to and including discharge as well as both civil and criminal penalties. Non-employees, including, without limitation, contractors, may be subject to termination of contractual agreements, denial of access to IT resources, and other actions as well as both civil and criminal penalties.
Policy Exceptions
Requests for exceptions to this policy shall be reviewed by the Chief Information Security Officer (CISO) and the Chief Information Officer (CIO). Departments requesting exceptions shall provide such requests to the CIO. The request should specifically state the scope of the exception along with justification for granting the exception, the potential impact or risk attendant upon granting the exception, risk mitigation measures to be undertaken by the IT Department, initiatives, actions and a time-frame for achieving the minimum compliance level with the policies set forth herein. The CIO shall review such requests and confer with the requesting department.