Sample IR Policy
Sample IR Policy
Sample IR Policy
No:
Cybersecurity Policy
Updated: 01/07/2022
1.0 Purpose
This policy outlines the general steps for responding to computer security incidents and
includes a standardized process flow,
(1) identifying the incident response (IR) stakeholders and establishes their roles
and responsibilities;
(2) describing incident triggering sources, incident types, and incident severity
levels;
(3) including requirements for annual testing, post-incident lessons-learned
activities, and collection of IR metrics for use in gauging IR effectiveness.
To ensure consistent security of the Nation through the response to cyber security
incidents by the Ministry Departments and Agencies (MDAs), allowing the
investigations, remedies, reports and response to cyber security incidents and data
breaches.
1.1 Goals
The goals of IR, as outlined in this policy, are to:
Confirm whether an incident occurred;
Provide a defined incident notification process;
Promote the accumulation and documentation of accurate information;
Establish required controls and standards for monitoring, incident reporting and
handling with clearly defined roles and responsibilities for proper retrieval and
handling of evidence;
Contain the incident and stop any unwanted activity quickly and efficiently;
Protect national systems while preventing disruption to government services
and network operations;
Provide accurate reports and useful recommendations to management; and
Prevent and/or mitigate future incidents from occurring.
3.0 Scope
This policy applies to
1– 2– 3– 4– 5– 6–
Preparation Identification Containment Eradication Recovery Lessons-
Learned
Step 1: Preparation
Activities associated with this step include establishing IR teams; updating IR tools,
policies, procedures, forms and checklists; and ensuring IR communication procedures
and IR stakeholder contact lists are accurate and up-to-date. An entity must have a
defined and up to date Contact List and establish multiple communication channels with
all entities and individuals on the IR Contact List.
1
Based on the SANS Institute Incident Handling Step-by-Step
https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy
Escalation Procedures
During an incident, clear and effective communication is critical. Escalation procedures
should address all lines of communication in the event an incident occurs. This includes
not only internal communication but external communications as well, when
appropriate. Communication should flow through all involved IR stakeholders so that
everyone has the necessary information to act and carry out their responsibilities in a
timely manner. Notification must be made as soon as possible but should not delay the
entity from taking appropriate actions to isolate and contain the effects of anything that
threatens the confidentiality, integrity and availability.
Each entity must have an IR escalation procedure that consists of
(1) an escalation matrix
(2) an up-to-date contact list with alternate contacts
(3) multiple communications channels
This step focuses on containing the threat to minimize damage. It is during this step that
information is collected to determine how the attack took place. All affected systems
within the enterprise should be identified so that containment (eradication and recovery)
is effective and complete.
Incident containment involves ‘stopping the bleeding’ and preventing the incident from
spreading. Containment can be accomplished by isolating infected systems, blocking
suspicious network activity, and disabling services among other actions. Containment
varies for each incident depending on the severity and risk of continuing operations.
Entity leadership makes decisions regarding containment measures based on
recommendations from the Accounting Officer.
Step 4: Eradication
Eradication involves removing elements of the threat from the affected systems or
network. Specific eradication measures depend on the type of incident, the number of
systems involved, and the types of operating systems and applications involved.
Eradication measures include but are not limited to reimaging infected systems and
enhanced monitoring of system activity. Remediation includes the repair of affected
systems and services, addressing residual attack vectors against other systems,
communication and instructions to affected parties and an analysis that confirms the
threat has been contained.
If the ACCOUNTING OFFICER or Privacy Officer reasonably believes that an exposure
of regulated data may have occurred, the ACCOUNTING OFFICER or Privacy Officer
will contact the Office of the General Counsel to provide situational information in
determining a proper response.
Analysis of information collected is an iterative process known as the after-action
analysis and occurs/reoccurs during both the containment and eradication phases.
Step 5: Recovery
Once the root cause of an incident has been eradicated, the recovery phase can begin.
The goals of this step are to:
(1) remediate any vulnerabilities contributing to the incident (and thus prevent future
incidents) and
(2) recover by restoring operations to normal.
At this phase, affected systems are returned to normal operation, hardened to prevent
similar future incidents, and heighten monitoring for an appropriate period of time.
Recovery activities must include rebuilding systems from trusted images/gold
standards, restoring systems from clean backups and replacing compromised files with
clean versions.
IR Metrics
Category Measurement Description
Incidents # Total Incidents / Year Total amount of incidents responded to per
year
5.0 Compliance
This standard shall take effect upon publication. Compliance is expected with all
government policies and standards. Policies and standards may be amended at any
time.
If compliance with this standard is not feasible or technically possible, or if deviation from
this policy is necessary to support a business function, entities shall request an
exception through the Accounting Officer exception process.
5.1 Compliance Measurement