Document Feedback - Review and Comment
Step 1 of 4: Comment on Document
How to make a comment?
1. Use this to open a comment box for your chosen Section, Part, Heading or clause.
2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.
3. Do not open more than one comment box at the same time.
4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.
Important Information
During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will recieve a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:
-
DO NOT jump between web pages/applications while logging comments.
-
DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.
-
DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments. The system will email you a copy of your comments so you can identify where you were up to and add to them later.
-
DO NOT exit from the interface until you have completed all three stages of the submission process.
(1) This document describes the (2) While cyber security incidents are managed by personnel in incident response roles, all users of the (3) This procedure addresses the four phases of cyber incident response which are preparation; detection and analysis; containment, eradication, and recovery; and post-event activity. (4) This procedure sits within the (5) All (6) In the context of this document the following definitions apply: (7) Common types of cyber security incidents are described in Table 1. (8) The following clauses describe the relationship between cyber security incident management and Digital Technology Solutions (DTS) and critical incident management. (9) The DTS Incident Management team is responsible for incidents causing a significant deterioration, degradation, or disruption to a digital service or (10) The Cyber Security team is responsible for cyber security incident management, which runs in conjunction with the DTS incident management process. (11) If, during a standard DTS incident investigation, DTS (12) If it is determined that an incident is not cyber security-related, the Cyber Security team will discontinue its participation in the DTS incident response process. (13) Major and significant incidents require immediate escalation to the Incident Communications Lead, who is responsible for the DTS Critical Incident Management process. (14) The DTS Critical Incident Management process interfaces with the (15) Significant incidents impacting critical infrastructure as defined by the Security of Critical Infrastructure Act 2018, must be reported to the Australian Cyber Security Centre (ACSC) within 72 hours of detection by the Associate Director, Cyber Security and IT GRC via cyber.gov.au. (16) Data breaches affecting privacy and (17) Cyber security incident response has four phases that comprise the following activities: (18) The (19) To assist with the technical aspects of an incident, the Incident Lead may seek advice from external organisations such as the Australian Cyber Security Centre (ACSC), Australian Signals Directorate (ASD), Australian Security and Intelligence Organisation (ASIO), AusCERT, CERT Australia, vendors, and service providers. (20) If an Incident Lead communicates with external parties, the Traffic Light Protocol (TLP) should be used. The TLP is an industry standard for sharing sensitive information. (21) The (22) The initial phase involves preparing personnel who hold incident response roles and making tools and resources available for use during an incident. (23) Preparation activities that enable the Incident Lead to respond to an incident include: (24) A cyber security incident begins when a cyber security-related event is reported. Events are reported through a range of channels including an automated system diagnostic, an incident ticket submitted to the DTS Service Desk, or an email sent to the Cyber Security team. (25) The following steps are undertaken as part of incident detection and analysis: (26) Each Incident Category has an associated priority level. The Incident Priority reflects the timeframe for communicating with relevant stakeholders and for containing the incident. Incident priority levels are described in Table 5. (27) The Incident Lead is responsible for ensuring incidents are managed in accordance with their priority level, and for escalating major and significant cyber security incidents to the Incident Communications Lead within the defined timeframes. (28) Once notified the Incident Communications Lead is responsible for exercising the DTS Critical Incident Management Guide. (29) Phase 3 begins once the suspected event is classified as a Confirmed Incident. The Incident Lead manages and coordinates this phase. (30) The primary objective is to confine any adverse impact to the (31) Strategies to contain, eradicate and recover from the incident vary based on the type of the incident, and responsibilities may be shared by multiple teams who report to the Incident Lead. (32) Incident Leads require investigation expertise to effectively identify the root cause and impact of an incident. Alternatively, Incident Leads can engage third parties with the appropriate skills to perform investigations. (33) An appropriate combination of the following actions must be undertaken to complete this phase: (34) Post-incident activities commence once an incident is resolved or closed and include a post incident review and the development of an incident closure report. (35) The Incident Lead conducts a post incident review workshop with relevant stakeholders and any external parties involved in the incident response. The review will reflect on the: (36) The Incident Lead documents the findings and actions from the post incident review within a closure report. The closure report must contain the following information: (37) The completed report is shared with the Chief Digital & Information Officer for review and approval. (38) The Incident Lead delivers the incident closure report to appropriate stakeholders and communicates follow-up actions. (39) The Cyber Security team is responsible for reviewing the operational effectiveness of the incident response capability which includes the people, process, organisation, support, technology, and training for incident response. (40) At a minimum, the incident response capability should be tested at least annually by engaging a third party or by running internal exercises. (41) The Cyber Security team is responsible for coordinating the implementation of recommendations from incident response tests, incident closure reports and feedback from DTS. (42) As managers of the (43) The Cyber Security team sits within DTS and is responsible for the protecting the (44) The Incident Lead is responsible for coordinating and managing the response to an incident which includes: Cyber Security Incident Management Procedure
Section 1 - Introduction
Purpose
Scope
Audience
Definitions
Common Types of Cyber Security Incidents
Table 1 – Common Types of Cyber Security Incidents
Top of Page
Incident Type
Description
Compromised credentials
A password used to login to
Unauthorised access
Any unauthorised access to the
Denial of Service (DoS) and Distributed Denial of Service (DDoS)
A system or service is overwhelmed with traffic to the point where the system or service is unavailable. This can occur maliciously or due to inadequate capacity planning.
Phishing
Deceptive messages are received by
Ransomware
A type of malware used to lock or encrypt victims’ files until a ransom is paid.
Malware
Installation of malicious software such as a virus, worm, Trojan horse, or other code-based malicious entity on a digital
Data breach
Unauthorised access and disclosure of information.
Improper use of digital
Loss or theft of device with
A physical device used to undertake
Section 2 - Relationship with Digital Technology Solutions and Critical Incident Management
DTS Incident Management
Critical Incident Management
Section 3 - Cyber Security Incident Management Process
Table 2 – TLP Classifications and University Data Classifications
University Data Classification
TLP Classification
Highly Restricted
RED
Restricted
AMBER
X-in-Confidence
GREEN
Public
WHITE
Phase 1: Preparation
Preparing to handle an Incident
Phase 2: Detection and Incident Analysis
Table 3 – Incident Status
Status
Description
Confirmed
Event/incident analysis activities confirm that an incident has occurred, and a response is underway.
Disposition
Reason
Unidentified
Event/incident analysis activities are unable to locate an incident. The incident is deemed Resolved-Unidentified.
Transferred
Event/incident analysis activities confirm that an incident occurred and the incident is transferred to another business unit for further investigation or action.
Deferred
Event/incident analysis activities confirm that an incident occurred however incident response activities are deferred due to the low impact of the incident or due to resource constraints. Critical and High priority cases cannot be deferred without approval from the Chief Digital & Information Officer.
False Indicator
Event/incident analysis activities show that the indicators of the incident were false positives.
Misconfiguration
Event/incident analysis activities show that the event was caused by system misconfiguration or malfunction.
Duplicate
Event/incident analysis activities show that the incident is a duplicate of another record in the Service Desk and is merged with the existing workflow.
Table 4 – Incident Category
Incident Category
Impact
Examples
Major
An incident affecting the entire University.
Significant
An incident affecting multiple facilities, user groups or campuses.
Escalated
An incident affecting a facility or campus.
Normal
Minor incident
- Incidents resulting in some localised inconvenience. No significant impact to the
Incident Category
Incident Priority
Notification Timeframe*
Containment / Remediation Timeframe
Stakeholders to notify
Major
1
Immediate notification
Within 8 hours
Significant
2
Within 1 hour
Within 24 hours
Escalated
3
Within 8 hours
Within 3 business days
Normal
4
Not applicable
Not applicable
- Not applicable
Any incident impacting PII or PHI
1
Immediate notification
24 hours
*timeframe begins when a cyber security incident is confirmed through the detection and analysis.
Phase 3: Containment, Eradication and Recovery
Phase 4: Post-Incident Activity
Continuous Improvement
Section 4 - Roles and Responsibilities
DTS Staff
Cyber Security Team
Incident Lead