(1) The intended audience of this guide are: (2) This guideline document governs the actions required for reporting, responding and managing information security incidents involving (3) To ensure effective and consistent reporting and handling of such events, an incident response capability is necessary for rapid detection, to minimise loss and destruction, mitigate the weaknesses that were exploited, and to restore (4) Safe use of the (5) The intent of this guideline document is to provide a framework and procedures for managing and responding to information security incidents. Fostering a culture of proactive incident reporting and logging will help reduce the number of security incidents which go unreported and unnoticed, often without resolution. (6) This document provides guidance to the Information Incident Response Team (ISIRT) and associated stakeholders to better respond to information security events and incidents and provides a structured approach to: (7) Information Security Incident Management is a structured approach, and is composed of four major phases: (8) The first phase deals with preparing a team to be ready to handle an incident at short notice. Regardless of the cause of the incident, preparation is the most crucial phase, as it will determine how well the team will be able to respond to the event. (9) There are several key actions that must be taken care of while responding to an incident: (10) When an incident is reported or assigned to the IT Security team/ISIRT, the team must perform a detailed incident analysis and (11) The (12) Refer to the (13) Process steps: (14) The ISIRT shall perform an assessment of the incident priority using the factors in the table below. (15) Given the established priority, the incident will be allocated a Service Level which determines the timelines attached to next steps. (16) The ISIRT team shall ensure that the incidents are managed and responded to as per the below SLA. This SLA applies to the Incident Response commitments for all types of information security incidents. Incident response times vary according to the priority level assigned to the incident. (17) Based on the analysis of the incident category and classification, the information security incident can be addressed in the following ways: (18) Severe and Major category incidents will require escalation so that senior management within the (19) Refer to the Critical Incident Management Communication Procedure for escalation procedures to be followed for Severe and Major Category incidents. (20) This phase begins once the suspected event has been classified as a Confirmed Incident. This phase involves identifying the immediate response actions to deal with the information security incident and informing the appropriate team about the required actions. The primary objective is to confine any adverse impact to the (21) The department representative / incident handler shall manage this phase. Incident containment,eradication and recovery steps may vary based on the incident type, and the Incident Response Responsibility may be split over multiple teams which shall be managed and coordinated by the Incident Handlers. (22) Incident Handlers may require investigation expertise during the (23) An appropriate combination of the following actions must be used to complete this phase: (24) This phase takes place once the information security incident has been resolved or closed. (25) The Incident Handler(s) must document the actions taken during the process. If the incident involved support from external Investigators or Forensic Investigators, their steps and reports must also be documented and shared with the Incident Handler. (26) The Incident Handle shall collate the details and prepare the Closure report. (27) The Incident Handler is responsible for documenting an incident report which contains (at the minimum) the following information: (28) The completed incident report is shared with ISIRT team for review and approval. Once the incident report is approved, it is ready for circulation to relevant stake-holders report. (29) The IT Security Team (or a designated member of the Incident Response team) delivers recommendations for changes in technology, process or policy to appropriate stakeholders fo the development of a follow-up action plan. (30) Information security incident management activities are iterative, and thus, it is imperative that regular improvements are made to a number of information security elements over time. These improvements must be proposed on the basis of reviews of the information security incidents. (31) The primary function for tracking and managing incidents within the area of defined responsibility rests with this role. ISIRT team shall be the first responders to any incident that is reported. The responsibilities include the following: (32) The main responsibilities of the team are:Information Security Incident Management Guidelines
Section 1 - Guidelines
Audience
Executive Summary
Purpose
Top of PageSection 2 - Information Security Incident Management Process
Introduction
Phase 1: Preparation
Preparing to handle an Incident
Phase 2: Detection / Incident Analysis
Incident Categories
Category
Description
Unauthorised Access
Unauthorised and successful / unsuccessful logical access to the University’s ICT services and systems.
Denial of Service (DoS)
An attack that successfully prevents or impairs the normal authorised functionality of networks, systems or applications by exhausting resources. This activity includes being the victim of, or participating in, a DoS.
Malicious Code
Successful installation of malicious software (e.g. virus, worm, Trojan horse, or other code-based malicious entity) that infects the ICT services and systems.
Data Leakage
Security incident involving loss of the University’s critical information that can have a negative impact on the University.
Improper Usage
Investigation
Unconfirmed incidents that have been contained, that are potentially malicious or anomalous activity deemed by the ISIRT team that warrant further review.
Incident Prioritisation
Priority
Factor
Examples of Incidents
Severe
An incident effecting the entire organisation.
Major
An incident effecting multiple facilities, User Groups or networks.
Moderate
An incident effecting a facility or network.
Insignificant
Minor Incident
-Some localised inconvenience, but not impact to the University.
Incident Service Level Agreements (SLA)
Category
Notification
Contain / Remediate
Escalation Matrix
Severe
Immediate
8 hours
Risk Committee, Privacy Office, University Executive & CIO
Major
8 Hours
24 Hours
Risk Committee, Privacy Office & CIO
Moderate
24 Hors
5 Business Days
IT Security Team or ISIRT
Insignificant
N/A
N/A
N/A
Incident
Status
Reason
Confirmed
An incident has been confirmed and response is underway.
Disposition
Reason
Unidentified
A confirmed incident involving an ICT service or system which cannot be located may be resolved as Unidentified.
Transferred
A confirmed incident may be investigated and transferred to another department for further investigation or action.
Deferred
False Indicator
Investigation reveals that the source indicator used as the basis for incident detection was a faulty Indicator.
Misconfiguration
An event that appeared to be a malicious activity was subsequently proven to be a false alert and determined to be a misconfiguration (malfunction) of a system.
Duplicate
An incident may be a duplicate of another record in the Service Desk, and must be merged with the existing worfklow.
Escalation
Phase 3: Containment, Eradication and Recovery
Phase 4: Post-Incident Activity
Compile Summary of Actions and Findings
Closure Report
Submit Recommendations to Appropriate Management
Lessons Learnt
Section 3 - Roles and Responsibilities
ISIRT Team
Incident Handlers / Investigators
View Current
This is not a current document. To view the current version, click the link in the document's navigation bar.
Actions involving ICT services and systems that violate the Information Technology Conditions of Use Policy, e.g:
a. Downloading and/or using unauthorised security tools,
b. Use of peer to peer applications to acquire or distribute copyrighted material.
d. Mis-use of UON ICT services and systems.
-Business disruptions resulting from malicious activity that results in > 50% degradation.
-Any incident that impacts the availability of perimeter security infrastructure.
-Exposure of unencrypted, unmasked, or insufficiently masked University confidential or sensitive information (Health Data / PII) into the public domain. This includes any data that could have a negative impact on the University’s reputation.
-Compromised privileged account credentials.
-Incident involving Highly Critical assets .
->10% of University users unable to use IT resources.
-Potential for involvement of law enforcement.
-Active attack incidents by unknown attackers that impact the University’s servers.
-Exposure of unencrypted, unmasked, or insufficiently masked University confidential or sensitive information (Health Data / PII) into the public domain or to an unauthorised third party .
-Malware incidents that don’t fall in a higher severity.
-Data loss incidents not involving sensitive information.
-Confirmed phishing campaign that impacts more than 100 users.
A confirmed incident may be deferred due to resource constraints, or information type.
Note: Critical / High Priority cases cannot be deferred without CIO approval.