HP - Executive Breach Incident Response Playbook PDF
HP - Executive Breach Incident Response Playbook PDF
HP - Executive Breach Incident Response Playbook PDF
Executive breach
response playbook
How to successfully navigate the enterprise through a serious data breach
Introduction
No matter how effective the technical response to an enterprise data breach, its the executive
suite that drives the publics perception in times of crisis. In fact, it is the executive teams
leadership that will help guide the entire enterprise response after the breachwhich could
last for days, weeks, months, and even years depending on lawsuits and regulatory response.
Executive team to-do list
Prepare a data breach response plan.
Ensure the executive team can execute it.
Have a solid understanding of the situation.
Know what is at risk.
Plan responses and processes for all
constituencies.
Although its never easy to respond to something as challenging as a publicly disclosed data
breach, it can be done if the executive team gets the information they need in time. That is, if
the technical information is accurate and comprehensive enough to make effective decisions,
and all of the communication channels are in place and ready. Sounds straightforward, but its
not always. It takes executive leadership to make sure the resources and the plans are in place
to execute well. And it takes considerable practice. This playbook will help get you there.
In most organizations, senior leadership, including the CEO, are seriously underprepared for the
job. A recently HP-commissioned survey from the Ponemon Institute, The Importance of Senior
Executive Involvement in Breach Response, shows how systemic the challenge is at most
organizations: A startling 57% of CEOs have not been trained on what to do after a data breach,
and more than 70% of executives think that their organization only partially understands the
information risks theyre exposed to.
Theres a serious disconnect here. According to the Ponemon Institute report, The Importance
of Senior Executive Involvement in Breach Response, senior executives know that their
involvement in the incident response process is critical to successbut they dont believe
that they are accountable for data breaches. In this reports survey, 79% of respondents say
executive-level involvement is necessary to achieve a successful data breach response, while
70% believe board-level oversight is also crucial. Unfortunately, the same survey found that
only 47% are up to date on their internal data breach response processes, and only 45% think
they are actually accountable.
Perhaps most troubling is that only 44% believe that their own enterprises incident response
process is either proactive or mature.
Many great resources are available that are geared toward the technical response that
organizations must perform when faced with a data breach incident; however, little has been
written on how the executive team should prepare to respond. The goal of this paper is to help
fill that gap and provide executive leadership with the ideas and tools they need.
Perception. Priorities. Protection.
Figure 1. How prepared is your organization to deal with data breach?
35%
33%
30%
31%
25%
As figure 1 shows, senior executives believe the
current state of breach preparedness is more
reactive (immature) than proactive.
20%
15%
10%
17%
15%
4%
5%
0%
Level 1
Level 2
Level 3
Level 4
Level 5
Breach scenario #1: A large national retailers point-of-sale (POS) system is breached,
with millions of credit cards stolen
It all started simply enough. A virtual server crashed. It was only by luck that an observant
administrator noticed something strange within the error code. Eventually, the related logs
and an image of the virtual server made it to an internal security analyst, who identified the
problem: A small, mysterious piece of software was actually an exploit designed to breach an
inventory system that was connected to the retailers national POS network.
If credit card data files were breached, it would require a public disclosure. The breach was
too close to credit card data for comfort, and the preliminary forensics examination couldnt
determine if the attack was successful. Also, the potential credit card breach couldnt have come
at a worse time. A string of retail breaches had just been announced over the holiday period.
Tens of millions of people had been affected. As a result, the retailers credit card security was
all over the news. The press was not going to let go of this story.
Days later, the investigation into the log files still had not provided as clear a picture as the
digital forensics and incident response team would have liked. But it was determined that the
initial breach occurred at least three years ago.
The good news is that the most recent attack activity was thwarted. The bad news is that
although the complete attack trail isnt clear, the attackers did manage to access the POS
system and capture credit card payment data as it was being processed. It was not known what
other data may have been affected.
The appropriate law enforcement agencies will be notified soon. Now the executive team must
prepare for the public announcement to customers and shareholders. And they must give
employees the information they need to service customers and answer their questions in a way
that keeps morale high. In the meantime, the digital investigation teams will keep digging for
more details and facts that can be established.
Breach scenario #2: Contract manufacturer discovers its proprietary processes and
customer intellectual property stolen
An international contract manufacturer noticed an overseas competitor was producing product
in a way that precisely resembled its own. An analysis confirmed that the competitor was using
certain plans and even software code identical to what it was producing. If that wasnt bad
enough, the intellectual property of several of its customers had also been stolen somehow. If
the situation isnt handled properly, the manufacturer could be forced out of business.
Following a significant investigation, it became apparent that a disgruntled employee had
walked out with proprietary information on a flash drive. An investigation into the type of data
stolen, who had access to that scope of information, and other factors narrowed the list of
potential thieves to a few. When examining a number of employee laptops, it became clear
which laptop was used. Data from multiple servers were copied to the notebooks drive and
subsequently copied to a USB flash drive. Customers would have to be notifiedand so would
shareholders. A breach of this magnitude could drive away customerscurrent and future
and significantly impact revenue.
Triage
Respond
Lessons
learned
Incident
closing
Although the CISO or CSO owns the internal response, it typically is the CEO and executive
leadership that set the tone for the public response. To succeed, youll need a cross-functional
team that is comfortable working together. Usually this is a senior team that includes general
counsel, internal audit, human resources, and corporate communications. They all need to be
working in concert.
Heres the plan that must be in place and always ready to be put into action should a breach
disclosure become necessary:
Continuous monitoring and detectionYour IT and security teams are always on the lookout
for bad things to happen. IT security-related events are detected from many different internal
and external sourcesand early detection is the key to identifying and responding to an issue
not only quickly, but effectively. For executives, its important that when a breach that will require
a public disclosure is detected, the proper executives and internal resources must be notified.
The phases of the plan
Monitoring and detection
Triage
Respond
The triage phaseThis phase is intended to quickly analyze all available information so
that security events can be categorized and correlated. This way the organization can most
accurately determine the severity and prioritization of events, and assign the event to the
proper team(s) for remediation and response. Triage also provides a single point of contact for
answering technical questions that arise. The triage process is instrumental for coordinating the
technical response groups and creating your final response plan.
Incident closing
The respond phaseThe respond phase includes the steps taken to address, resolve, or
mitigate an incident. During this phase, you will need an incident coordinator who will conduct
overall response and direction. There are four classes of responses required for an incident:
Technical response. The technical response is designed to focus on the actions the technical
staff takes to analyze and resolve an event or incident. Technical staff includes the IT groups
required to assist with remediation of the event or incident. This phase can involve several
groups or departments within the IT organization to coordinate and provide technical actions
to contain, resolve, or mitigate incidents as well as the actions needed to repair and recover, if
necessary, affected systems or data.
Management response. The management response highlights activities that require some
type of management intervention, notification, interaction, escalation, or approval as part of
any response. It may include coordinating with corporate communications as it relates to any
human resources, public relations, financial accounting, audits, and compliance issues.
Communications response. These are activities that require some measure of communications
to the corporation and internal and external constituents. Corporate communications should
always be consulted prior to any communications being released. In many cases, management
will direct the release of breach information. This includes issues related to any human
resources, public relations, financial accounting, audits, and compliance issues.
Legal response. The legal response, if required, would work with outside regulators,
third parties, and other parties. In addition, their input would be required for any external
communications to assure that such communication is in accordance to company policy and
supports any statutory or regulatory requirements.
Incident closingAfter the incident has been contained, eradicated, or mitigated, it is critical
that your organization complete the collection of all of the information they can about the
incident and conduct an after-incident report. During the incident closing process, the incident
team must take steps to properly finalize all documentation, including all analytics and final
reports. Additionally, the incident team must take every precaution to preserve all information
obtained as part of this process using proper chain-of-evidence procedures, because this
information may be required in certain legal responses.
After this close-out process is complete, the incident coordinator will conduct a lessons-learned
session to identify efficiency improvements in either processes or techniques used for remediation.
Before an incident
Identify the individual owner and responsible party for all incidents.
Identify core team responsible for all incidents (including individuals from legal, corporate communications, and HR).
Ensure proper monitoring and tracking technologies are in place (such as rewalls, IPS, and anti-virus).
Provide media training to the proper individual(s).
Provide a company-wide process for employees, contractors, and third parties to report suspicious or suspected
breach activities.
Provide company-wide training on breach awareness, employee responsibility, and reporting processes.
During an incident
Record the issues and open an incident report.
Convene the core team.
Set up a technical bridge to discuss needs required to restore operations.
Set up a management bridge or communication schedule to provide updates to executive management.
Triage the current issues and communicate to executive management.
Identify initial cause and activate needed specialists to respond to the current issues to restore operations.
Retain any evidence and follow a strict chain of evidence to support any needed or anticipated legal action.
Communicate to aected third parties, regulators, and media (if appropriate)
After an incident
Update the incident report and review exactly what happened and at what times.
Review how well the sta and management performed in dealing with incident.
Determine whether or not the documented procedures were followed.
Discuss any changes in process or technology that are needed to mitigate future incidents.
Determine what information was needed sooner.
Discuss whether any steps or actions taken might have inhibited the recovery.
Determine which additional tools or resources are needed to detect, triage, analyze, and mitigate future incidents.
Discuss what reporting requirements are needed (such as regulatory and customer).
If possible, quantify the nancial loss caused by the breach.
Report ndings to executive management.
10
Learn more at
hp.com/enterprise/security
See the Ponemon Institute report, The Importance of Senior Executive Involvement in
Breach Response
11
Copyright 2014-2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only
warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein
should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
4AA5-5562ENW, January 2015, Rev. 1