IT Security Incident Response Procedure
IT Security Incident Response Procedure
IT Security
IT Security
Incident Response Procedure
Version 1.1
Contents
1. Purpose ........................................................................................................................................... 3
2. Definitions ....................................................................................................................................... 3
3. Scope ............................................................................................................................................... 4
4. IT Security Incident Response Workflow ........................................................................................ 4
5. Incident Response Procedure ......................................................................................................... 5
Step 1. Detection ............................................................................................................................ 5
Step 2. Investigation....................................................................................................................... 5
Step 3. Containment....................................................................................................................... 7
Step 4. Data Protection Incidents ................................................................................................. 7
Step 5. Restoration ......................................................................................................................... 7
Step 6. Review & Improvement .................................................................................................... 8
6. Communication ............................................................................................................................... 8
7. Revision History .............................................................................................................................. 8
1. Purpose
This purpose of the procedure is to define the roles, responsibilities and the process for the
investigation and response to IT security incidents. The goal of this procedure is to ensure that all IT
security incidents are handled in a consistent and efficient manner, in line with the following
objectives:
2. Definitions
IT Security is the team is responsible for coordinating and supporting the response to an IT Security
event or incident. Depending on the priority of the incident, IT Security may request assistance from
service owners, members of the IT Leadership Group or external IT Security Professionals when
responding to security incidents or events.
IT Security Event is any observable occurrence to an IT system or electronic information, which does
not represent an immediate or serious threat to the University electronic information or computer
assets. For example, an unsuccessful social engineering attack, endpoint protection software
blocking malware, network firewall preventing brute force password attacks, malicious emails
marked as spam, etc.
IT Security Incident is any unauthorized activity that harms or represents a serious threat to the
confidentiality, integrity or availability of the University’s electronic information, information
systems or computer assets. For example, a compromised email account, successful spear phishing
attack, critical web vulnerability such as SQL Injection or Cross Site Scripting, etc.
Service Owner is the individual or group accountable for a specific IT system or service within the
University regardless of where the technology component resides.
Information or Data means any electronic information including personal data, communications and
logs held in any University IT supported service or device whether it is provided directly by a
University department or is managed by a third party on behalf of the University.
3. Scope
This IT Security incident response procedure applies to all IT systems, either locally or centrally
administered, including University approved cloud services, all devices that access the University’s
computer network or any electronic device that stores University information.
While mainly intended to address breaches to University IT policies, this procedure applies to any IT
security incident involving the University’s digital information or the University’s computer assets,
including network, servers, IT record management systems, etc.
Out of Scope
Incidents relating to system availability or performance which are not due to or result in an IT
security incident are outside the scope of this procedure.
Data breaches which are not related to an IT Security incident should be reported to the University
Data Protection Office as outlined in “UCD’s Guidelines on Reporting Personal Data Incidents”.
Step 1. Detection
Potential incidents are identified using information from various sources, including but not limited to
the following:
Examples of IT Security incidents covered by this procedure include but are not limited to:
Step 2. Investigation
Once an IT security problem has been detected, IT Security will analyse the situation in order to
confirm whether it is a security incident or a minor event.
If the problem is categorized as a minor event, the IT security will review the event with the
customer and decide what actions need to be taken before closing the event.
If the problem is categorized as a security incident, the IT security team will contact the Service
Owner to start an investigation to help determine the priority of the Incident, what information or
systems are at risk and agree what steps are necessary to contain and recover from the incident.
Depending on the priority and scale of the incident, IT Security may contact members of the IT
Leadership Group (ITLG) or request assistance from an external IT Security company to review and
investigate the incident.
If the incident has a significant impact on the availability or performance of a Tier 0, 1 or 2 service,
the ITLG team may decide to invoke the “Major Incident Response Plan” as outlined in IT Services
Major Incident Management Planning, Response and Communications” procedure.
Incident Priority
Incident Priority and classification is based on whether an incident poses a threat to The
University’s IT assets, Information, community or IT systems. The determination may include,
but is not limited to, the following factors:
Incident priorities categorized as “Critical” or “High” are referred to the IT Leadership group for
review. All other incidents are handled by IT Security and the Service Owner in accordance with
established practices. Further assessment may affect a reassignment to a different level of
priority by the IT Security team.
High Campus-wide and a potential public impact. A successful breach has occurred and/or a
threat has manifested itself. A very successful attack that is difficult to control or counteract
because no countermeasures, resolution procedures or bypass exist. Personal or confidential
data may be involved. High priority incidents are recorded as a priority 3 incident in “Service
Now”
Medium: The threat and impact are limited in scope, e.g. a department-wide not campus-wide.
Examples may include early indications of a possible attack or intrusion detected with minimal
risk to systems or information. Medium priority incidents are recorded as a priority 4 incident in
“Service Now”
Low: An event with no effect on system operations. Intelligence received concerning threats to
which systems may be vulnerable. Penetration or denial of service attacks attempted with no
impact. No critical infrastructure is affected. Solutions or countermeasures are readily available.
Procedures are available and well-defined to resolve the problem. No protected information is
involved. Low priority events are recorded as a priority 4 event in “Service Now”
Step 3. Containment
Once a security incident has been positively identified, IT Security will work with the Service Owner
to isolate the affected equipment, system or account in order to prevent secondary threats, such as
attacks on other internal systems, phishing emails, network disruption, etc.
In line with the University’s Acceptable Use Policy, any system or account that is deemed to be a risk
to the University’s information or is actively causing harm, either to internal IT assets or external
parties will have its IT service withdrawn.
The IT Security Team may undertake additional forensic or containment actions, including reviewing
system logs, configuration, user settings, user activity, network logs, device forensics, etc. in order to
help identify the root cause of the incident.
Step 5. Restoration
On receiving notice of an incident, the Service Owner for the affected information asset is
responsible for resolving the issue. This includes but is not limited to changing passwords,
reformatting media, patching, updating or reinstalling software, running scans and taking
appropriate remediation action or taking other steps as needed to remove the threat and prevent
similar compromises in the future.
Service Owners are expected to follow any specific protocols or recommendations cited in the notice
and to document any actions they take to resolve the problem. This includes following established
procedures for proper evidence collection, handling and storage; problem identification,
remediation and mitigation; incident reporting and documentation, etc.
Once a system is secured, the Service Owners must notify the IT Security team of what actions were
taken to eradicate the threat and provide the team with all related information, including root
cause, copies of system logs, malware reports, etc. discovered during their investigation.
If the IT Security team are confident that appropriate action has been taken to eliminate the
problem, approval will be given for the service to continue, such as allowing the device back on the
network, enabling IT accounts, etc.
At the conclusion of serious incidents, the IT Security team and Service Owner may hold a debriefing
to review lessons learned and to make recommendations of any changes to this procedure and
related procedures if appropriate.
6. Communication
The Service Owner is responsible for ensuring that each step of the incident management procedure
is communicated to all impacted customers, business owners and if required, senior University
management. If an incident involves IT Services managed systems, the Service Owner will coordinate
all customer communications through the IT Services Communications team.
7. Revision History
This procedure is updated and reviewed on a regular basis.