MI Sample CyberSecurity Incident Response Plan
MI Sample CyberSecurity Incident Response Plan
MI Sample CyberSecurity Incident Response Plan
DATE
Version 1.0
NOTE: The following Incident Response Plan is intended to provide an example of how a
policy and plan can be written. It is not intended to cover all possible situations. Each agency
must evaluate their unique circumstances and incorporate those into their plan. The plan is not
intended to be a “fill in the blank” plan. If an agency chooses to simply fill in the blanks, the
plan may not be sufficient to cover the agency’s unique requirements during a security incident
and could potentially cause the agency additional harm.
This document was created from existing cyber response plans that were in use at several
COMPANY. Names were removed and replaced with *Our Organization*.
Please share your plan and experiences with colleagues to help improve these tools.
Use this with the accompanying Incident Response Planning Companion to Sample IR Plan
PowerPoint presentation to guide your organization’s development of a cyber response plan.
*Our Organization* Cyber Incident Response Plan 2
Table of Contents
SUMMARY......................................................................................................................................3
*Our Organization* CYBER INCIDENT RESPONSE PLAN.......................................................4
1.0 Introduction............................................................................................................................4
1.1 Purpose of the Cyber Incident Response Plan...............................................................................4
1.2 General Purpose of the Cyber Incident Response Team...............................................................4
1.3 Operational Objectives of the Cyber Incident Response Team.....................................................4
2.0 Incidents.................................................................................................................................4
2.1 Incident Categories........................................................................................................................4
3.0 Responding to an incident......................................................................................................5
3.1 Organization..................................................................................................................................6
3.2 Escalation Levels...........................................................................................................................7
3.3 Escalation Considerations..............................................................................................................8
3.4 The Cyber Incident Response Process...........................................................................................8
3.5 Cyber Incident Response Team Roles and Responsibilities..........................................................8
3.6 Special Circumstances.................................................................................................................11
4.0 Post incident.........................................................................................................................11
4.1 Cyber Incident Coordinator and Response Management............................................................11
4.2 Extended Team............................................................................................................................12
Appendix A. Cyber Incident Response Team................................................................................13
Appendix B: Incident Response Diagram and Examples..............................................................14
Threat Example 1: Server Software Vulnerability.....................................................................15
Escalation Level Low Severity..........................................................................................................15
Escalation Level Medium Severity....................................................................................................15
Post Incident......................................................................................................................................15
Threat Example 2: Ongoing Phishing Attack on Employees.....................................................17
Escalation Level Low Severity..........................................................................................................17
Escalation Level Medium Severity....................................................................................................17
Escalation Level High Severity.........................................................................................................17
Post Incident......................................................................................................................................19
Threat Example 3: Stolen Asset, Leaked Confidential Information..........................................20
Escalation Level Low Severity..........................................................................................................20
Escalation Level Medium Severity....................................................................................................20
*Our Organization* Cyber Incident Response Plan 3
SUMMARY
The elements of a traditional Information Security effort continue to be important and useful.
Two trends necessitate the establishment of a Cyber Incident Response Plan:
1) Information Technology is widespread throughout *Our Organization*; *Our Organization*
relies heavily on Information Technology and cannot afford denial of service.
2) *Our Organization* IT systems and networks are at much higher risk to threats such as
computer viruses, intrusions, and exposures.
These situations can cause *Our Organization* to face unnecessary expense in productivity,
significant damage to systems, and damage to our reputation. Clearly, the need now exists to
take action prior to suffering the consequences of a serious IT security problem.
*Our Organization* Cyber Incident Response Plan 4
2.0 Incidents
2.1 Incident Categories
An incident will be categorized as one of four severity levels. These severity levels are based on
the impact to *Our Organization* and can be expressed in terms of financial impact, impact to
services and/or performance of our mission functions, impact to *Our Organization*’s image or
impact to trust by *Our Organization*’s customers, etc. Table 1 provides a listing of the severity
levels and a definition/description of each severity level.
*Our Organization* Cyber Incident Response Plan 5
3.1 Organization
To adequately respond to an intrusion or incident, predetermined teams will participate
depending on the incident characteristics. As the situation develops and the impact becomes
more significant, the various teams will be called to contribute. Figure 1 depicts the Cyber
Incident Response organization.
Main Response Support
Cyber Incident Extended
Response Team
Management
Administrative
Support
Cyber Incident
Response
Coordinator
Communications /
Media Team
The escalation process will be invoked to involve appropriate resources as the incident has more
impact (severity level increases). Incidents should be handled at the lowest escalation level that
is capable of responding to the incident with as few resources as possible in order to reduce the
total impact, and to keep tight control. Table 4 defines the escalation levels with the associated
team involvement.
1. Continue to monitor all known sources for alerts looking for further
information or actions to take to eliminate the threat,
2. Continue reporting status to the Cyber Incident Response Coordinator for
the chronological log of events,
3. Monitor effectiveness of actions taken and modify them as necessary,
4. Provide status to Cyber Incident Response Coordinator and Cyber
Incident Response Management on effectiveness of actions taken and
progress in eliminating the threat.
viii. Extended Technical Team
1. Continue actions to eradicate the threat as directed by Cyber Incident
2. Response Coordinate and Cyber Incident Response Management and the
Technical Operations team.
3. Continue to report actions taken, number of personnel etc. to the Cyber
Incident Response Coordinator for the chronological log.
ix. Administrative Support Team
1. Provide administrative support to all persons and teams involved in
incident
g) Document lessons learned and modify the Cyber Incident Response Plan accordingly.
INCIDENT COORDINATOR
1. Receives and tracks the status of the vulnerability.
2. Does not escalate the threat to Level High Severity, since the vulnerability has
not manifested itself.
COMMUNICATIONS TEAM
1. Since employee action is not required, no message to employees is necessary.
Post Incident
CYBER INCIDENT RESPONSE MANAGEMENT
1. Prepare a report for *Our Organization* Executive Management to include:
2. Provides the chronological log and any system audit logs requested by the
Extended Team.
3. Documents any lessons learned and modifies the Cyber Incident Response Plan
accordingly.
EXTENDED TEAM
1. Not needed, because there was no manifestation of the vulnerability.
*Our Organization* Cyber Incident Response Plan 17
2. Escalates the threat to Level High Severity, since it has manifested itself.
COMMUNICATIONS TEAM
1. A message is composed to all employees and sent system-wide.
Additionally, all departmental managers are alerted to the phishing scam and
asked to notify all employees in person immediately.
2. Alerts the Cyber Incident Response Support Team of the phishing attack.
4. Receives status from the Technical Operations Team regarding the status of
employee education. Reports the status to the Cyber Incident Response
Management.
5. Starts a chronological log of the events, including logs of emails and, if possible,
logs of users accessing the offending website.
2. Notifies the Extended Technical Team team of the above actions that are
required.
3. Reports actions taken and status to the Cyber Incident Response Coordinator.
2. Reports the actions taken, the number of personnel involved etc. to Cyber
Incident Coordinator for the chronological log.
COMMUNICATIONS TEAM
1. Carries out the education of *Our Organization* employees by informing them of
the incident and making sure everyone is aware of the scam as deemed
appropriate by Cyber Incident Response Management.
Post Incident
CYBER INCIDENT RESPONSE MANAGEMENT
*Our Organization* Cyber Incident Response Plan 19
a. Estimate of the impact of addressing the phishing attack and the potential
cost of not doing so,
2. Provides the chronological log and any system audit logs requested by the
Extended Team.
3. Documents any lessons learned and modifies the Cyber Incident Response Plan
accordingly.
EXTENDED TEAM
1. Legal works with the authorities to present any information relating to the
phishing party.
2. Escalates to Level High Severity, because the threat has manifested itself.
COMMUNICATIONS TEAM
1. Employee action is going to be required for the internal information security
practices audit. The Communications Team notifies employees of the data
breach and the actions that are going to be taken to prevent such a leak in the
future.
2. Alerts the Cyber Incident Response Support Team of the data leak.
4. Receives status of the information security audit from the Technical Assessment
Team and reports to Cyber Incident Response Management.
5. Starts a chronological log of events from the origin of the data to determine how
the data ended up in a situation where it could be leaked. The chronological log
will be used to support possible follow on legal action as determined by *Our
Organization*’s General Counsel and Executive Directors.
2. Notifies Extended Technical Team of the plan to audit and augment data security
practices internally, including any technical measures that will need to be put
into place to that end.
3. Reports actions taken and status to the Cyber Incident Response Coordinator.
2. Determines that escalation Level High Severity is not sufficient and escalates the
incident to Level 3.
COMMUNICATIONS TEAM
1. Messages *Our Organization* employee population informing them of the
information leak and the ensuing legal action, as deemed appropriate by Cyber
Incident Response Management.
Escalation Level 3
CYBER INCIDENT RESPONSE MANAGEMENT
1. Directs the Cyber Incident Response Support team to:
c. Initialize an incident voice mail box where status messages can be placed
to keep *Our Organization* personnel statused.
2. Alerts the Extended Team of the incident notifying them of the Severity Level.
3. Determines when the risk has been mitigated to an acceptable level after the
comprehensive information security data protection audit and overhaul.
EXTENDED TEAM
1. Contacts local, state, and federal authorities.
3. Ensures that all needed information is being collected to support legal action
against the leaker and financial restitution for those affected by the breach of
their personal information by *Our Organization* personnel.
2. Posts numbered status messages in the incident voice mail box for statusing
*Our Organization* Executive Management Team (if applicable).
COMMUNICATION TEAM
1. Messages *Our Organization* population as directed by Cyber Incident Response
Management regarding the status of the information security data practices audit
and any forthcoming changes to be made to policy.
2. Continues reporting status to the Cyber Incident Response Coordinator for the
chronological log of events.
2. Continues to report actions taken, number of personnel etc. to the Cyber Incident
Response Coordinator for the chronological log.
Post Incident
CYBER INCIDENT RESPONSE MANAGEMENT
1. Prepare a report for *Our Organization* Executive Management to include:
a. Estimate of the impact of addressing the data leak and the potential cost
of not doing so,
2. Provides the chronological log and any system audit logs requested by the
Extended Team.
3. Documents any lessons learned and modifies the Cyber Incident Response Plan
accordingly.
EXTENDED TEAM
1. Legal works with the authorities to present any information relating to the
leaking party that may lead to prosecution.
Action Plan
Action Description
Requestor
Assignee
Time Frame
Status
Conclusion / Summary
*Our Organization* Cyber Incident Response Plan 26
Entities Notified
Resolution Include whether lost materials recovered as part of the solution