An incident response policy establishes organizational guidelines for an incident management capability. This capability includes analyzing events, detecting incidents and determining an appropriate response.
The purpose of this blog is to:
Even the best security programs have gaps. It’s critical to respond when security breaches occur. Developing an incident response capability can reduce the impact of an incident. It can also help you document evidence and meet legal requirements.
The US code of federal regulations contains many references to incident management capabilities. Several of them mandate non-federal organizations to document and report incidents.
We found several sources that discuss this subject in great detail:
This blog is going to focus on the creation of an incident response policy. Policies often establish a set of objectives for the organization. In a separate blog, we discuss creating an incident response plan. The plan details how the organization implements their policy.
Both NIST publications cited above contain guidance for drafting an incident response policy. The other publications are helpful for documenting these components.
The policy elements cited in NIST SP 800-61 Rev 2 go well beyond the requirements listed in NIST SP 800-53 Rev 5. Each organization will tailor their own elements into their policy.
For our template, we opted to incorporate those headings with bold font in the venn diagram. We cover handoff & escalation points in our incident response plan. We tailored out the organizational structure as it is specific to each organization.
Management should understand and approve all policies. By signing a policy, management commits to the content contained within the policy.
We wrote a short statement summarizing the commitment from management:
Effective incident response is essential to ensuring the fulfillment of our mission. We recognize that disruptive events have the potential to impact our business operations. If we cannot prevent all risks, we must remain prepared to manage their consequences.
We commit to having a functional incident response capability. This capability includes detecting, containing, and recovering from security incidents. To meet these goals, we have identified the roles and responsibilities required. We have documented the prioritization of incidents based on their criticality. We will measure our performance and strive to improve over time.
A more detailed incident response plan supplements this policy.
_______________________
Authorized Organization Official
The purpose section of a policy should describe what the policy sets out to do. If you’re struggling to write the purpose section, start with the objectives section. Once you've written our the objectives, look to summarize them as the purpose of the policy.
Our purpose statement reads:
The purpose of our incident management capability is to establish processes. These processes govern how we identify and analyze events to detect incidents. They also govern how we categorize and prioritize incidents. These processes help us determine and document an appropriate organizational response.
When writing our objectives, we wanted traceability to the incident response plan. Our objectives stem from the mission statements for our five main workflows.
For example, the prepare workflow includes two mission statements:
We combined these into a single statement as our first goal. The others come from the workflows for protection, detection, triage, and response.
The objectives section of the policy reads:
We recognize the need to establish a multilayered approach to protect critical assets. We have defined organizational and technical approaches to manage computer security incidents. The key requirements and objectives include:
To create and improve a formalized cybersecurity incident response team (CSIRT) capability.
Scope refers to the parts of your organization that this policy applies to. Scope can include organizations, individuals, technology assets, or facilities. We drafted our policy with the following scope:
The scope includes employees with access to organizational data and systems.
A policy is a great place to define terms.
Here are some of the terms we defined in our policy:
Technical Information - data associated with incidents. May include hostnames, IP addresses, malware, precursors and indicators, and vulnerabilities exploited.
The Good Practice Guide for Incident Management details mandatory and optional roles. These roles serve to group together tasks performed within the incident management function. For larger organizations, many individuals or teams may fill a role. For smaller organizations, a single individual may fill many roles.
Here are the roles and responsibilities we defined:
The Forum of Incident Response and Security Teams (FIRST) manages a list of categories. There are a couple reasons organizations should classify incidents. First, certain categories may warrant higher sensitivities and more restricted communications. Second, having discrete categories allows for more detailed analysis of performance.
Here are the categories we used in our policy:
The FIRST incident categories relate to a sensitivity classification table. Here is how we introduced the sensitivity matrix in our policy:
Incident managers apply the “need to know” when communicating case details. The sensitivity matrix classifies cases according to sensitivity levels.
The policy should document approved contacts at outside organizations. Here is how our policy address coordination among entities:
The legal department has approved sharing specific information with external organizations.
Several internal departments coordinate through the incident response process. Below is a table of key internal contacts involved in incident response:
Our incident Response Plan documents each group's involvement throughout the process.
NIST SP 800-61 discusses three factors relevant to prioritizing incidents. These factors include the functional and information impacts and the recoverability effort. Here is our formatting of the prioritization section of our policy:
The functional and information impacts as well as the recoverability effort determine prioritization. The following tables detail the categories of each factor:
Functional Impact of the Incident - categorizes the negative impact to business functions.
Information Impact of the Incident - categorizes the effect on the organization's data. The information impact categories are not exclusive (except for "none").
Recoverability Effort of the Incident - categorizes the resources required to recover.
We calculate Business Impact by combining the functional and information impacts. We determine criticality as a function of the business impact and recoverability effort. We assign criticality levels using the CSIRT criticality matrix:
The policy should give authority to confiscate equipment and to track activities. Having only procedures that list these specific functions is insufficient . Here is how we addressed this section in our policy template:
Staff operating within CSIRT roles have the authority to track suspicious activity. Some roles also have the authority to confiscate or disconnect equipment.
There are two common compliance requirements for reporting incidents. We have listed both in our sample policy and detailed the requirements for each.
To comply with the HIPAA Breach Notification Requirements , following a breach of unsecured protected health information, we commit to:
To adhere to the DoD Cyber Incident Reporting requirements, we commit to:
Incident data has the potential to provide several measures of success. Here is how we addressed this section in our policy:
We collect and store actionable incident data to provide measures of performance. These metrics include: