4.9 KiB
4.9 KiB
Standard Operating Procedure: Security Incident Response
| Document ID | SOP-INC-001 |
|---|---|
| Title | Security Incident Response Procedure |
| Revision | 1.0 |
| Effective Date | [DATE] |
| Author | [AUTHOR] |
| Approved By | [APPROVER] |
| Department | IT Security |
1. Purpose
To establish a structured approach for detecting, responding to, containing, and recovering from security incidents to minimize impact and prevent recurrence.
2. Scope
This procedure applies to all security incidents including:
- Unauthorized access attempts
- Malware infections
- Data breaches
- Denial of service attacks
- Phishing attacks
- Lost or stolen devices
- Insider threats
- System compromises
3. Responsibilities
3.1 All Staff
- Report suspected incidents immediately
- Preserve evidence (do not turn off systems unless directed)
- Follow instructions from incident response team
3.2 IT Security Team
- Triage and classify incidents
- Lead response efforts
- Coordinate with stakeholders
3.3 Incident Response Manager
- Authorize containment actions
- Escalate to management as needed
- Coordinate external communications
4. Incident Classification
| Severity | Criteria | Response Time |
|---|---|---|
| Critical | Active breach, data exfiltration, ransomware | Immediate |
| High | Confirmed compromise, malware spreading | < 1 hour |
| Medium | Attempted intrusion, isolated malware | < 4 hours |
| Low | Policy violation, suspicious activity | < 24 hours |
5. Incident Response Phases
5.1 Phase 1: Detection and Reporting
Detection Sources:
- Security monitoring tools (SIEM, IDS/IPS)
- User reports
- Vendor notifications
- Audit findings
- Automated alerts
Reporting:
- Document initial observations
- Report via security hotline or email
- Complete FRM-INC-001 Incident Report
- Do NOT attempt remediation without guidance
5.2 Phase 2: Triage and Analysis
-
Initial Assessment
- Confirm incident is genuine (vs. false positive)
- Classify severity level
- Identify affected systems/data
- Determine initial scope
-
Evidence Collection
- System logs
- Network traffic captures
- Memory dumps (if warranted)
- Screenshots
- Preserve chain of custody
-
Escalation Decision
- Critical/High: Immediate escalation to management
- Notify legal/compliance if data breach suspected
- Engage external forensics if needed
5.3 Phase 3: Containment
Short-term Containment:
- Isolate affected systems from network
- Block malicious IPs/domains
- Disable compromised accounts
- Preserve evidence before changes
Long-term Containment:
- Apply temporary fixes
- Increase monitoring
- Implement additional controls
- Prepare for eradication
Containment Decision Matrix:
| Action | Authority Required |
|---|---|
| Isolate single workstation | Security Team |
| Disable user account | Security Manager |
| Block network segment | IT Director |
| Shut down production system | Executive approval |
5.4 Phase 4: Eradication
- Identify root cause
- Remove malware/backdoors
- Patch vulnerabilities exploited
- Reset compromised credentials
- Verify removal is complete
5.5 Phase 5: Recovery
- Restore systems from clean backups
- Rebuild if necessary
- Verify integrity before reconnecting
- Monitor closely post-recovery
- Confirm normal operations
5.6 Phase 6: Post-Incident Review
Conduct within 5 business days:
- Timeline reconstruction
- Root cause analysis
- Response effectiveness review
- Lessons learned
- Improvement recommendations
Documentation:
- Complete FRM-INC-002 Post-Incident Report
- Update procedures as needed
- Brief stakeholders
6. Communication Guidelines
Internal Communication
| Audience | Information | Method |
|---|---|---|
| Executive Team | Status, business impact, decisions needed | Phone/meeting |
| IT Staff | Technical details, actions required | Secure channel |
| All Staff | General awareness (if warranted) |
External Communication
- All external communications through designated spokesperson
- Coordinate with Legal and PR
- Regulatory notifications per compliance requirements
- Customer notifications per contract/law
7. Regulatory Notification Requirements
| Regulation | Notification Timeframe | Authority |
|---|---|---|
| HIPAA | 60 days (breach of >500) | HHS OCR |
| GDPR | 72 hours | Supervisory Authority |
| PCI DSS | Immediately | Card brands, acquirer |
| State Laws | Varies | State AG |
8. Related Documents
- FRM-INC-001 Incident Report Form
- FRM-INC-002 Post-Incident Report
- Contact list for incident response team
- Vendor/partner contact list
Revision History
| Rev | Date | Description | Author |
|---|---|---|---|
| 1.0 | [DATE] | Initial release | [AUTHOR] |