10. Incident Response Planning

Incident Response Planning

ND545 C3 L4 A06 Incedent Response Strategies And Plan Part 1 V3

Overview

Prepare to plan or plan to fail. Creating a straight forward incident response plan that stakeholders can follow is critical. The goal of the plan is to equip the company with the information and resources needed to detect and respond to limit consequences of malicious, unintentional, or circumstantial cyber attacks.

Common elements of a incident response planning process include:

  • Establishing roles and contact information

  • Outlining notification steps

  • Creating an incident procedure checklist

  • Determining how to categorize and prioritize incidents

  • Providing guidance on business continuity and disaster recovery triggers and steps

  • Provisions for continuous improvement process

How do you know when you need to use the incident response plan?

The incident response plan usually gets activated when there is a credible indicator of compromise or confirmed incident. Here are key terms to know:

  • Event: Any observable occurrence in an information system.

  • Indicators of compromise (IoC): A known signal that suggests a potential event is indeed an incident.

  • Incident: An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.

Plan Activation

Incident response plans are typically activated when there is a credible indicator of compromise or a known incident occurring within the organization. When determining activation triggers, it's important to distinguish events from incidents, as well as define what incident types and severities warrant plan activation.

ND545 C3 L4 A06 Incedent Response Strategies And Plan Part 2

Key Takeaway Events are every day activities that are monitored for any signs that suggest something suspicious is happening. Those suspicious signs are called indicator of compromise (IoC). When an IoC is confirmed, it typically get's labelled an incident. It's important to then understand which incidents, usually based on impact or severity level, require activation of the incident response plan.