With businesses moving their operations online, cybersecurity risks are increasing by the day. According to GetApp’s 2020 Data Security survey, 35% of responding businesses faced a data breach last year, while 28% encountered a ransomware attack.
What would you do if you faced a similar attack? Do you have an action plan to respond to a data breach or cybersecurity incident? According to a report, only 26% of firms have a well-defined security response plan. If you are one of these companies, it’s time to strengthen your cyber defense.
In this article, we’ll discuss what a cybersecurity incident response plan is and how it benefits you. We’ll explain the five steps to create your incident response plan as well as provide some resources to help you get started.
A cybersecurity incident is any event that violates an organization’s IT security policies and puts sensitive data such as customers’ financial details at risk. Malware infections, DDoS attacks, ransomware attacks, unauthorized network access, insider attacks, and phishing are some common types of cybersecurity incidents.
A cybersecurity incident response plan is a set of instructions to help your staff members identify, respond to, and recover from cybersecurity incidents.
Most incident response plans include the security measures you should follow to prevent a cyberattack as well as the steps to take when you’re faced with an attack. They also outline the various steps your staff should follow immediately after an attack, such as informing stakeholders or reporting the incident to government officials.
Here are the key reasons you need a well-documented and regularly updated cybersecurity incident response plan.
With a cyber incident response plan, you and your team members will know what to do once a security incident is reported or communicated. Everyone will have a well-documented role and responsibility. You won’t have to give additional instructions to your team, so there’ll be no time lost or communication gaps.
In the event of a security incident, you’re supposed to follow many requirements, such as informing stakeholders and reporting the incident to authorities. A response plan will help you keep track of and comply with these requirements. For instance, consumer data protection law GDPR mandates that you report a security event within 72 hours of its occurrence, while financial information security standard PCI DSS requires you to have an incident response plan and test it at least annually.
A cybersecurity incident response plan is a written document that clearly states the steps you and your staff are supposed to follow when faced with a security breach. It’s approved by company management, which means you won’t have to rely on any unplanned decisions. A prepared response is more effective than an ad-hoc, chaotic response, especially in urgent situations such as identity theft.
Before we get started, remember that communication is key. To lay the groundwork for an incident response plan, Gartner finds that you need to ensure all stakeholders understand their responsibilities and agree on project expectations (full content available to clients).
Here are five broad Gartner-recommended steps to build a cybersecurity incident response plan that’ll help you identify, contain, remove, and recover from security incidents.
Create a document that lists the different cybersecurity threats your business is vulnerable to. This document will help you prepare different response strategies for different cyber incident types.
The below table lists some common types of cybersecurity incidents.
|Malware||Malicious software (viruses, worms, trojans, etc.) that gets unauthorized access to your systems and disrupts operations.|
|Distributed denial of service (DDoS)||Makes your online service (e.g., website) unavailable by overwhelming your server with more traffic than it can handle.|
|Phishing||A social engineering attack that dupes users to believe malicious emails as legitimate.|
|Web application attack||Attacks your web applications such as shopping carts, online forms, and word processors to gain access to your databases and steal sensitive information.|
|Insider threat||Current or former employees violating IT security policies to gain unauthorized access, leak confidential data, or damage systems.|
|Loss or theft of equipment||Lost or stolen company PCs, laptops, or mobile devices that can be misused to steal data or launch a full-fledged cybersecurity attack.|
Security incidents differ by magnitude and severity. A corrupted file on your employee’s laptop can be considered a low priority compared with a DDoS attack that can bring down your entire website. Determine the severity of every security incident to decide if it should be resolved on priority.
A good way to do that is assessing if the incident affects your data (makes it inaccessible, steals data, or results in data loss) or your ability to serve clients or run operations. Any incident that affects both data and operational security should be addressed on priority.
Use our security incident prioritization tool for the risk assessment of different security incidents. Mention how your operations and data are impacted (none, low, mid, or high), and the tool will automatically display if you should handle the incident on priority.
Also, set a time frame for resolving all identified incidents. High-priority incidents should ideally be resolved within two to six hours of detection, whereas low-priority incidents can be resolved within 24 hours.
An incident response plan will define the steps you should take to contain an attack. Have your plan in the form of a flowchart, so your incident response team members can quickly understand the threat mitigation path they need to follow.
Here’s a sample incident response flowchart.
Also, outline who’s responsible for completing each step mentioned on your incident response flowchart. Assign clear, non-conflicting responsibilities to your staff members, so there are no clashes or conflicts.
Use a responsible, accountable, consulted, and informed (RACI) chart to indicate who should be responsible for, accountable for, consulted on, or only informed about the different incident response steps. For example, your security manager will be responsible for maintaining incident records, accountable for technical operations, consulted on the preparation of the post-incident report, and informed about the overall coordination and liaison with regulatory authorities.
Here’s a sample RACI chart outlining the responsibilities of different members. You can download and customize the template per your needs. For example, if you don’t have an MSSP, your security manager will be the person responsible for all technical operations.
Having an incident response program alone isn’t enough. You need to test its effectiveness by conducting mock drills, which will also train and educate your employees about their role in security incident management. Here’s a red-team vs. blue-team exercise you can conduct as a mock-up.
Red-team vs. blue-team exercise is a cybersecurity mock drill modeled after military training courses. Your employees are split into two teams: red and blue. The red team tries to attack and break the blue team’s cyber defense, and the blue team tries to defend its internal networks and protect its systems and data.
The drill is conducted for a certain time period, say two hours, during which the red team uses various attack methods such as phishing, card cloning, and SQL scripting to exploit the blue team’s vulnerabilities and gain access to its systems. When the blue team detects an attack, it responds according to the steps mentioned in your incident response plan. You get an idea of how much time the response steps take and how effective they are. The exercise also lets you test the strength of your company’s current security posture.
Use the information collected from previous security incidents and mock drills to identify improvement opportunities and implement new controls for your security incident response plan (e.g., look for steps that can be automated).
Also, update your plan regularly to keep up with the changes in the threat landscape or to include details of any new security measures you’ve recently adopted. Revisit your response steps at least annually, and work on reducing the time you take to contain and recover from incidents.
Software tools can help you detect and mitigate security threats more effectively. They let you carry on with business operations even as incident response steps continue in the background. Here’s a list of some software tools you can consider using to improve your organization’s cybersecurity posture:
GetApp’s 2020 Data Security Survey was conducted from September 10 to September 11 among 868 respondents who reported full-time employment.