incident-response.mdā¢2.49 kB
# Security Incident Response Procedure
## Incident Severity Levels
### š¢ LOW (P4)
- **Definition**: Minimal business impact, no data compromise
- **Response Time**: 24 hours
- **Examples**: Failed login attempts, minor policy violations
- **Notification**: IT security team
### š” MEDIUM (P3)
- **Definition**: Limited data exposure, contained impact
- **Response Time**: 4 hours
- **Examples**: Malware detection, unauthorized access attempt (blocked)
- **Notification**: Security manager, affected department
### š HIGH (P2)
- **Definition**: Significant data exposure or system compromise
- **Response Time**: 1 hour
- **Examples**: Successful unauthorized access, data exfiltration attempt
- **Notification**: CISO, department heads, legal
### š“ CRITICAL (P1)
- **Definition**: Major breach, widespread impact, regulatory implications
- **Response Time**: Immediate (15 minutes)
- **Examples**: Mass data breach, ransomware, system-wide compromise
- **Notification**: C-suite, board, legal, PR, regulators
## Response Phases
### 1. DETECTION & IDENTIFICATION
- Monitor security alerts and anomalies
- Validate incident authenticity
- Determine severity level
- Document initial findings
### 2. CONTAINMENT
**Short-term Containment**
- Isolate affected systems
- Block malicious IPs/domains
- Disable compromised accounts
- Preserve evidence
**Long-term Containment**
- Apply security patches
- Rebuild compromised systems
- Implement additional controls
- Maintain business operations
### 3. ERADICATION
- Remove malware/threats
- Close security gaps
- Patch vulnerabilities
- Validate system integrity
### 4. RECOVERY
- Restore systems from clean backups
- Verify system functionality
- Monitor for re-infection
- Gradual return to normal operations
### 5. POST-INCIDENT
- Conduct lessons learned session
- Update security controls
- Improve detection capabilities
- Document incident fully
- Update response procedures
## Contact Information
- **Security Operations Center (SOC)**: [24/7 hotline]
- **CISO Office**: [Email/Phone]
- **Legal Department**: [Email/Phone]
- **PR/Communications**: [Email/Phone]
## Do's and Don'ts
### DO
ā
Report incidents immediately
ā
Preserve evidence
ā
Document everything
ā
Follow established procedures
ā
Communicate clearly
### DON'T
š« Panic or make hasty decisions
š« Delete or modify evidence
š« Attempt to handle alone
š« Communicate publicly without approval
š« Resume operations without validation