8240 incident response planning v2 newlogo...target audience: all personnel 06.16.14 incident...

1
Overview: Develop, implement and maintain an incident response plan for the detecon and analysis, containment, eradicaon and recovery of security informaon. The incident response plan shall be tested annually. The incident response plan shall provide a roadmap for implemenng the agency’s incident response capability, define reportable incidents, and provide metrics for measuring the agency’s incident response capability. The incident response plan shall also describe the roles, responsibilies and communicaon strategies in the event of a compromise. Provide incident response training to state informaon systems users consistent with assigned roles and responsibilies. Potenal privacy incidents shall be invesgated upon awareness of loss of personally idenfiable informaon (PII). Affected pares will be nofied upon breach determinaon without unreasonable delay. Report an incident: - Advise your manager or supervisor - Open a cket: [email protected] - Call 602-364-4444, Opon 3 Purpose: Increase the ability to rapidly detect incidents, minimize any loss, migate weaknesses that were exploited, and restore compung services. Why it’s important: Personnel should know how to idenfy, report and escalate an incident for quick containment, and recovery. Helps to maintain the integrity of the informaon system and keep the system secure. Outlines the steps to remediate a data breach. Target audience: All personnel 06.16.14 8240 IT SECURITY POLICY 8240 IT SECURITY POLICY Incident Response Planning Incident Response Planning Information security management personnel shall be available on a 24x7 basis to respond to alerts. Automated alerts and reporting shall be incorporated in the system for intrusion detection, intrusion prevention and maintaining file integrity of the monitoring systems. Conducted annual tests using checklists, walk-throughs, simulations and exercises to determine incident response effectivenesss. State information system security incidents shall be monitored, tracked, analyzed, documented and distributed to appropriate personnel. Report security incidents within one hour of knowledge of the suspected incident. For more informaon about this IT Security Policy, contact [email protected]. 07.07.14 8

Upload: others

Post on 27-Jul-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 8240 Incident Response Planning V2 NewLogo...Target audience: All personnel 06.16.14 Incident Response 8240IT SECURITY POLICYIT SECURITY POLICY8240 Planning Incident Response Planning

Overview:

• Develop, implement and maintain an incident response plan for the detection and analysis, containment, eradication and recovery of security information. The incident response plan shall be tested annually.

• The incident response plan shall provide a roadmap for implementing the agency’s incident response capability, define reportable incidents, and provide metrics for measuring the agency’s incident response capability.

• The incident response plan shall also describe the roles, responsibilities and communication strategies in the event of a compromise.

• Provide incident response training to state information systems users consistent with assigned roles and responsibilities.

• Potential privacy incidents shall be investigated upon awareness of loss of personally identifiable information (PII). Affected parties will be notified upon breach determination without unreasonable delay.

• Report an incident:- Advise your manager or supervisor- Open a ticket: [email protected] - Call 602-364-4444, Option 3

Purpose:Increase the ability to rapidly detect incidents, minimize any loss, mitigate weaknesses that were exploited, and restore computing services.

Why it’s important:Personnel should know how to identify, report and escalate an incident for quick containment, and recovery. Helps to maintain the integrity of the information system and keep the system secure. Outlines the steps to remediate a data breach.

Target audience:All personnel

06.16.14

8240IT SECURITY POLICY

8240IT SECURITY POLICYIncident Response

PlanningIncident Response

Planning

Information security management personnel shall be available on a 24x7 basis to respond to alerts.

Automated alerts and reporting shall be incorporated in the system for intrusion detection, intrusion prevention and maintaining file integrity of the monitoring systems.

Conducted annual tests using checklists, walk-throughs, simulations and exercises to determine incident response effectivenesss.

State information system security incidents shall be monitored, tracked, analyzed, documented and distributed to appropriate personnel.

Report security incidents within one hour of knowledge of the suspected incident.

For more information about this IT Security Policy, contact [email protected].

07.07.14

8