UBC Incident Response Plan



Similar documents
IT Security Incident Response Protocol McGill University

California State University, Chico. Information Security Incident Management Plan

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

University of Colorado at Denver and Health Sciences Center HIPAA Policy. Policy: 9.2 Latest Revision: 04/17/2005 Security Incidents Page: 1 of 9

Data Security Incident Response Plan. [Insert Organization Name]

Information Technology Services Information Security Incident Response Plan

Computer Security Incident Response Team

Information Incident Management Policy

How To Audit The Mint'S Information Technology

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

IT Security Incident Management Policies and Practices

Computer Security Incident Response Team

Network Security Policy

Responsible Access and Use of Information Technology Resources and Services Policy

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Threat Management: Incident Handling. Incident Response Plan

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology

Policy Title: HIPAA Security Awareness and Training

AASTMT Acceptable Use Policy

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

SB 1386 / AB 1298 California State Senate Bill 1386 / Assembly Bill 1298

Incident Response Plan for PCI-DSS Compliance

Stellenbosch University. Information Security Regulations

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

Incident Categories (Public) Version (Final)

INFORMATION TECHNOLOGY SECURITY STANDARDS

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

USM IT Security Council Guide for Security Event Logging. Version 1.1

Incident Reporting Guidelines for Constituents (Public)

Harvard University Payment Card Industry (PCI) Compliance Business Process Documentation

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Computer Security Incident Reporting and Response Policy

DBC 999 Incident Reporting Procedure

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Data Management & Protection: Common Definitions

Credit Card (PCI) Security Incident Response Plan

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

Information Technology Cyber Security Policy

Decision on adequate information system management. (Official Gazette 37/2010)

Bradley University Credit Card Security Incident Response Team (Response Team)

How are we keeping Hackers away from our UCD networks and computer systems?

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

Incident categories. Version (final version) Procedure (PRO 303)

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Reducing the Cyber Risk in 10 Critical Areas

How To Protect Decd Information From Harm

The intended audience is system administrators, Directors, and Department Heads.

UBC Incident Response Plan V1.5

Payment Card Industry (PCI) Data Security Standard

University System of Maryland University of Maryland, College Park Division of Information Technology

Penetration Testing Service. By Comsec Information Security Consulting

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

IT Security Procedure

Welcome to part 2 of the HIPAA Security Administrative Safeguards presentation. This presentation covers information access management, security

School of Computer Science and Engineering policy with regard to self-administered computers

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS

DEPARTMENT OF MENTAL HEALTH POLICY/PROCEDURE

Information Technology Policy

Top tips for improved network security

Working Practices for Protecting Electronic Information

Business & Finance Information Security Incident Response Policy

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

Information Technology Security and Privacy Incident Response and Reporting Procedures

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

PCI Security Scan Procedures. Version 1.0 December 2004

A Decision Maker s Guide to Securing an IT Infrastructure

Data Management Policies. Sage ERP Online

<COMPANY> P01 - Information Security Policy

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Information Security Incident Management Guidelines

ULH-IM&T-ISP06. Information Governance Board

How To Protect A Network From Attack From A Hacker (Hbss)

Infocomm Sec rity is incomplete without U Be aware,

Incident Object Description and Exchange Format

Network Security Policy

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Introduction. PCI DSS Overview

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

UCF Security Incident Response Plan High Level

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)

Hardware and Software Security

Ohio Supercomputer Center

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

DANCERT RFC2350 Description Date: Dissemination Level:

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

Rotherham CCG Network Security Policy V2.0

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Incident Response Team Responsibilities

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Information Technology Acceptable Use Policy

How To Ensure Network Security

ELECTRONIC INFORMATION SECURITY A.R.

Information Security Policy

Global Partner Management Notice

Transcription:

UBC Incident Response Plan Contents 1. Rationale... 1 2. Objective... 1 3. Application... 1 4. Definitions... 1 4.1 Types of Incidents... 1 4.2 Incident Severity... 2 4.3 Information Security Unit... 2 4.4 CSIRT Coordinator... 2 4.5 Computer Security Incident Response Team (CSIRT)... 2 4.6 Cardholder Data Environment (CDE)... 3 5. Reporting a Computer Security Incident... 4 6. Managing the Security Incident... 4 6.1 All Incidents... 4 6.2 Medium and Severe Incidents... 4 6.3 Severe Incidents... 5 7. Closing the Incident... 5 8. Managing Rogue Access Points... 6 9. Summary of Incident Response Plan... 6

1. Rationale Centralised notification and control of security incident investigation is necessary to ensure that immediate attention and appropriate resources are applied to control, eliminate and determine the root cause of events that could potentially disrupt the operation of the university or compromise university data. 2. Objective The goal of this plan is to: Identify accountability for responding to computer security incidents Ensure appropriate escalation Ensure effective administrative response to computer security incidents Streamline the response process Secure and protect data in order to minimise the organisational impact of a computer security incident 3. Application This plan applies to computer security incidents that affect UBC s information technology facilities, infrastructure or data assets, including but not limited to servers, workstations, firewalls, routers, and switches. 4. Definitions A computer security incident, for the purposes of this plan, includes events where there is suspicion that: Confidentiality, integrity or accessibility of UBC data has been compromised Computer systems or infrastructure has been attacked or is vulnerable to attack 4.1 Types of Incidents Security incident types include but are not limited to: Malicious code attacks - attacks by programs such as viruses, trojan horse programs, worms, rootkits, and scripts to gain privileges, capture passwords, and/or modify audit logs to hide unauthorised activity. 1

Unauthorised access - includes unauthorised users logging into a legitimate account, unauthorised access to files and directories, unauthorised operation of sniffer devices or rouge wireless access points. Disruption of services - includes erasing of programs or data, mail spamming, denial of service attacks or altering system functionality. Misuse - involves the utilization of computer resources for other than official purposes. Espionage - stealing information to subvert the interests of a corporation or government entity. Hoaxes - generally an e-mail warning of a nonexistent virus. Unusual Events includes erratic and persistent unusual system behaviour on desktops, servers or the UBC network. Inexplicable lock out of user accounts or the existence of a strange process running and accumulating a lot of CPU time. 4.2 Incident Severity Incidents will be classified by the CSIRT Coordinator based on the perceived impact on university resources: Minor -incidents for which there are routine solutions. Sensitive information has not been exposed or accessed by unauthorised parties. Medium - incidents that do not have routine solutions but are limited in scope and consequences. Severe - incidents that involve significant personal data leakage, compromised institutional data, or that impacts a significant number of users, all of which has significant consequences 4.3 Information Security Unit The Information Security Unit led by the Information Security Officer (ISO), reports to the Chief Information Officer (CIO), and has responsibility for the IT security infrastructure on campus. 4.4 CSIRT Coordinator The CSIRT Coordinator is part of the Information Security Unit, and is charged with managing an incident. 4.5 Computer Security Incident Response Team (CSIRT) A CSIRT is assembled by the ISO, and is drawn as appropriate, from the following groups (or their delegates): Enrolment Services 2

Human Resources Finance Campus Security University Counsel Public Affairs Internal Audit Research 4.6 Cardholder Data Environment (CDE) A CDE is defined as the computer environment wherein cardholder data is transferred, processed, or stored, and any networks or devices directly connected to that environment. 3

5. Reporting a Computer Security Incident All suspected computer security incidents must be reported immediately to UBC IT via the IT Service Centre (ITSC) at 604-822-2008. Members of the university community must report a suspected computer security incident according to normal practice within their unit. This could be to their supervisor, to the IT service team for their unit or directly to the ITSC. Where the computer security incident involves physical security issues in addition to computer security issues the incident must be reported to Campus Security who will in turn alert the ITSC. 6. Managing the Security Incident 6.1 All Incidents Information Security will: Create an incident file Assign a CSIRT Coordinator Identify the scope and type of problem, including classification as minor, medium or severe Notify appropriate organizations internal and external to UBC (including relevant police agencies) Take corrective action as described in the guidelines for securing and preserving electronic evidence Report, as needed, to the appropriate UBC department for further action or discipline Close the incident file 6.2 Medium and Severe Incidents Information Security Officer (ISO) will: Form a CSIRT to include the relevant owner(s) of the data or issue CSIRT Coordinator will: Provide regular briefings to the CSIRT by e-mail at least once a day and more often at the outset - even if there has been no change 4

Write a closing incident report that is shared with the CSIRT 6.3 Severe Incidents Information Security Officer (ISO) will: Escalate the incident to the CIO The CIO will: Brief the Provost and any other relevant senior UBC executives Receive regular reports on risks from the CSIRT and communicate them to the Provost and any other relevant senior UBC executives Ensure risk is managed in consultation with the Provost and any other relevant senior UBC executives Activate UBC s Disaster Response Plan (DRP) if the situation requires, based on the impact on persons, property, and the environment. Provide a closing incident report to the Provost and the other senior UBC executives that assisted in the management of the incident 7. Closing the Incident A closing incident report shall be prepared by the CSIRT Coordinator for medium and severe incidents. The report shall include: Chronology of the incident and actions taken Scope of risk the university faced during the incident e.g. number of records, degree of exposure Description of action taken to mitigate and resolve the issue Communications that were taken Brief explanation of basis for key decisions Evaluation of whether response plan was followed Identification of internal improvements to infrastructure, systems, the incident response plan, and any other actions that are recommended 5

8. Managing Rogue Access Points A centrally monitored system is used to continually detect unauthorised/rogue wireless devices within the university network. If a rogue access point is detected within 50 meters of a CDE an alert is generated and the applicable merchant(s) are contacted to investigate and if appropriate remove the wireless device. 9. Summary of Incident Response Plan Report Incident Manage Incident Close Incident Community Member or Supervisor Campus Security Managed by CSIRT Coordinator ISO assembles CSIRT for medium and severe incidents ISO escalates severe incidents to CIO. CIO briefs UBC executives Create closing incident report for medium and severe incidents Share report with CSIRT for medium incidents Share report with CIO for severe incidents 6