Incident categories. Version 2.0-04.02.2013 (final version) Procedure (PRO 303)

Similar documents
Incident Categories (Public) Version (Final)

Incident Reporting Guidelines for Constituents (Public)

University of Colorado at Denver and Health Sciences Center HIPAA Policy. Policy: 9.2 Latest Revision: 04/17/2005 Security Incidents Page: 1 of 9

INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS

IMS-ISA Incident Response Guideline

Information Security Incident Management Guidelines

ISO Information Security Management Systems Foundation

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

Cyber Incident Response

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Data Management & Protection: Common Definitions

Data Management Policies. Sage ERP Online

Data Security Incident Response Plan. [Insert Organization Name]

Cyber Security: Cyber Incident Response Guide. A Non-Technical Guide. Essential for Business Managers Office Managers Operations Managers.

Incident Response Plan for PCI-DSS Compliance

Information Technology Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Local Government Cyber Security:

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology

How To Audit The Mint'S Information Technology

Information Technology Services Information Security Incident Response Plan

Common Cyber Threats. Common cyber threats include:

UBC Incident Response Plan

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Overview of computer and communications security

How To Monitor The Internet In Idaho

IT Security Incident Management Policies and Practices

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

Cyber Security Threats and Countermeasures

Cybersecurity Awareness. Part 1

CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)

Evaluation Report. Office of Inspector General

Standard: Information Security Incident Management

Cyber Security Incident Reporting Scheme

ANTI-VIRUS POLICY OCIO TABLE OF CONTENTS

Incident Object Description and Exchange Format

Sample Employee Network and Internet Usage and Monitoring Policy

USM IT Security Council Guide for Security Event Logging. Version 1.1

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Protecting your business from fraud

BBB, EDC, EDC-RA, EGI-RA, EHC-RA, IGS, JFA, JFA-RA, JHF-RA, JOA-RA, KBA-RB, KBB Superintendent of Schools

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Computer Security Incident Reporting and Response Policy

Information Technology Security Requirements Summary

City of Grand Rapids ADMINISTRATIVE POLICY

Don t Fall Victim to Cybercrime:

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

INFORMATION SECURITY. Additional Oversight Needed to Improve Programs at Small Agencies

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Security. Definitions

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

I N T E L L I G E N C E A S S E S S M E N T

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

DATA BREACH COVERAGE

Information Incident Management Policy

Cybersecurity for the C-Level

B. Privacy. Users have no expectation of privacy in their use of the CPS Network and Computer Resources.

Iowa Health Information Network (IHIN) Security Incident Response Plan

INFORMATION SECURITY. Agencies Need to Improve Cyber Incident Response Practices

DUUS Information Technology (IT) Incident Management Standard

FKCC AUP/LOCAL AUTHORITY

13. Acceptable Use Policy

Agreeing to Shortcut Solutions,llc.. Acceptable Use Policy and Terms of Service is mandatory for Hosting signing up or using our services.

Privacy and Security Incident Management Protocol

Information Security Incident Management Guidelines. e-governance

Enterprise PrivaProtector 9.0

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

CITY OF BOULDER *** POLICIES AND PROCEDURES

CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

PROCEDURE FOR SECURITY RISK MANAGEMENT IN PPC S.A. INFORMATION TECHNOLOGY SYSTEMS DA-1

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

US-CERT Overview & Cyber Threats

Information Technology Acceptable Use Policy

Acceptable Use Policy

DATA SECURITY AGREEMENT. Addendum # to Contract #

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation

Appendix 1 - Credit Card Security Incident Response Plan

Information Security Policies and Procedures Development Framework for Government Agencies. First Edition AH

THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK

Acceptable Use Policy

Transcription:

Version 2.0-04.02.2013 (final version) Procedure (PRO 303) Classification: PUBLIC / Department: GOVCERT.LU

Table Contents Table Contents... 2 1 Introduction... 3 1.1 Overview... 3 1.2 Purpose... 3 1.3 Scope... 3 1.4 Reference... 3 1.5 Definitions and abbreviations... 3 2 Information security incident definition... 4 3... 4 3.1 Category allocation... 7 Department GOVCERT.LU 2/7 Creation date (final version) : 04 Feb 2013

1 Introduction 1.1 Overview Once an incident report has been received, it should be treated efficiently and rapidly in order to help the constituent solve the problem. The categorisation incidents helps GOVCERT.LU to plan actions to resolve the incident and help the constituent respect the reporting timeframe. The categorisation incidents also supports the definition standard incident response procedures for each type incident. 1.2 Purpose The aim this procedure is to define: the incident categories used by GOVCERT.LU, how a category is allocated to an incident, and the reporting timeframe for constituents for each type incident. 1.3 Scope This procedure concerns the GOVCERT.LU ticketing tool, its members and its constituents. 1.4 1.5 Reference [1] PRS 401 Incident management process [2] SP800-61 (http://csrc.nist.gov/publications/) [3] CSIRT Case Classification - Example for Enterprise CSIRT (http://www.first.org/_assets/resources/guides/) [4] US CERT (http://www.us-cert.gov/government-users/reporting-requirements) Definitions and abbreviations Abbreviation NIST CAT AV Definition National Institute Standards and Technology Incident category Antivirus Table 1: Definitions and abbreviations Department GOVCERT.LU 3/7 Creation date (final version) : 04 Feb 2013

2 Information security incident definition An information security incident (or incident) is a single or a series unwanted or unexpected information security events 1&2 that have a significant probability compromising business operations and threatening information security 3. 3 For each category incident, a reporting timeframe applies for the concerned constituent. The reporting timeframe is the timeframe within which the constituent should report the incident. Once this timeframe has exceeded, GOVCERT.LU cannot guarantee that the incident will be resolved efficiently. The reporting timeframe is defined according to the sensitivity the targeted system(s) as follows: Critical system: a critical system is a system, application, data, or other resources that is essential to the survival an organization. When a critical system fails or is interrupted, core operations are significantly impacted. Non critical system: system, application, data, or other resources which do not have strong impact on the good operation the constituency if compromised. 1 An event is an occurrence or change in a particular set circumstances: (NOTE 1) An event can be one or more occurrences, and can have several causes. (NOTE 2) An event can consist something that does not happen. (NOTE 3) An event can sometimes be referred to as an incident or an accident. 2 An information security event is an identified occurrence a system, service or network state indicating a possible breach information security policy or failure safeguards, or a previously unknown situation that may be relevant to security. 3 where information security means preservation confidentiality, integrity and availability information. Department GOVCERT.LU 4/7 Creation date (final version) : 04 Feb 2013

Warning: When update this table; please update also the table 2 in the incident reporting guidelines for constituent procedure (PRO 301) Category Name Description CAT 1 Compromised information Successful destruction, corruption, or disclosure sensitive corporate information or Intellectual Property. CAT 2 Compromised Asset Compromised host (root account, Trojan, rootkit), network device, application, user account. This includes malware-infected hosts where an attacker is actively controlling the host. CAT 3 Unauthorized Access In this category an individual (internal or external) gains logical or physical access without permission to a national or local network, system, application, data, or other resource. CAT 4 Malicious Code Malicious stware (e.g. virus, worm, Trojan horse, or other code-based malicious entity) that infects an operating system or application. Organizations are NOT required to report malicious logic that has been successfully quarantined by antivirus (AV) stware. CAT 5 (Distributed) Denial Service An attack that successfully prevents or impairs the normal authorized functionality networks, systems or applications by exhausting resources. This activity includes being the victim or participating in the DoS. CAT 6 Theft or Loss Theft or loss sensitive equipment (Laptop, hard disk, media etc.) belonging to the organization. CAT 7 Phishing Use fraudulent computer network technology to entice organization's users to divulge important information, such as obtaining users' bank account details and credentials by deceptive e-mails or fraudulent web site Critical system if widespread across organization, otherwise one (1) day. Within two (2) hours if the successful attack is still ongoing and the organization is unable to successfully mitigate activity. Within one (1) day Reporting Timeframe Non critical system if widespread across organization, otherwise one (1) day. if the successful attack is still ongoing and the organization is unable to successfully mitigate activity. Within one (1) week Within one (1) day CAT 8 Unlawful activity Fraud / Human Safety / Child Porn. Computer-related incidents a criminal nature, likely to involve law enforcement, Global Investigations, or Loss Prevention. Within six (6) hours Within one (1) day CAT 9 Scans/Probes/Attempted This category includes any Within two (2) Department GOVCERT.LU 5/7 Creation date (final version) : 04 Feb 2013

Category Name Description Access activity that seeks to access or identify an organization computer, open ports, protocols, service, or any combination for later exploit. This activity does not directly result in a compromise or denial service. CAT 10 Policy Violations Deliberate violation Infosec policy, such as: inappropriate use corporate asset such as computer, network, or application; unauthorized escalation privileges or deliberate attempt to subvert access controls. Table 2: Critical system Within six (6) hours Reporting Timeframe Non critical system weeks Within one (1) week The categories and attacks are based on a mix categories proposed by NIST, FIRST and US-CERT. Department GOVCERT.LU 6/7 Creation date (final version) : 04 Feb 2013

3.1 Category allocation Table 2 describes all the categories incidents. A category is allocated by constituent and GOVCERT.LU to an incident according to the following flow chart: Category allocation flow Comments GOVCERT.LU Constituent - The reading order table 2 is from the top down. Table 2 provides the inputs for N (CAT 1, CAT 2, CAT 3, CAT 4 CAT 9 and CAT 10). New incident N= 1 (CAT 1) - Incidents are categorized on a firstmatch basis by the constituent. Matching Category/Inc ident? Y N N= N+1 (CAT 2) Category allocation Ticket opening Sending the incident report - CAT modification and/or CATs adding CATs? Y CAT Mod/Add N End Figure 1: Category allocation flow The constituent choses the category that fits best such as described in figure 1. During the identification phase 4 GOVCERT.LU can (if judged necessary) (1) change this category (false encoding by the constituent) and/or (2) add others categories. 4 See PRS 401 Department GOVCERT.LU 7/7 Creation date (final version) : 04 Feb 2013