Security Incident Procedures Response and Reporting Policy



Similar documents
ISO IEC ( ) TRANSLATED INTO PLAIN ENGLISH

Information Security Policy. Chapter 10. Information Security Incident Management Policy

Data Security Incident Response Plan. [Insert Organization Name]

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

CITY UNIVERSITY OF HONG KONG Information Security Incident Management Standard

Standard: Information Security Incident Management

IT Security Incident Management Policies and Practices

PCI Compliance. Top 10 Questions & Answers

Third-Party Access and Management Policy

Who Should Know This Policy 2 Definitions 2 Contacts 3 Procedures 3 Forms 5 Related Documents 5 Revision History 5 FAQs 5

C. Author(s): David Millar (ISC Information Security) and Lauren Steinfeld (Chief Privacy Officer)

Information Technology Policy

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline Information Security Incident Response

PCI Compliance Top 10 Questions and Answers

Client Security Risk Assessment Questionnaire

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

PCI DSS SECURITY AWARENESS

AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN Siskiyou Boulevard Ashland OR 97520

HIPAA Security Alert

University of Pittsburgh Security Assessment Questionnaire (v1.5)

PBGC Information Security Policy

Rulebook on Information Security Incident Management General Provisions Article 1

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Policy Title: HIPAA Security Awareness and Training

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

UCF Security Incident Response Plan High Level

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Information Security Incident Management Policy and Procedure

R345, Information Technology Resource Security 1

Feedback Ferret. Security Incident Response Plan

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Standard Operating Procedure Information Security Compliance Requirements under the cabig Program

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

IMS-ISA Incident Response Guideline

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

CREDIT CARD SECURITY POLICY PCI DSS 2.0

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Global Partner Management Notice

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

Appendix 1 - Credit Card Security Incident Response Plan

PCI Data Security and Classification Standards Summary

Information Security Incident Management Policy and Procedure. CONTROL SHEET FOR Information Security Incident Management Policy

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

INFORMATION TECHNOLOGY POLICY

b. USNH requires that all campus organizations and departments collecting credit card receipts:

Information Security Incident Management Guidelines

Cyber Security: Cyber Incident Response Guide. A Non-Technical Guide. Essential for Business Managers Office Managers Operations Managers.

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security. Topics

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

HIPAA Information Security Overview

Teleran PCI Customer Case Study

Information Resources Security Guidelines

Franchise Data Compromise Trends and Cardholder. December, 2010

University of Wisconsin-Madison Policy and Procedure

HIPAA Security and HITECH Compliance Checklist

Incident Response Guidance for Unclassified Information Systems

Data Security Breach. How to Respond

Business Case. for an. Information Security Awareness Program

Supplier Security Assessment Questionnaire

HIPAA Security Training Manual

Information Security Awareness Training Gramm-Leach-Bliley Act (GLB Act)

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

COMPUTER AND NETWORK USAGE POLICY

FACT SHEET: Ransomware and HIPAA

Firewall and Router Policy

COUNCIL POLICY NO. C-13

INCIDENT RESPONSE CHECKLIST

Andrews University Payment Card Acceptance Policies & Procedures. Prepared by Financial Administration

<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.

How To Protect Decd Information From Harm

NC DPH: Computer Security Basic Awareness Training

Your Agency Just Had a Privacy Breach Now What?

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

Solution Brief for HIPAA HIPAA. Publication Date: Jan 27, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Is the PCI Data Security Standard Enough?

HIPAA Security COMPLIANCE Checklist For Employers

Project Title slide Project: PCI. Are You At Risk?

The intended audience is system administrators, Directors, and Department Heads.

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO

Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5),

FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY

Miami University. Payment Card Data Security Policy

Computer Security Policy (Interim)

Overcoming PCI Compliance Challenges

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

The Age of Data Breaches:

Transcription:

Security Incident Procedures Response and Reporting Policy Approved By: \S\ James Palmer CSC Loss Prevention Director PCI Policy # 1030 Version # 1.0 Effective Date: MM/DD/YYYY Date 1.0 Purpose The purpose is to identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to MWR PROGRAM; and document security incidents and their outcomes. 2.0 Compliance PCI DSS Requirement 12.5. 3.0 Scope This policy applies to MWR PROGRAM; in its entirety, including all workforce members. Further, the policy applies to all systems, network, and applications that process, store or transmit sensitive information. 4.0 Policy and Procedures In the event of a security incident, MWR PROGRAM must follow the procedures for responding and reporting the incident. The procedures for responding and reporting an incident require the following 7 steps: 1. Preparing for a Security Incident 2. Detecting and Reporting Security Incidents 3. Assembling the Incident Response Team 4. Gathering Evidence 5. Limiting Further Damage 6. Fixing the Damage 7. Analyzing the Incident Page 1 of 6

Step 1: Preparing for a Security Incident There are two main categories of security incidents: theft or loss of documents which contain PAN (primary account number), or viewing of PAN by unauthorized persons; and a security breach in a computer network. The key is to be prepared so that in the event of a security incident the response is swift and comprehensive, thereby minimizing or limiting the damage. Every network will at some point be a victim of a computer security incident. System and network administrators must be prepared for security incidents and be able to respond quickly to minimize and repair the damage. Some critical steps that must be addressed are: Identify the Security Incident Response Team Acquire specialized security training Use an Intrusion Detection Systems (IDS) Have a Data Backup Plan Step 2: Detecting and Reporting Security Incidents As soon as security incidents are detected they should be immediately reported to a member of the Security Incident Response Team or the Security Officer. A Security Incident Reporting Procedure will be established, together with a Security Incident Response Procedure that outlines the actions to be taken upon receipt of an incident report. All employees and contractors will be made aware of these procedures, and will be required to report security incidents immediately. The Security Incident Response Procedure will include suitable feedback processes to notify those who report incidents of results after the incident has been dealt with and closed. A theoretical security breach from each main category above should be incorporated into the procedures, to be used in awareness training as examples of what could happen, how to respond to such incidents, and how to avoid them in the future. Further, all users of information services should be trained to note and report any observed or suspected security weaknesses in, or threats to, systems or services. They should report these matters to their supervisor Page 2 of 6

and to a member of the Security Incident Response Team or the Security Officer immediately. Users will be trained they should not, under any circumstances, attempt to prove a suspected weakness. This is for their own protection, as testing weaknesses might be interpreted as a potential misuse of the system. Procedures will also be established for reporting malfunctions such as those related to software, hardware or any other type. Step 3: Assembling the Security Response Team The Security Incident Response Team must meet to evaluate and determine the potential cause of the incident. The following should be accomplished by the team, as applicable: In the case of theft or loss of documents, or unauthorized viewing of PAN, the circumstances should be reviewed. In the event of a computer security breach, the following should be accomplished: o The symptoms of the problem and any messages appearing on the screen should be noted. o The computer should be isolated, if possible, and use of it should be stopped. The matter should be reported immediately to the Security Officer. o Users should not attempt to remove the suspected software unless authorized to do so. o Appropriately trained and experienced staff authorized by the Security Incident Response Team should carry out recovery activities. Step 4: Limiting Further Damage Once the initial data has been collected, immediate steps need to be taken to minimize the spread of the damage. In the event of a computer security breach, these steps may include disabling Internet access as well as disabling file servers, email servers, communication devices and other systems. The workstation(s) impacted should be isolated, if possible, and their use stopped. If equipment is to be examined, it should be disconnected from any organizational networks before being re-powered. Diskettes and other media should not be transferred to other workstations. Step 5: Gathering Evidence In the event of a computer security breach, the Security Incident Response Team must gather all possible evidence to fully understand the Page 3 of 6

type of attack and its scope. The team needs to address questions such as: How many systems are impacted? What levels of privileges were accessed? How widespread is the vulnerability? How far into the internal systems did the intruder get? Which systems have been compromised? Any risk to cardholder data stored by systems? All of the information collected should be thoroughly documented and reported. Dedicated systems should be used for incident analysis and forensics. The involved personnel should be trained in the use of such applications. Step 6: Fixing the Damage Having gathered all the evidence the Security Incident Response Team must lead eradication efforts. In the event of a computer security breach, malicious files will be deleted, removed or replaced. User accounts and associated passwords may need to be modified or re-created if there was any evidence of unauthorized access. Data may need to be restored from trusted backups. After the impacted systems are cleaned and protected, they may be brought back online. Monitor these systems and the infrastructure for other similar, subsequent incidents. Step 7: Analyzing the Incident The Security Incident Response Team will re-group to do a post-event debriefing. The objective is to assess the incident and the response, and to identify any specific areas of concern. The team must have a full and complete understanding of the incident and how to prevent such incidents from occurring in the future. There should also be a review of mechanisms in place to enable the types, volumes and costs of incidents and malfunctions to be quantified and monitored. This information should be used to identify recurring or high impact incidents or malfunctions. This may indicate the need for enhanced or additional controls to limit the frequency, damage and cost of future occurrences, or to be taken into account in the security policy review process. Page 4 of 6

Finally, there should be a formal disciplinary process for employees who have violated organizational security policies and procedures. Such a process can act as a deterrent to employees who might otherwise be inclined to disregard security procedures. 5.0 Responsibility Members of the workforce will immediately report all real or suspected violations of information security to the Security Officer. All members of the workforce will be trained on appropriate reporting of security violations. All incident reporting and response activities must be conducted strictly on a need-to-know basis. The MWR Director/Officer, is responsible for determining the appropriate level of response to a security incident. All such response must be in accordance with established policies and procedures. The MWR Director/Officer and the Incident Response Team must immediately consider a response that includes determining if the incident is accidental or intentional. In the event of a computer security breach, the team must immediately consider a response that includes, at minimum: Disconnecting the affected system from the network (should not remove power from the system) Identifying all system-related information such as: o Hardware address; o System name; o IP address; o Cardholder data processed by the system; o Applications installed on the system; and o Location of the system The Security Incident Report to be completed by the Security Officer or a member of his/her team will include as much information as possible about the following: Contact information of the person reporting the incident (name, phone, address, email); Date and time of the incident; Detailed description of the incident; and Page 5 of 6

Any further information, such as unusual activities or individuals associated with the incident. 6.0 Analysis of Legal Requirements for Reporting Compromises: [Instructions: Your company must include a brief legal analysis for each state where you do business. See http://www.ncsl.org/default.aspx?tabid=13489 for more information on your state. This is a section that we are not allowed to write for you.] 7.0 Supporting Documents Policy 1020 Security Incident Policy Security Incident Reporting Procedure (you will need to create) Security Incident Response Procedure (you will need to create) 8.0 Definitions Definitions for technical terms can be found in your MWR PCI Compliance Workbook. 9.0 Policy History Initial effective date: MM/DD/YYYY First revision date: MM/DD/YYYY (etc.) Page 6 of 6