You are on page 1of 20

HOW TO MAKE AND IMPLEMENT

A SUCCESSFUL INCIDENT
RESPONSE PLAN
Best practices to prepare for a data breach

© SecurityMetrics
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 1

INTRODUCTION
You need to have a current incident response plan that is ready to go if
your organization ever gets breached.

When it comes to making an incident response plan, it can get a


little overwhelming. In this white paper, you will learn about incident
response plan basics, how to best develop and implement your inci-
dent response plan, and what should be included in your incident
response plan.

It’s important to discover the


breach quickly, identify where
it’s coming from, and pinpoint
what it has affected.
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 2

INCIDENT RESPONSE PLAN BASICS


WHY HAVE AN INCIDENT DATA BREACH FINES
RESPONSE PLAN? Merchant processor compromise fine $5,000 – $50,000
Unfortunately, nearly every organization
Card brand compromise fees $5,000 – $500,000
will experience system attacks, with
some of these attacks breaching organi- Forensic investigation $12,000 – $100,000
zation’s security. Onsite QSA assessments following the breach $20,000 – $100,000
Free credit monitoring for affected individuals $10 – $30/card
If breached, you may only be liable for a
Card re-issuance penalties $3 – $10 per card
few of the following fines, or you could
be expected to pay even more than Security updates $15,000+
listed below. It depends on a number Lawyer fees $5,000+
of factors. Along with possible legal
Breach notification costs $1,000+
fines, federal/municipal fines, increased
monthly card processing fees, you may Technology repairs $2,000+
have to pay for the following: 
 TOTAL POSSIBLE COST: $50,000 – $773,000+
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 3

A well-executed incident response plan can minimize THE PHASES OF AN


breach impact, reduce fines, decrease negative press,
and help you get back to business more quickly. In an INCIDENT RESPONSE PLAN
ideal world and if you’re following PCI DSS require- An incident response plan should be set up to address a
ments, you should already have an incident response suspected data breach in a series of phases with specific
plan prepared and employees trained to quickly deal needs to be addressed. The incident response phases are:
with a data breach situation. 
 • Phase 1: Prepare
• Phase 2: Identify
But if there is no plan, employees scramble to figure
• Phase 3: Contain
out what they’re supposed to
do, and that’s when
big mistakes can occur. For example, if employees • Phase 4: Eradicate
wipe a system without first creating images of the • Phase 5: Recover
compromised systems, this can prevent you from • Phase 6: Review
learning what happened and what you can do to avoid
re-infection.
DATA BREACH

Set your incident


PRE BREACH POST BREACH

PHASE 1 P R E PA R E

IDENTIFY

response plan into


PHASE 2

PHASE 3 PHASE 4 PHASE 5 PHASE 6


C O N TA I N E R A D I CAT E R EC OV E R REVIEW

motion immediately
after learning of a
suspected data breach.
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 4

PHASE 1: PREPARE PHASE 2: IDENTIFY


Preparation often takes the most effort in your incident Identification (or detection) is the process where you
response planning, but it’s by far the most crucial phase determine whether you’ve actually been breached by
to protect your organization. This phase includes the looking for deviations from normal operations and
following steps: activities.
• Ensure your employees receive proper
training regarding their incident response roles An organization normally learns they’ve been breached
and responsibilities in one of four ways:
• Develop and regularly conduct tabletop exercises • The breach is discovered internally (e.g., review of
(i.e., incident response drill scenarios) to evaluate intrusion detection system logs, alerting systems,
your incident response plan system anomalies, or anti-virus scan malware alerts)
• Ensure that all aspects of your incident response • Your bank informs you if a possible breach based
plan (e.g., training, hardware and software on reports of customer credit card fraud
resources) are approved and funded in advance • Law enforcement discovers the breach while
investigating the sale of stolen card information
• A customer complains to you because your
organization was the last place they used their
card before it began racking up fraudulent
charges. 

HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 5

PHASE 3: CONTAIN
When an organization becomes aware of a possible
breach, it’s understandable to want to fix it imme-
diately. However, without taking the proper steps
and involving the right people, you can inadvertently
destroy valuable forensic data. Forensic investigators
use this data to determine how and when the breach
occurred, as well as devising a plan to prevent similar
future attacks.

When you discover a breach, remember:


• Don’t panic
• Don’t make hasty decisions
• Don’t wipe and re-install your systems (yet)

PHASE 4: ERADICATE
After containing the incident, you need to find and
eliminate policies, procedures, or technology that led to
the breach. This means all malware should be securely
removed, systems should again be hardened and
patched, and updates should be applied.

Whether you or a third party do this, you need to be


thorough. If any trace of malware or security issues
remain in your systems, you may still be losing sensi-
tive data, with your liability increasing.
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 6

PHASE 5: RECOVER PHASE 6: REVIEW


Recovering from a data breach is the process of After the forensic investigation, meet with all incident
restoring and returning affected systems and devices response team members and discuss what you’ve
back into your business environment. During this time, learned from the data breach, reviewing the events in
it’s important to get your systems and business opera- preparation for the next attack.
tions up and running again without the fear of another
breach. This is where you will analyze everything about the
breach. Determine what worked well and what didn’t in
After the cause of the breach has been identified and your response plan. Then revise your incident response
eradicated, you need to ensure all systems have been plan.
hardened, patched, replaced, and tested before you
consider re-introducing the previously compromised
systems back into your production environment.
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 7

HOW TO DEVELOP AND IMPLEMENT


YOUR INCIDENT RESPONSE PLAN
You can’t afford to be unprepared for a data breach’s aftermath. It’s up
to you to control the situation and protect your brand in the wake of a
data breach’s potentially devastating effect on your reputation.

Developing and implementing an incident response plan will help your


business handle a data breach quickly and efficiently while minimizing
the damage.

STEP 1: IDENTIFY AND PRIORITIZE ASSETS


Start off by identifying and documenting where your organizations
keeps its crucial data assets. You need to assess what would cause
your organization to suffer heavy losses if it were stolen or damaged.

After identifying critical assets, prioritize them according to impor-


tance and highest risk, quantifying your asset values. This will help
justify your security budget and show executives what needs to be
protected and why it’s essential to do so.
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 8

STEP 2: IDENTIFY POTENTIAL RISKS


Determine what risks and attacks are the greatest
current threats against your systems. Keep in mind
that these will be different for every organization.

For organizations that process data online, improper Top failed vulnerabilities discovered by
coding could be their biggest risk. For a brick-and-mor-
SecurityMetrics vulnerability scans:
tar organization that offers WiFi for their customers,
their biggest risk may be Internet access. Other organi- • TLS Version 1.0 Protocol Detection: Exists if
zations may place a higher focus on ensuring physical the remote service accepts connections using
security, while others may focus on securing their TLS 1.0 encryption
remote access applications. • SSL Certificate with Wrong Hostname:
Happens when a SSL certificate for the tested
Here are examples of a few possible risks: service is for a different host
• External or removable media: executed from • Web Application Potentially Vulnerable to
removable media (e.g., flash drive, CD) Clickjacking: Occurs if a remote web server
• Attrition: employs brute force methods (e.g., does not set an X-Frame-Options response
DDoS, password cracking) header in all content responses 


• Web: executed from a site or web-based app • SSL RC4 Cipher Suites Supported (i.e.,
(e.g., drive-by download) Bar Mitzvah Attack): exists when the RC4
encryption algorithm is used in SSL/TLS
• Email security: executed via email message or
transmission
attachment (e.g., malware)
• SSL Self-Signed Certificate: Occurs when
• Impersonation: replacement of something benign
organizations use an identity certificate that
with something malicious (e.g., SCL injection
they create, sign, and certify rather than a
attacks, rogue wireless access points)
trusted certificate authority (CA)
• Loss or theft: loss of computing device or media
(e.g., laptop, smartphone)
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 9

STEP 3: ESTABLISH PROCEDURES


If you don’t have established procedures to follow, a
panicked employee may make detrimental security
blunders that could damage your organization. Your
data breach policies and procedures should include:
• A baseline of normal activity to help identify
breaches
• How to identify and contain a breach
• How to record information on the breach
• Notification and communications plan
• Defense approach
• Employee training

Over time, you might need to adjust your policies


according to your organization’s needs. Some organi-
zations might require a more robust notification and
communications plan, while others might need help
from outside resources. However, all organizations
need to focus on employee training (e.g., your security
policies and procedures).
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 10

STEP 4: SET UP A RESPONSE TEAM STEP 5: SELL THE PLAN


You need to organize an incident response team that Your incident response team won’t be effective without
coordinates your organization’s actions after discover- proper support and resources to follow your plan.
ing a data breach. Your team’s goal should be to coor-
dinate resources during a security incident to minimize Security is not a bottom-up process. Management at
impact and restore operations as quickly as possible. the highest level (e.g., CEO, VP, CTO) must understand
that security policies–like your incident response
Some of the necessary team roles are: plan–must be implemented from the top and be pushed
• Team leader down. This is true for organizations from mom and pop
shops to enterprise organizations.
• Lead investigator
• Communications leader For enterprise organizations, executive members need
• C-suite representative to be on board with your incident response team. For
smaller organizations, management needs to be fine
• IT director
with additional funding and resources dedicated to
• Public relations incident response.
• Documentations and timeline leader
• Human resources When presenting your incident response plan, focus on
how your plan will benefit your organization (e.g., finan-
• Legal representative
cial and brand benefits). For example, if you experience
• Breach response experts a data breach and poorly manage the incident, your
company’s reputation will likely receive irreparable
Make sure your response team covers all aspects brand damage.
of your organization, and that they understand their
particular roles in the plan. Each will bring a unique The better your goals are presented, the easier it will
perspective to the table with a specific responsibility be to obtain necessary funding to create, practice and
to manage the crisis. execute your incident response plan.
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 11

STEP 6: TRAIN YOUR STAFF


Just having an incident response plan isn’t enough.
The regular routine
Employees need to be properly trained on your inci-
dent response plan and know what they’re expected to
of work makes it easy
do after a data breach.
for employees to
Employees also need to understand their role in maintain-
ing company security. To help them, employees should forget crucial security
know how to identify attacks such as phishing emails,
spear phishing attacks, and social engineering efforts.
information learned
Test your employees through tabletop exercises (i.e.,
simulated, real-world situation led by a facilitator). during trainings.
While tabletop exercises require time and money, they
play a vital role in your staff’s preparation for a data
breach. These tabletop exercises help familiarize your
employees with their particular incident response roles
by testing them through a potential hacking scenario.

After testing your employees, you can identify and


address weaknesses in the incident response plan and
help everyone involved see where they can improve, with
no actual risk to your organization’s assets.
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 12

WHAT TO INCLUDE IN AN
INCIDENT RESPONSE PLAN
Creating an incident response plan can seem overwhelming. To
help, develop your incident response plan in smaller, manageable
procedures.

While every organization will need varying policies, training, and


documents, there are a few itemized response lists that most organi-
zations need to include in their incident response plans, such as:
• Emergency contact/communications list
• System backup and recovery processes list
• Forensic analysis list
• Jumpbag list
• Security policy review list
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 13

EMERGENCY CONTACT/
COMMUNICATIONS LIST
Proper communication is critical to successfully man- Your incident response team should craft specific
aging a data breach, which is why you need to docu- statements that target the various audiences, including
ment a thorough emergency contact/communications a holding statement, press release, customer state-
list. This list should contain information about: who ment, and internal/employee statement. For example,
to contact, how to reach these contacts, when it’s the you should have pre-prepared emails and talking points
appropriate time to reach out, and what you need to say. ready to go after a data breach.

In this list, you should document everyone that needs Your statements should address questions like:
to be contacted in the event of a data breach, such as • Which locations are affected by the breach? 

the following individuals:
• How was it discovered? 

• Response team
• Is any other personal data at risk? 

• Executive team
• How will it affect customers and the community? 

• Legal team
• What services or assistance (if any) will you
• Forensics company provide your customers? 

• Public relations • When will you be back up and running, and what
• Affected individuals will you do to prevent this from happening again? 

• Law enforcement
Identify in advance the person within your organization
• Merchant processor
(perhaps your inside legal counsel, newly hired breach
management firm, C-level executive, etc.) that is
You need to determine how and when notifications will responsible for ensuring the notifications are made
be made. Several states have legislated mandatory time timely and fulfill your state’s specific requirements.
frames that dictate when an organization must make Your public response to the data breach will be judged
notifications to potentially affected cardholders (and law heavily, so think this through.
enforcement). You should be aware of the laws in your
state and have instructions in your incident response plan
that outline how you will make mandated notifications.
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 14

SYSTEM BACKUP AND


RECOVERY PROCESSES LIST
Your system backup and recovery processes list will
help you deal with the technical aspects of a data
breach. Here are some things that should be included:
• Process for disconnecting from the Internet (e.g.,
who is responsible to decide whether or not you
disconnect)
• System configuration diagrams that include
information like device descriptions, IP addresses,
and OS information
• Process for switching to redundant systems and
preserving evidence
• Process for preserving evidence (e.g., logs,
timestamps)
• Practices to test the full system backup and
system recovery
• Steps to test and verify that any compromised
systems are clean and fully functional

This list helps you preserve any compromised data,


quickly handle a data breach, and preserve your sys-
tems through backups. By creating and implementing
this list, your organization can lessen further data loss
and help you to return to normal operations as quickly
as possible.
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 15

FORENSICS ANALYSIS LIST JUMPBAG LIST


A forensics analysis list is for organizations that use Your jumpbag list is for grab-and-go responses (i.e.,
in-house forensic investigations resources. Your foren- when you need to respond to a breach quickly). This list
sic team will need to know where to look for irregular should include overall responses and actions employ-
behavior and have access to system security and event ees need to take immediately after a breach. Your list
logs. You might need multiple lists based on your will keep your plan organized and prevents mistakes
different operating systems and functionalities (e.g., caused by panic.
server, database).
Some things to include in your jumpbag list are:
Your forensic team may need the following tools: • Incident handler’s journal to document the
• Data acquisition tools incident (e.g., who, what, where, when, why)

• Write-blockers • Incident response team contact list

• Clean/wiped USB hard drives • USB hard drives and write-blockers

• Cabling for all connections they could experience • USB multi-hub


in your environment • Flashlight, pens, notebooks
• Other forensic analysis tools (e.g., EnCase, FTK, • All of your documented lists
X-Ways)
• USB and/or DVD-ROM containing bootable
versions of your OS
However, if your organization doesn’t have access to
• Computer and network tool kit
an experienced computer forensic examiner in-house,
you will want to consider hiring a forensics firm, first • Hard duplicators with write-block capabilities
vetting them with in advance with pre-completed • Forensic tools and software (if using in-house
agreements. This vetting process helps ensure you get forensic investigations resources)
an experienced forensic investigator when you need it.
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 16

SECURITY POLICY REVIEW LIST


Your security policy review list deals with your
response to a breach and its aftermath. This list helps
you analyze the breach, helping you know what you can
learn and change afterwards.

Your security policy review list should include docu-


mentation of the following things:

• When the breach was detected, by whom and


what method
• Scope of the incident/affected systems
• Data that was put at-risk
• How the breach was contained and eradicated
• Work performed or changes made to systems
during recovery
• Areas where the response plan was effective
• Areas that need improvement (e.g., which
security controls failed, improvements to security
awareness programs)

You should look at where your security controls failed,


and how to improve them. The purpose of this list is
to document the entire incident, what was done, what
worked, what didn’t, and what was learned.
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 17

TESTING YOUR INCIDENT RESPONSE PLAN


An incident response plan is only useful if it is properly SIMULATION EXERCISE
established and followed by employees. To help staff, In a simulation exercise, your team tests their incident
regularly test their reactions through real-life simula- responses through a live walk-through test that has
tions or what’s known as tabletop exercises. Tabletop been highly choreographed and planned.
exercises allow employees to learn about and practice
their incident response roles when nothing is at stake, This exercise allows participants to experience how
which can help you discover gaps in your incident events actually happen, helping your team better
response plan (e.g., communication issues). understand their roles. However, simulation exercises
can require a lot of time to plan and coordinate, while
TYPES OF TABLETOP EXERCISES still not fully testing your team’s capabilities.

DISCUSSION-BASED EXERCISE
In a discussion-based table exercise, you and your staff PARALLEL TESTING
discuss response roles in hypothetical situations. In parallel testing, your incident response team
actually tests their incident response roles in a test
A discussion-based tabletop exercise is a great starting environment.
point because it doesn’t require extensive preparation
or resources, while still testing your team’s response Parallel testing is the most realistic simulation possible
to real-life scenarios without risk to your organization. and provides your team with the best feedback about
However, this exercise can’t fully test your incident their roles. However, parallel testing is more expensive
response plan or your team’s response roles. and requires more time planning than other exercise
because you need to simulate an actual production
environment (e.g., systems, networks).
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 18

CONDUCTING A TABLETOP EXERCISE


Before conducting a tabletop exercise, determine your • A participant briefing that includes the exercise
organization’s needs by asking: agenda and logistics information
• Has your incident response team received training • A participant guide that includes the same
about their roles and responsibilities? information as the facilitator guide, except it
• When did you last conduct a tabletop exercise? either doesn’t include any of the questions or
includes a shorter list of questions designed to
• Has there been any recent organizational changes
prepare participants
that might affect your incident response plan?
• An after action report that documents the
• Has there been any recent guidance or legislation
evaluations, observations, and lessons learned
that might impact your response plan?
from your tabletop exercise staff

Next, design your tabletop exercise around an incident


After conducting a tabletop exercise, set up a debrief
response plan topic or section that you want tested.
meeting to discuss response successes and weak-
Identify any desired learning objectives or outcomes.
nesses. Your team’s input will help you know where
From there, create and coordinate with your tabletop
and how to make necessary revisions to your incident
exercise staff (e.g., facilitator, participants, and data
response plan and training processes.
collector) to schedule your tabletop exercise.

When designing your tabletop exercise, prepare the


following exercise information:
• A facilitator guide that documents your
exercise’s purpose, scope, objective, and scenario,
including a list of questions to address your
exercise’s objectives.
HOW TO MAKE AND IMPLEMENT A SUCCESSFUL INCIDENT RESPONSE PLAN | 19

CONCLUSION
If you don’t already have an incident response plan,
making one should be a top priority. Next, regularly
practice and review your plan. Without regular tabletop
exercises andsimulation trainings, your staff may make
poor decisions which may make beach impact worse.

A data breach can be an organization’s most stressful


situation it handles, but it doesn’t have to be the end of
your organization. By following your incident response
plan, you can avoid significant brand damage.

ABOUT SECURITYMETRICS
We help customers close security and
compliance gaps to avoid data breaches.
Our forensic, penetration testing, and audit
teams identify best security practices and
simplify compliance mandates (PCI DSS,
HIPAA, HITRUST, GDPR). As an Approved
Scanning Vendor, Qualified Security Asses-
sor, Certified Forensic Investigator, we have
tested over 1 million systems for security.

https://www.securitymetrics.com/forensics

You might also like