• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Security  /  Building a Security Incident Response Plan
Building a Security Incident Response Plan
17 June 2017

Building a Security Incident Response Plan

Written by Seqrite
Seqrite
Security

Over the last few years, the Governments of many countries around the world have become sensitive towards inadequate protection of consumer data by the companies. Many of them have enacted various laws and regulations to protect this sensitive data. The late 1990s and early 2000s, witnessed passing of many laws around information security, data privacy, and accountability. Unfortunately, this has led to complicated legalities for the companies.

What the regulations aim to achieve?

Most laws are enacted to protect the confidentiality, integrity and availability of the information that impacts the organization’s stakeholders (including its customers). The various laws in place have following goals:

  •    Establish and implement controls for protection of data
  •    Maintain, protect and assess compliance issues
  •    Identify and re-mediate vulnerabilities and deviations
  •    Provide reporting that can prove organization’s compliance

Some of the key laws that aim to achieve above mentioned goals are:

  • Sarbanes-Oxley Act (SOX): It was enacted to protect investors and mandated strict reforms to improve financial disclosures to prevent accounting fraud.
  • Gramm-Leach-Bliley Act: (GLBA): This act was enacted in the USA to protect the privacy and security of individually identifiable financial information collected, held and processed by financial institutions.
  • Health Insurance Portability and Accountability Act (HIPAA): The rules in this act focus on Protected Health Information gathered by healthcare operations including insurance providers. Non-healthcare companies can also be impacted by this if they engage with companies that are directly affected by the regulation.
  • The Federal Information Security Management Act of 2002 (FISMA): This act was enforced to improve computer security and network security within the USA Federal Government and affiliated parties. Any organization that serves as a contractor to the US Federal Government must comply with the provisions of this act.

These are some of the regulations in the USA alone. However, they impact organizations from many other countries that do business with US Government or US based companies. Other countries have similar provisions for organizations that operate or serve in their market. Meeting these regulations increases the security and integrity of the data that they collect, retain and rely upon for its operations.

Incident Response Plan

What to do if there is a security incident?

Despite best of checks and balances, there will be security incidents that need to be dealt with, as they occur. Every organization needs an incident response plan, not only to comply with regulations but also to ensure that they handle them in a structured way, and minimize their re-occurrence. A well-designed program helps organizations to deal with events quickly and efficiently without panicking.

Some of the key elements of a good incident response plan are:

  • Scope and objective: This defines the fundamental elements of the plan. It covers events, systems, endpoints, etc. that it needs to achieve.
  • Incident response teams, contacts, and responsibilities: It is important for everyone to know whom to contact in case of emergency (incident). His/Her details like name, contact number and role should be defined and agreed upon. The response team must include primary in-charge and a backup in-charge of every role.
  • Notifications process: The communication about the occurrence of an incident to the affected parties is an absolute must. The communication needs to flow up the command chain and across the organization so that they quickly take corrective steps and prevent further damage. The incident response plan should cover clear notification and communication plan along with designated contacts and timelines. It is critical that notification process is as simple as possible. Nobody should waste time in trying to decipher what the plan intends, while the data loss is going on.
  • Emergency activities: This part should list the process to be followed to stop the breach immediately. It could be a critical patch to the operating system or the security software (firewall or antivirus, etc.), or a pure isolation of affected system from the whole network. The emergency activities should include primary actions taken by each team for its area.
  • Incident closure: This part defines the core elements of what will determine the security incident closure. Is it the blocking of information leak (patching the software or isolating it from network), reporting and initiating the legal proceedings or restoration of service? The plan should indicate the point at which the emergency (incident) is declared over (and not before that).

Incident Plan Management

This is one of the most crucial parts of managing incidence. The job of incidence management team is not over by simply having a plan in place. Since new cyber threats appear every day, the incident response plan should be regularly re-evaluated to ensure that it meets the shifts in the business and threat environment. The effectiveness of the plan can be assessed using following criteria:

  • Number of incidents reported
  • Response time or time-to-live of an incident
  • Number of incidents successfully resolved
  • Attentiveness to security issues within the organization
  • Preventative techniques and security practices in place
  • Bench-marking against industry standards

Information security is a collective responsibility of every individual. An organization may nominate one person (CISO) or one team to spearhead the security initiatives. They cannot succeed unless everyone works in unison to mitigate the threats and emerge unscathed from the incidents. Should a data security breach occur, the Incident Management Plan helps organizations collaborate and cohesively handle emergencies.

Seqrite helps businesses simplify IT security and maximize business performance. To know more about our products and services visit our website. 

 Previous PostNeed for Security Expert at Senior Level: CISO
Next Post  Importance of Security Threat Intelligence
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • data privacy

    The What, How, and Why of Data Privacy

    January 24, 2025
  • How the Recent Health Insurance Data Breach Could Affect You – and What You Can Do About It

    October 14, 2024
  • Defending against APT attacks with endpoint security

    How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach

    September 27, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies