Security Incident Response Report Format
Report Date:______________
|
Report Time:____________
|
Trouble Ticket #:____________
|
Reported By:____________
|
Incident Severity Definition:____________
|
(Note: Critical and major incidents require paging the SIRT Team Leader immediately.)
A. Incident Response Data Collection
This portion of the security incident documentation is concerned with documenting the "when" and "what" for the particular incident. Critical and Major security breaches or incidents will require SIRT Team Leader involvement.
- State the date and time when the incident was first discovered.
- State who first discovered the incident.
Name:____________
|
Organization:____________
|
Email:____________
|
Phone:_________________
|
- State how the incident was discovered and describe any symptoms or abnormalities that were identified.
- Describe the security incident and any immediate threats that it poses and classify the Security Incident as Critical, Major, or Minor based on its Incident Severity Definition as defined by the organization.
- Did the security incident involve unauthorized access to a production system (for example, web server, LAN application server, network device, or mainframe-based system)? If yes, state the data-classification level that was compromised based on the custodian's data classification definition.
- Specify the systems, servers, applications, and data that may have been compromised during the security incident.
- Specify the hardware, software, applications, and other systems that were involved in the security incident. Provide as much detail as possible and obtain a copy of the system's log or audit files of all systems affected (for example, IDS/IPS, routers, switches, hubs, servers, systems, and so on).
- Determine whether the security incident was conducted internally or externally to the IT infrastructure. Provide detail and supporting evidence to confirm.
B. Incident Response Forensics
This portion of the security incident documentation is concerned with documenting the "where," "why," and "what" for the particular incident. Critical and Major incidents will require SIRT Leader involvement in an effort to capture data and information that may be used as evidence in a court of law if a violation of a law, mandate, or regulation occurred.
- Identify the source IP address or source IP network that the security incident came from, if possible. By examining the source IP address of the IP packets that the security incident originated from, information about the source of the attack may be provided.
- For the systems and applications that are being compromised (real-time) or that were compromised, the SIRT Team Leader must make the following decisions:
- If the security incident is occurring in real-time, the SIRT Team Leader may decide to monitor the security incident rather than remove the system from the production environment to capture more data and determine the source of the perpetrator. This must be done under careful scrutiny to monitor the system access and maintain the integrity of the system's log files.
- For non-real-time security incidents, the SIRT Team Leader may decide to remove the system from the production environment in an effort to preserve and document the affected systems and any unauthorized manipulation or violations of the organization's policies.
- Preserving in its original, compromised state the audit and log files for all systems, application, data manipulation or loss, and other pertinent damage that may have occurred is critical. Under the guidance of the SIRT Team Leader, document the steps and actions that were taken, such as the following:
- What actions were taken to preserve the affected systems, applications, and data?
- What actions were taken to preserve the affected system log files? Specify whether these were tampered with or left in their original condition.
- What other information about unauthorized access, systems compromised, and violations of the organization's security policies were identified? Identify and document all known violations.
- Which systems in any of the seven areas of information security responsibility were taken offline in an effort to preserve the affected systems, applications, and data?
- For enterprisewide systems and applications that were compromised, which services and processes were removed from the production network environment?
- Which systems and servers were physically or logically disconnected from the production network environment?
- For systems and servers that were compromised via a User or System Administrative level account, isolate the login ID and password that was compromised and delete or make an immediate change to the login ID and password.
- Systems, resources, and data that have been compromised should be taken offline so that a thorough investigation of the affected systems and data can be conducted to assess any damage or tainting of data. This may require the system, resource, or data to be recovered as per the organization's backup and recovery procedures.
- Prepare the Security Incident Response Report and keep all information and the details of the investigation confidential between the SIRT and the organization's executive management (CEO, CIO, CSO) prior to informing any other party. The SIRT Leader will decide who needs to be informed of this security incident based on the nature of the incident.
|