Incident Response Standard
Incident Response Standard
ITS
Systemwide CISO Office
Systemwide IT Policy
Contents
1 Introduction ................................................................................................................................. 3
1.1 Background and Purpose ..................................................................................................... 3
1.2 Scope .................................................................................................................................... 3
1.3 Document Structure ............................................................................................................. 3
1.4 How to use this Standard ..................................................................................................... 3
1.5 Definitions and Key Terms ................................................................................................... 4
2 Incident Response Governance Requirements ........................................................................... 5
2.1 Overview .............................................................................................................................. 5
2.2 Information Security Incident Response Overview.............................................................. 6
2.3 Routine Incidents and Significant Incidents ......................................................................... 6
2.4 Incident Prioritization ........................................................................................................... 8
2.5 Lead Location Authority and Incident Response Team ....................................................... 8
2.6 Convening the Incident Response Team .............................................................................. 8
2.7 Informing Others about Incidents ........................................................................................ 8
2.8 Incident Reporting .............................................................................................................. 10
2.9 Testing the Information Security Incident Response Plan ................................................. 10
2.10 Review and Update .......................................................................................................... 10
3 Overall Program Requirements ................................................................................................. 11
3.1 Step 1: Preparation ............................................................................................................ 11
3.2 Step 2: Detection and Event Analysis................................................................................. 13
3.3 Step 3: Containment, Eradication and Recovery ............................................................... 13
3.4 Step 4: Post-Incident Activity ............................................................................................. 13
4 Location Information Security Incident Response Plan Requirements .................................... 14
4.1 Overview ............................................................................................................................ 14
4.2 Incident Response Team (IRT) ............................................................................................ 14
4.3 Consulting Counsel ............................................................................................................. 15
4.4 Information Security Incident Response Plan Requirements ............................................ 15
5 References ................................................................................................................................. 18
6 Appendix A - Roles and Responsibilities.................................................................................... 19
1 Introduction
Information Security Incident Response Program, which includes the response plan.
Section 4 details the requirements for the plan specifically.
1.5 Definitions and Key Terms
Breach: The unauthorized acquisition, access, modification, use or disclosure of
Institutional Information maintained by or for UC. Good faith acquisition of information
by a UC Workforce Member for the purpose of supporting the mission of UC is not a
breach of the security of the system provided that the information is not used for non-
UC purposes or subject to further unauthorized disclosure.
Cyber Incident Escalation Protocol: A required process used to ensure that appropriate
Incident communication occurs at the Location and from the Location to the UCOP
cyber leadership team, UCOP supporting departments/functions and the Regents of the
University of California. This process is related to, but separate from, the Location’s
Information Security Incident Response Plan.
Information Security Event (Event): An identified occurrence in a process, system,
service or network state indicating a possible breach of information security policy, a
possible breach of privacy policy, a failure of controls or a previously unknown situation
that may be relevant to security. This also includes alerts and notifications.
Information Security Incident (Incident): (1) A compromise of the confidentiality
(privacy), integrity or availability of Institutional Information in a material or reportable
way, whether caused by unauthorized action or accident. (2) A single event or a series of
unwanted or unexpected Information Security Events that have a significant probability
of compromising business operations or threatening information security. Incidents are
also called IT incidents, computer incidents, cyber incidents or security incidents.
Incident Communication Plan: A pre-scripted approach to informing others used to
respond promptly, accurately and confidently during an emergency and in the hours and
days that follow. The plan typically includes audiences, contract information,
management contacts, law enforcement contacts, supplier contacts, the community,
news media, responsible roles, approval processes, resources and scripted messages.
Information Security Incident Response Plan: The written document detailing the steps
required to address and manage an Incident.
Information Security Incident Response Program: The full, comprehensive effort to
prevent, prepare for and recover from Incidents. This includes, but is not limited to,
these elements:
● The Information Security Incident Response Plan.
● Acquiring the necessary tools (software, hardware, communication) and
supporting materials (e.g. safes, locking cabinets).
● Training.
● Establishing a formal Incident response capability and supporting
communication strategies.
● Developing Incident response procedures.
● Establishing rules and procedures regarding Incident-related information
sharing.
● Staffing the Incident Response Team (IRT).
● Determining which services the IRT can provide and which ones should be
obtained from Suppliers.
● Establishing Supplier relationships and completing Supplier prerequisites.
Routine Incident: A regularly occurring and low-risk Incident that can be handled
adequately through a repeating or triage process and does not require a larger Incident
response.
Significant Incident: A higher risk Incident that represents a material violation of policy,
a risk of data loss or a material impact to the confidentiality, integrity or availability of
Institutional Information or IT Resources.
For more information about definitions, consult the IT Policy Glossary.
2 Incident Response Governance Requirements
2.1 Overview
This section describes the establishment and oversight governance structure of the
required processes for Incident Response.
This section covers:
● Incident response overview and lifecycle.
● Handling Incident response.
● Defining Routine and Significant Incidents for the Location.
● Prioritizing Incidents.
● Appointing the Lead Location Authority (LLA).
● Appointing and convening the Incident Response Team (IRT).
● Following the UC Cyber Incident Escalation Protocol.
● Informing others about Incidents.
● Reporting Incidents.
● Testing the Location Information Security Incident Response Plan.
● Reviewing and updating the Location Information Security Incident Response
Plan.
Figure 1
1 This regulation includes data that reveals a natural person’s racial or ethnic origin, political
opinions, religious or philosophical beliefs or trade union membership. It also includes the
processing of genetic data or biometric data for the purpose of uniquely identifying a natural
person, data concerning health and data concerning a natural person’s sex life or sexual
orientation.
2 Incidents involving fewer individuals may still be “significant” or “high-visibility” (e.g., those
The LLA must establish and document the Information Security Incident Communication
Plan and delegate as needed, including:
● Noting communication used at the Location for Information Security
Incidents.
● Reporting the Incident in the Systemwide Incident Escalation Report and
Notification (SIREN) system and keeping SIREN up-to-date.
● Completing and submitting to c3@ucop.edu the document Reporting to
Location Leadership - Roles and Responsible Party.
● During a potentially Significant Incident, consult the UC Cyber Incident
Escalation Protocol for specific requirements regarding which Incidents are
recorded in SIREN, when they are recorded, who reports to the next level in
the organization and when the reporting occurs.
The LLA or their designee facilitates making the decision to notify law enforcement
agencies (e.g., UC Police Department, Federal Bureau of Investigation, California
Highway Patrol, Department of Homeland Security).
The LLA is responsible for consulting with Location leadership, Location Counsel and
Compliance and Privacy to make the decision to notify affected individuals and/or
regulatory agencies based on current laws, regulations or contracts requiring
notification. The LLA must also consult UC systemwide and Location policy regarding
breach notification and consider the risk of harm to the individuals impacted by the
breach. In some cases, even though law may not require notification, it may be prudent
to notify affected individuals.3
The LLA may designate Location resources and/or use the pre-approved notification
vendors to notify affected individuals.
Unit Head:
Upon initial determination of an Incident, the Unit Head or their Unit Information
Security Lead (UISL) must notify the CISO and/or the office designated by the Location.
Incident Response Team Coordinator:
The IRTC must:
● Consult with Location Risk Management/Services to determine eligibility and
coordination of insurance coverage for the Incident.
● Ensure that resources are assigned to respond to the Incident.
● Inform the Privacy Officer/Manager of potential impact to privacy.
● Compliance Officer/Manager of potential impact to compliance.
The IRTC may designate IT Resources and/or use the pre-approved forensic vendors to
conduct the forensic investigation and support the IRT.
The IRTC is responsible for ensuring that, if necessary, evidence is preserved and each
Incident is adequately documented. “Adequate” documentation is defined as that which
will stand on its own without requiring further explanation. The rationale to notify or
not to notify must be clearly documented.
Figure 2
This section describes the establishment of the overall Information Security Incident
Response Program.
This section covers:
● Preparation.
● Detection and Event Analysis.
● Containment, Eradication and Recovery.
● Post-Incident Activity.
The Location Information Security Incident Response Program must include
documented evidence of the following steps.
3.1 Step 1: Preparation
The LLA must document and establish an Information Security Incident Response
Program that encompasses the administrative and technical requirements outlined
below.
● Administrative Details
o Develop and update the Location Information Security Incident
Response Plan and the Information Security Incident Response Program.
Examples of updates include, but are not limited to:
● Contacts, including changes in roles or assignments.
● Noting trends in Routine Incidents that could indicate
weaknesses in defense- and response-related controls and
plans.
o Develop, update and test plans for Incident prevention (e.g., tools and
procedures focused on protecting Institutional Information and IT
Resources from cyber attack and user error).
o Ensure detection measures are in place.
o Develop method(s) for reporting an Information Security Event or
Incident (e.g., ServiceNow, email, web form, etc.).
o Locations must document the rationale used to establish which types of
Incidents will be classified as Routine Incidents.
3.2 Step 2: Detection and Event Analysis
The LLA must document and establish an Information Security Incident Response
Program that encompasses:
● Verifying that detection tools and processes are working as expected.
● Verifying that Institutional Information and IT Resources are properly protected.
● Designating the party responsible for detecting Significant Incidents.
● Verifying that Information Security Events are analyzed and Information Security
Incidents are properly identified.
3.3 Step 3: Containment, Eradication and Recovery
The LLA must document and establish an Incident Response Program that encompasses:
● Establishing criteria for determining an appropriate containment strategy. Criteria
may include:
o Incident type and Incident severity.
o Potential damage to Institutional Information and IT Resources.
o Need for evidence preservation.
o Service availability (e.g., data availability, network connectivity, services
provided to external parties).
o Time and resources needed to implement the strategy.
o Effectiveness of the strategy (e.g., partial containment, full
containment).
o Duration of the solution (e.g., emergency workaround to be removed in
four hours, temporary workaround to be removed in two weeks,
permanent solution).
o Possible side effects of containment.
● Identifying Suppliers or other UC Locations that can assist in containment,
eradication and recovery.
● Verifying that backups and restores work as expected for Essential Systems.
● Verifying that fail-over or mirrored Essential Systems can be placed into
production.
● Completing and updating business continuity plans related to Essential
Systems.
● Reviewing forensic information to ensure that the Incident does not impact
the ability to use backup or mirrored systems and Institutional Information.
3.4 Step 4: Post-Incident Activity
The LLA must document and establish an Incident Response Program that encompasses:
4 https://www.ucop.edu/information-technology-services/initiatives/it-policy-and-security/uc-
security-incident-response-coordination.html
5 https://www.us-cert.gov/Government-Collaboration-Groups-and-Efforts
(GDPR), the duty to notify certain federal contracting parties within one
hour of discovery, the duty to notify payment card processors or
merchant banks of certain payment card incidents within 24 hours,
etc.).
7. Note how and when to account for special circumstances, such as:
a. In the case of a suspected insider threat and/or when a particular
Incident Response Team member is a person of interest, the Incident
Response Coordinator, LLA or CRE will remove that person from the
Incident Response Team.
b. At the determination of the LLA, some individuals or teams may not
lead investigations within their own areas of responsibility in order to
avoid possible conflicts of interest.
8. Establish the process for coordination with:
a. Location Counsel.
b. UCOP’s Cyber-risk Coordination Center (C3).
c. UCOP’s Office of General Counsel (OGC).
9. Develop a plan for post-Incident activity.
a. Evaluate lessons learned.
b. Report findings.
c. Conduct Incident follow-up.
d. Take required technical actions.
e. Review procedures and team effectiveness.
f. Develop recommendations and next steps.
10. Plan for periodic testing of the Information Security Incident Response Plan.
5 References
UC Policy
IS-3, III Section 16.1 Management of Information Security Incidents and corrective
action
UC Standards
UC Institutional Information and IT Resource Classification Standard
External Resources
NIST SP 800-61 - Computer Security Incident Handling Guide -
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf
ISO/IEC 27002:2013 - Information technology -- Security techniques -- Code of practice
for information security controls – Section 16 Information security incident
management
16.1 Management of information security incidents and improvements
16.1.1 Responsibilities and procedures
16.1.2 Reporting information security events
16.1.3 Reporting information security weaknesses
16.1.4 Assessment of and decision on information security events
16.1.5 Response to information security incidents
16.1.6 Learning from information security incidents
16.1.7 Collection of evidence
ISO/IEC 27035:2016 — Information technology — Security techniques — Information
security incident management — Part 1: Principles of incident management
ISO/IEC 27035:2016 — Information technology — Security techniques — Information
security incident management, — Part 2: Guidelines to plan and prepare for incident
response
Role Responsibility
Role Responsibility
Legal Counsel The advisor on legal risks and obligations who serves as the
- Location liaison with OGC. Provides advice on the extent and form of all
disclosures to law enforcement and the public. Makes
determinations related to the scope and nature of
investigations.
Unit Head Responsible for ensuring that Unit resources and the Unit
Information Security Lead support Incident response. In
coordination with the IRTC, communicates with key
stakeholders and sponsors or contracted parties.