Cyber Incident Response Plan (draft)
This is the initial draft of the plan and will change as it receives feedback.
Data Breach
If the incident is a suspected Data Breach, use the Data Breach Response planThis document is the key document for the Act step of the University’s Cybersecurity Strategy Framework. It is also used in the Report phase, which leads to the Prevent and Enhance phases. It provides:
- definitions and processes to determine the type of event
- procedures in the event of an incident
- an overview of communication(s) required
- indicators of regulatory and legal requirements for incidents
- mechanisms for organisational learning
Related documents and policies
- Cybersecurity Strategy Framework
- Data Breach Response Plan (DBRP)
- ACSC Cyber Incident Response Plan Guidance
Definitions
Incident progression
The following definitions are based on the ACSC definitions. The progression of an incident flows as follows:
Threat -> Event ( -> alert ) -> Incident
- Threat - “circumstance or event with the potential to harm systems or information”
- Event - “an occurrence of a system, service or network state indicating a possible breach of security policy, failure of safeguards or a previously unknown situation that may be relevant to security. A cyber security event has the potential to become, but is not confirmed to be, a cyber incident.”
- Alert - “a notification generated in response to a deviation from normal behaviour”
- Incident - “an unwanted or unexpected cyber security event, or a series of such events, that have a significant probability of compromising business operations. A cyber incident requires corrective action”
Due to the nature of the organisation, incidents would be categorised by ACSC as between C5 and C3 (see Appendix K)
Common types of Cyber Incidents
The following provides a set of incident types and their definitions. These are considered the most likely to occur to the University are addressed by the CIRP.
Type | Description | Response |
---|---|---|
Ransomware | a tool used to lock or encrypt victims’ files until a ransom is paid | activate CIRP |
Malware | a Trojan, virus, worm, or any other malicious software that can harm a computer system or network. | activate CIRP, enact Playbook (Malware Detected) |
Denial of Service (DoS) and | overwhelming a service with traffic, sometimes impacting availability. | Playbook: System Outages |
Phishing | deceptive messaging designed to elicit users’ sensitive information (such as banking logins or business login credentials) or used to execute malicious code to enable remote access. | notify individual, enact Playbook: Phishing Engaged |
Data breach | unauthorised access and disclosure of information | enact Data Breach Response Plan |
Roles and responsibilities
Cyber Incident Response Team (CIRT)
CIRT Role Title | CIRT Responsibilities | Name | Organisation Role |
---|---|---|---|
Cyber Incident Mgr | Planning, CIRT Ops | Rohan Edmeades | IT Manager |
Incident Responder | Investigation, Containment | Tyson Lloyd Thwaites | IT Support Engineer |
Communications, media | Information, Warnings, int/ext | Meg Nelson | Operations Manager |
Business Continuity Advisor | Business and stakeholder analysis | Peter Sherlock | Vice-Chancellor |
Record keeping | Logging, Evidence, reporting | Andrew Hateley-Browne | Digital Projects Officer |
Process
Detect
Due to the nature of the University’s servers and configuration, the majority of incidents will be not be detected by ourselves, but rather through notification by our vendors or service providers.
If there is evidence, through notification, logs, alerts, etc then investigation is necessary.
Investigate
Possible investigation questions include:
- Which system(s) has been affected?
- What was the initial intrusion vector?
- What post-exploitation activity occurred?
- Have accounts been compromised?
- What level of privilege were obtained?
- Does the actor have persistence on the network or device?
- Is lateral movement suspected or known?
- Where has the actor laterally moved to and how?
- How is the actor maintaining command and control?
- Has data been accessed or exfiltrated and, if so, what kind of data?
Classify
The next step in responding is to classify the incident. The following criteria are used in that determination:
Is a critical system offline? Where critical refers to:
- Authentication service
- Cloud storage of University documents
- Learning Management System
- Student Management System
- Online Library services
- Staff data system
What is the scope of staff impacted? (individual, group, all)
What is the scope of students impacted? (individual, group, all)
Is there a high likelihood of a data breach of student or staff personal or sensitive data?
What is the likely financial impact?
What is the likely impact to the University’s reputation?
Rate the incident as: Critical, High, Medium, or Low
Act
Containment
Documentation
For an incident classified as Critical or High For an incident classified as Medium or Low
Evidence Collection
Remediation to resolve the incident
- Do we Contain, Eradicate or Recover?
- Who will act to do this?
- What resources need co-ordination to achieve this?
Report
- See the reporting section below
- An incident report is to be written
Incident report
The following information is to be included in the Post-incident Report:
- Issue
- Impact
- Response
- Communications
- Known impacts
- Future avoidance
Prevent
- Does anything need to be updated in this Cyber Incident Response Plan or the Data Breach Response Plan?
- Could any form(s) of training reduce the impact of a similar incident in the future?
- What in the ‘future avoidance’ section of the Post-incident Report can be actioned?
Enhance
- Would any additional tools, software reduce the impact of a similar incident in the future?
- Could any form(s) of training reduce the impact of a similar incident in the future?
Communications and Reporting
Information on website. Notification to staff and/or students via email.
- Communication to the public and/or media is only to be made by SEMT
- The Media and Communications role works with SEMT to produce the information for release
- The SEMT Chair authorises the publication
Internal Communications
In the event of a major incident
- A brief summary of the incident and business impact
- Actions staff can take to assist (if applicable)
- Business continuity options for staff who are affected by the incident
- Messaging for external stakeholders
- Key points of contact for enquiries
- Expected time-frames for further updates.
External Communications
In the case of a significant incident external parties will likely need to be engaged in order to support our incident response. These may include government agencies, third party incident response, law enforcement and/or sector organisations.
- Stakeholders seeking information about the incident such as customers, government agencies, clients, shareholders, suppliers and/or sector organisations
- Media and the general public
- Other stakeholders, such as insurance providers.
Formal Reporting/Notifications
Incident type/ threshold | Organisation/ agency | Contact details | Key notifying requirements and link | Personnel responsible |
---|---|---|---|---|
Ransomware | ACSC | P: 1300 CYBER1; asd.assist@defence.gov.au | https://www.cyber.gov.au/acsc/report | IT Manager |
Notifiable Data Breach | Office of the Australian Information Commissioner | https://www.oaic.gov.au/privacy/notifiable-data-breaches/report-a-data-breach | ||
Notifiable Data Breach | TEQSA | via case manager | ||
Ransomware; Notifiable Data Breach | Cyber Insurance Co | via Operations Manager |
Legal and Regulatory Reporting
Document Control and Review
Author | Rohan Edmeades, IT Manager |
Owner | |
Date created | Sept 1, 2022 |
Last reviewed by | Rohan Edmeades, IT Manager |
Last date reviewed | Sept 4, 2023 |
Endorsed by and date | |
Next review due date |