Incident Response Plan
Incident Response Plan
Incident Response Plan
GAMA
Jeddah-Saudi Arabia
Approval Date:
17/Apr/2024
Prepared by:
Ghofran Ahmed Alkhaldi
The information contained in this report was derived from proprietary data provided by:
GAMA Ltd
1.0
Contents
1.0 Overview............................................................................................................................................5
2.0 Purpose...............................................................................................................................................5
3.0 Scope..................................................................................................................................................5
4.0 Incident Response Team....................................................................................................................5
4.1 Roles and Responsibilities...............................................................................................................5
4.1.1 Information Response Coordinator (IRC) – My Company Information Security Officer...6
4.1.2 Incident Response Team (IRT) / IT Steering Committee....................................................6
4.1.3 Extended Team.....................................................................................................................6
4.1.4 Board of Directors................................................................................................................6
5.0 Incident Response Preparation...........................................................................................................6
5.1 Process (Governance, Documentation, and Risk Management).....................................................6
5.2 Technology......................................................................................................................................6
5.3 People..............................................................................................................................................6
6.0 Incident Response Plan......................................................................................................................7
6.1 Categories of Information................................................................................................................7
6.1.1 Public....................................................................................................................................7
6.1.2 Internal Use Only.................................................................................................................7
6.1.3 Confidential..........................................................................................................................7
6.1.4 Restricted..............................................................................................................................7
6.2 Incident Types.................................................................................................................................7
6.2.1 Specific Information Technology Incident...........................................................................7
6.2.2 Service Provider Incident.....................................................................................................7
6.2.3 Physical Theft or Loss Incident............................................................................................8
6.3 Threat Intelligence Program............................................................................................................8
6.4 Information Technology Incident Identification Matrix.................................................................9
6.4.1 Incident Severity Levels.......................................................................................................9
6.4.2 Incident Identification Matrix.............................................................................................10
6.5 Escalation Procedures....................................................................................................................11
6.5.1 Escalation Level 1 - Minimal Escalation............................................................................11
6.5.2 Escalation Level 2 - Low Escalation..................................................................................12
6.5.3 Escalation Level 3 - Medium Escalation............................................................................12
6.5.4 Escalation Level 4 - High Escalation.................................................................................13
1.0
1.0 Overview
My Company management understands not all threats to the Organization can be mitigated and a prudent
management practice is to have a comprehensive Incident Response Plan (IRP). A comprehensive Incident
Response Plan is necessary to ensure appropriate actions are taken in the event of an information security
incident.
2.0 Purpose
Incident Response is the process of planning, documenting, and communicating procedures to react to an
information security incident. Incident Response is necessary because, throughout the world, attackers frequently
compromise customer and business data. The following benefits are the results of having an effective Incident
Response capability:
1. Respond to incidents in a documented chronological order to ensure appropriate steps are taken.
2. Recover quickly and efficiently from information security incidents with a goal of minimizing loss or
theft of information and disruption of services.
3. Communicate promptly notifying customers and regulatory authorities if misuse of customer
information is reasonably suspected and/or has been confirmed.
4. Coordinate legal questions and/or business issues that may arise during incidents.
5. Enhance current operations by utilizing information gained during Incident Response to better
prepare for future incidents and provide stronger protection for information systems and data.
3.0 Scope
The scope of this Incident Response Plan is to document the most common or most probable types of incidents
and outline a framework for response actions. This plan will address both internal and external threats. It is
unrealistic to detail actions for every potential type of breach; however, the IRP has been designed to encompass
highly probable security incidents in a framework that can be customized for the specific incident. If an incident
occurs that is not specifically outlined, this plan will serve as a guideline for formulating the appropriate response.
This plan is also to be followed, as appropriate, if notification has been given by a service provider of a security
breach within their organization.
4.0 Incident Response Team
4.1 Roles and Responsibilities
The purpose of My Company’s Incident Response Team is to:
Protect My Company’s Information assets.
Provide a central organization to handle incidents.
Comply with (government or other) regulations.
Prevent the use of My Company’s systems in attacks against other systems (which could cause us to
incur legal liability).
Minimize the potential for negative exposure.
This section will identify roles and responsibilities of each member of the IRT. The Information Security
Officer will be the managing member of this team, and all other members will provide support to the
Organization during an incident. The IT Steering Committee will be involved, following the incident, to
review reports and make any needed changes to the Information Security Program (ISP) to reduce the
likeliness of a repeat incident. The Board of Directors will review all reports and approve any changes to
the ISP. The CEO has been designated to handle all communications with the media; if the CEO is unable
to do this, the Chairman of the Board will designate another team member.
For Incident Response Team Contact Information, see
Internal or
Threat Intelligence Source Website
External
Escalation
Level Affected Team(s) Description
Normal Operations. IT Staff monitoring for
Minimal (0) IT Staff
alerts from various sources
A threat has been discovered, determine
Low (1) IT Staff/Assessment Team defensive action to take. Message
employees of required actions if necessary.
A threat has manifested itself but is
contained to a minimal footprint (single or
Incident Response multiple devices or a network segment).
Determine course of action for containment
Management/Coordinator
Medium (2) and eradication. Message employees of
IT Staff/Assessment Team
required actions if necessary. Prepare for
Communications Team delivery any customer notification that may
be necessary. Notify appropriate authorities
of the incident.
Threat is widespread or impact is
Incident Response significant. Determine course of action for
containment and eradication. Message
Management/Coordinator
employees. Prepare to take legal action for
High (3) IT Staff/Assessment Team
financial restitution etc. Prepare for delivery
Communications Team
any customer notification that may be
Extended Team necessary. Notify appropriate authorities of
the incident.
Table 6.5: Escalation Levels
ensure they are free from infection before re-deploying anything back to a production
network.
o Consider a digital forensics investigation to determine the scope, depth, breadth, and
causes of the attack.
o Mitigate the exploited vulnerabilities for other hosts on the institution’s network.
5. Recover from the incident.
o Analyze results of the digital forensic investigation (if applicable).
o Determine if any confidential customer information was accessed. Notify as necessary.
o Check with insurance agency to determine if any losses are covered.
o Create a post-incident report and hold a lessons-learned meeting with key staff to
determine necessary improvements to the Incident Response Plan.
o Share information with FS-ISAC or other industry intelligence sharing communities.
o Report to the FBI/IC3 (if not involved already).
o Plan for future ransomware incidents and test the plan periodically.
6. Document the incident.
o Continue maintaining the Chronological Log of Events.
o Fill out Incident Response Form.
o Report to the Board of Directors.
6.6.3 Inappropriate Usage Incident
1. Report the incident to the Incident Response Coordinator (IRC).
2. Acquire, preserve, secure, and document evidence.
3. Document the incident.
o Fill out Incident Response Form (Section 11.0 Incident Response Form).
4. Contact Law Enforcement if applicable (See Section 6.6.4 Inappropriate Usage Matrix).
5. Contain and eradicate the incident.
o If applicable, contain and eradicate the incident, e.g., remove inappropriate materials; (See
Section 6.6.4 Inappropriate Usage Matrix).
6. Secure Sensitive Customer Information.
o Ensure the security of customer information (see Section 7.1 Evaluation).
7. Customer Notification.
o Utilizing the templated Incident Response Letters as a starting point, customize the letter
based upon the steps detailed in Section 7.2 Customer Notification and obtain appropriate
internal reviews prior to distribution.
8. Suspicious Activity Report.
o If applicable, file Suspicious Activity Report “SAR” (see Section 7.3 Suspicious Activity
Report).
9. Document the incident.
o Continue maintaining the Chronological Log of Events.
o Fill out Incident Response Form.
o Report to the Board of Directors regularly.
10. Hold a Lessons Learned Meeting.
6.6.4 Inappropriate Usage Matrix
The following is a matrix to assist in identifying which external contacts to information depending on the
type of inappropriate usage; see Section 9.0 – Contact Information for the phone numbers. Contact
external agencies in the order listed below for they may provide additional guidance on contacting other
Internal Information 16 Powered by TRAC™
Do Not Distribute © 2024 SBS Cybersecurity
Incident Response Plan My Company –
agencies.
Incident Action Evidence External Contact
General AUP Violation Warning n/a n/a
Resource Abuse Warning n/a n/a
Harassing Material Warning Remove n/a
Warning or
Pornographic Material Remove n/a
Termination
County Law Enforcement
Child Pornography Termination Preserve
FBI
County Law Enforcement
Financial Crime (Embezzle- Termination FBI
Preserve
ment, Fraud, etc.) SAR FDIC
Customer Notification
6.6.5 Unauthorized Access Incident
1. Report the incident to the Incident Response Coordinator (IRC).
2. Perform an initial containment of the incident (e.g. disconnect internet service).
3. Acquire, preserve, secure, and document evidence.
4. Document the incident.
o Fill out Incident Response Form (Section 11.0 Incident Response Form).
5. Secure Sensitive Customer Information.
o Ensure the security of customer information (see Section 7.1 Evaluation).
6. Confirm the containment of the incident.
o Further analyze the incident and determine if containment was sufficient (including
checking other systems for signs of intrusion).
o Implement additional containment measures if necessary.
7. Eradicate the incident.
o Identify and mitigate all vulnerabilities that were exploited.
o Remove components of the incident from systems.
8. Recover from the incident.
o Return affected systems to an operationally ready state.
o Confirm that the affected systems are functioning normally.
o If necessary, implement additional monitoring to look for future related activity.
9. Customer Notification.
o Utilizing the templated Incident Response Letters as a starting point, customize the letter
based upon the steps detailed in Section 7.2 Customer Notification and obtain appropriate
internal reviews prior to distribution.
10. Suspicious Activity Report.
o If applicable, file Suspicious Activity Report “SAR” (see Section 7.3 Suspicious Activity
Report).
11. Document the incident.
o Continue maintaining the Chronological Log of Events.
o Fill out Incident Response Form.
o Report to the Board of Directors regularly.
12. Hold a Lessons Learned Meeting.
Internal Information 17 Powered by TRAC™
Do Not Distribute © 2024 SBS Cybersecurity
Incident Response Plan My Company –
Unlimited Operations
1. Report the incident to the Incident Response Coordinator (IRC).
2. Contain the incident – disable devices if possible.
Contact <ATM Provider> to disable devices.
Contact <ATM Processor> to halt processing of additional transactions.
3. Prioritize handling the incident based on the business impact.
Estimate the current and potential effect of the incident.
4. Contact law enforcement.
Contact local law enforcement (see Section 9.1 Government Agencies)
Contact FBI (see Section 9.1 Government Agencies)
Contact FDIC (see Section 9.1 Government Agencies)
5. Suspicious Activity Report.
If applicable, file Suspicious Activity Report “SAR” (see Section 7.3 Suspicious Activity
Internal Information 21 Powered by TRAC™
Do Not Distribute © 2024 SBS Cybersecurity
Incident Response Plan My Company –
Report).
6. Document the incident.
Fill out Incident Response Form (see Section 11.0 Incident Response Form).
7. Document the incident.
Continue maintaining the Chronological Log of Events.
Fill out Incident Response Form.
Report to the Board of Directors regularly.
8. Hold a Lessons Learned Meeting.
5. Return to previous incident response procedure and complete the remaining steps. After
completing those procedures resume this procedure.
6. Notify customers; (see Section 7.2 – Customer Notification).
7. Complete the Suspicious Activities Report (SAR), (see Section 7.3 Suspicious Activity Report).
7.2 Customer Notification
If the Organization determines that misuse or unauthorized access to customer information has occurred or is
reasonably possible, customers should be notified of the incident involving their information immediately
following the resolution of the incident. This notification can be limited to those customers which the
Organization can determine are affected by the incident. However, if the Organization cannot determine
which customers are affected, all customers shall be notified. Notification can be delayed if requested by a
government agency; this request must be given to the Organization in writing. Customer notification should
include the following:
1. General description of the incident.
2. Type of customer information that was misused or subject to unauthorized access.
3. Steps taken to protect customers’ information from this incident.
4. Contact and telephone number for further information and assistance.
5. Remind the customer they need to remain alert for at least 12 to 24 months for indications of
possible identity theft and suspicious activity. They must immediately report any such activities to
the Organization.
6. Recommend the customer to review account statements and immediately report suspicious activity
to the Organization.
7. Inform customers about fraud alerts and advise them to place them on their credit reports.
8. Recommend the customer review credit reports; these can be obtained for free.
9. Provide additional guidance, such as www.ftc.gov/IDTheft.
Customer notifications must be delivered in a manner that the customer can reasonably expect to receive it.
Generally, customer notifications are delivered by mail, but it is also acceptable to individually phone each
customer. Customers could also be notified by email if the customer has given consent to receive
communications electronically. The Organization may also wish to include along with their notification letter a
copy of the Reference Contacts document.
The FDIC also encourages financial institutions to notify the nationwide consumer reporting agencies prior to
sending notices to a large number of customers that include contact information for the reporting agencies;
(see Section 9.1 Government Agencies).
Once customers receive their notification letter, the Organization will more than likely receive multiple phone
calls. It is important that the Organization inform their employees of the situation and provide them enough
information to answer customer’s questions. In order to ensure employees know how to respond to customer
questions, scripted talking points will be created. This will be distributed to all employees prior to customer
notification letters being mailed. Additionally, an employee meeting may be held to discuss the incident and
talking points.
7.3 Suspicious Activity Report
Suspicious Activity Report (“SAR”) regulations require the Organization to file a report whenever a computer
intrusion occurs. SAR regulations define computer intrusions as “gaining access to a computer system of a
financial institution to:
1. Remove, steal, procure or otherwise affect funds of the institution or the institution’s customers;
2. Remove, steal, procure or otherwise affect critical information of the institution including customer
account information: or
3. Damage, disable or otherwise affect critical systems of the institution.”
SAR regulations also require the Organization to file a report whenever there is insider abuse of any amount.
Reports must be filed within 30 days if a suspect has been identified and within 60 days if a suspect has not
been identified. For more information about the requirements of SAR and information about filing the report,
please see the Suspicious Activity Report.
8.0 Incident Response Team Contact Information
Internal Information 27 Powered by TRAC™
Do Not Distribute © 2024 SBS Cybersecurity
Incident Response Plan My Company –
Incident Details
Type of Incident: Malicious Code Inappropriate Usage
Unauthorized Access Denial of Service
Physical Theft or Loss Other (provide additional information)
Service Provider Incident
Additional Information:
Description:
Has the Incident Response Team been Has the Board of Directors been
Yes No Yes No
notified? notified?
Customer Information
Was Sensitive Customer Information If yes, has misuse of the information occurred or is it
Yes No Yes No
involved? reasonably possible that misuse will occur?
Resolution
Outcome / Resolution:
Recommended changes to
policies / procedures:
Other Notes:
Approval
<Date>
<Organization Address>
Dear Cardholder:
It has recently been brought to our attention that there has been a possible compromise that involves
unauthorized access to cardholder account information.
MasterCard® has detected a security breach of a merchant database which contained your debit card
information. We have not been informed of the merchant location in which this compromise took place.
The result is a potential risk of fraudulent debit card activity on your account.
In order to mitigate this risk, we will be canceling your current debit card and issuing a new card.
The following are some steps that you may wish to take to protect yourself and your accounts against
future fraudulent attempts:
- Never provide personal account information to anyone contacting you by telephone, e-mail, or
through a text message.
- Carefully examine all billing statements to verify and confirm the charges listed. If anything looks
suspicious, promptly report the incident to us or to the financial institution that issued the card.
- The Federal Trade Commission (FTC) has a Web site dedicated to identity theft. It is
www.consumer.gov/idtheft. You may also call the FTC at (877)382-4357 to obtain identity theft
guidance or to report suspected incidents of identity theft.
- It is important to obtain free yearly copies of your credit reports. Each consumer is entitled to one free
report from each of the credit reporting agencies. To easily get your free copies, you may either access
the Web site at www.annualcreditreport.com or call (877) 322-8228.
- Contact information for the three major credit bureaus is: Equifax; PO Box 740241; Atlanta, GA 30374;
1-800-685-1111: Experian; PO Box 2002; Allen, TX 5013; 1-888-397-3742: TransUnion; PO Box 1000;
Chester, PA 19022; 1-800-888-4213.
While My Company’s records were not compromised, we take our obligation seriously of informing you
of any potential risk to your account. Please be assured that My Company is committed to the security
of your personal information and has the highest security standards in place.
Sincerely,
<Contact>