An organization’s incident handling efforts are normally guided by an incident response plan. Typically, plans are created and executed by a computer security incident response team (CSIRT) made up of stakeholders from across the organization.
The CSIRT team might include the chief information security officer (CISO), security operations center (SOC), security analysts and IT staff. It may also include representatives from executive leadership, legal, human resources, regulatory compliance, risk management and possibly third-party experts from service providers.
The Cost of a Data Breach Report notes that, “By investing in response preparedness, organizations can help reduce the costly, disruptive effects of data breaches, support operational continuity and help preserve their relationships with customers, partners and other key stakeholders.”
An incident response plan usually includes:
The CSIRT might draft different incident response plans for different types of incidents, as each type might require a unique response. Many organizations have specific incident response plans pertaining to DDoS attacks, malware, ransomware, phishing and insider threats.
Having incident response plans that are customized to an organization’s environment, or environments, is key to reducing the time to respond, remediate and recover from an attack.
Some organizations supplement in-house CSIRTs with external partners providing incident response services. These partners often work on retainer and assist with various aspects of the overall incident management process, including preparing and executing incident response plans.