Menu 

Does Your Company’s Incident Response Plan Include These Six Steps?

Does Your Company’s Incident Response Plan Include These Six Steps?

Businesses need to operate under the assumption that unauthorized attackers are constantly trying to get into the company’s systems, and have an incident response plan in place to handle such intrusions if and when they occur.

Ideally, your incident response plan will be able to effectively limit damage caused by an attack, reduce recovery time and the costs that go with it, and provide peace of mind for key stakeholders of your company.

Incident response plans include six key steps:

1. Preparation

Implementing defenses against unauthorized intrusions or attacks is an important step, but it would be naïve to think any technology tools are impenetrable.

Preparation should include assigning an executive who has responsibility for integrating incident response activities and efforts across your organization, developing procedures and guides to handle potential scenarios, and training key personnel on the plan. Periodically conducting simulated attacks is one of the best ways to identify weaknesses in your response plan and refine your capabilities.

2. Identification

When an incident occurs, identifying it, and determining its nature and scope are critical. A misstep at this stage could leave additional information vulnerable, so make sure your plan involves a thorough evaluation of the type of incident (i.e. network attack, threat from inside the company, data theft, etc.)

Determine the scope of the attack, and evaluate whether (and what type of) action is warranted or necessary.

3. Containment

Once you have identified the nature and scope of the incident, locking it down is critical, as doing so can limit damages. This step involves notifying key personnel in the company and implementing the specific containment procedures for the type of incident that has occurred.

The faster the containment stage, the better. As you evaluate your incident response plan, consider whether you have the right internal and external resources to effectively isolate and contain an information security threat.

4. Eradication

The eradication or remediation stage of any incident response will need to be specifically tailored to the actual threat or incident itself. This may involve taking action against employees, removing malicious code, etc.

Conduct a forensic analysis and identify what went wrong, so you can address any weaknesses in your information security infrastructure.

5. Recovery

Getting systems back to production as quickly, and as safely, as possible should be the ultimate goal for your incident response plan. After eradicating the threat, get systems up and running again.

Don’t make assumptions about the effectiveness of your containment and eradication efforts, though. Continuously monitor systems to detect any further (or new) issues.

6. Learning from the Incident

Finally, information security incidents can provide valuable information that can help strengthen your company’s plan and procedures for future incidents.

Conduct a “post-mortem” to identify what happened, where weaknesses were exploited, whether certain actions could have prevented the attack, and how you can prevent similar incidents in the future. Evaluate and fine-tune your team’s performance implementing your incident response plan, too.

Intrinium can Help Your Company Defend Against Information Security Attacks and Respond When They Occur

In spite of the best preventive efforts, information security attacks may still occur. At Intrinium, we can help you analyze your preparedness for an attack and help develop a holistic incident response plan. If you are concerned that an attack may have occurred, we can help you identify and implement steps to resolve and learn from the issue.

To learn more, contact Intrinium online, or call us at 866-461-5099 today.

Submit a Comment

Pin It on Pinterest

Share This