Purpose:
The purpose of this policy is to ensure that the organization is prepared to respond to and manage security incidents effectively and efficiently. This policy establishes the procedures, responsibilities, and guidelines for responding to security incidents, including the identification, assessment, containment, investigation, and resolution of incidents.
Scope:
This policy applies to all employees, contractors, and third-party individuals who use computing equipment owned or operated by the organization, including but not limited to laptops, desktops, servers, and mobile devices.
Policy Requirements:
Incident Reporting: All employees, contractors, and third-party individuals must report any suspected security incidents to the IT security team immediately. The incident report should include as much information as possible, such as the time and date of the incident, the type of incident, the affected systems or equipment, and the potential impact to the organization.
Incident Response Team: The IT security team will be responsible for responding to security incidents and will be the primary point of contact for incident reporting and management. The incident response team will work with other departments and teams, such as legal, communications, and human resources, as needed, to ensure a comprehensive and coordinated response to security incidents.
Incident Assessment: The IT security team will assess the severity and scope of the incident, determine the potential impact to the organization, and develop a plan for containment, investigation, and resolution. The incident response plan should include a timeline for response, a communication plan, and a clear set of goals and objectives.
Incident Containment: The IT security team will implement measures to contain the incident and prevent further damage to the organization's IT resources. This may include disconnecting affected systems from the network, isolating affected systems from the rest of the network, and taking other measures to prevent the spread of malicious software or other security threats.
Incident Investigation: The IT security team will investigate the incident to determine the root cause and gather evidence for later analysis and reporting. The investigation may include reviewing logs, conducting forensic analysis, and working with external experts, as needed.
Incident Resolution: The IT security team will work to resolve the incident, restore normal operations, and ensure that the affected systems and equipment are secure. This may include applying security updates, reconfiguring systems, or implementing new security measures, as needed.
Post-Incident Review: After the incident has been resolved, the IT security team will conduct a post-incident review to evaluate the incident response process, identify areas for improvement, and make recommendations for preventing similar incidents in the future.
Non-Compliance: Failure to comply with this policy may result in disciplinary action, up to and including termination of employment or contract.
Enforcement:
The IT security team is responsible for enforcing this policy and ensuring that all employees, contractors, and third-party individuals are aware of and comply with the incident response procedures. Regular training and awareness programs will be conducted to educate users on the importance of incident reporting and the procedures for responding to security incidents.
In order to facilitate the accurate and productive response to IT incidents, all IT incidents must be classified and assessed by the CIR for severity at their onset. If the CIR is not available, the CIO has the authority to make the classification. As the IT incident progresses its classification may be reevaluated and changed as necessary to ensure proper handling. In some cases, IT incidents may fall under multiple classifications. When this happens, the classification with the highest severity should generally dictate the course of IT incident response. In some cases, IT incidents may fall under multiple classifications. When this happens, the classification with the highest severity should generally dictate the course of IT incident response. The CIR is responsible for providing and maintaining appropriate IT incident classification guidelines and resolution procedures.
Reported events become IT incidents only after they have been received and evaluated by the CIR. All reported events should be sent first to the CIR for assessment and assignment. If this person cannot be reached, contact the IT Administrative Assistant. The CIR upon receiving a report is responsible for determining whether or not the event constitutes an IT incident. When the event has been determined to be a valid event, the IR team will begin its investigation.
To facilitate accurate reporting, handling, and record keeping, the CIR is responsible for providing a protocol by which the CIR, SSC, and reporters of potential IT incidents can communicate. The CIR should also maintain a record of communication and data collection for all events reported to the CIR. In addition, the CIR is responsible for providing a formal operations guide. This guide shall outline the specific processes and methods for handling IT incidents.
When any event is observed which appears to satisfy the definition of an IT incident, it must be reported to the CIR. If it is unclear as to whether or not an event constitutes an IT incident, such an event should be sent to the CIR for evaluation. Events that may constitute an IT incident may be reported to the CI R through one of the two following methods: Enter the information HERE or by email infosecurity@snow.edu. The person who reports the event, including complaints relayed on behalf of customers, should document and report any information about the event. The CIR is responsible for publishing all IT incident reporting guidelines and additional contact information. Absent these guidelines, all events that may constitute IT incidents should be reported directly to the CIR
Situations which are suspected to be crimes should be reported immediately to the appropriate law enforcement agencies by the person who possesses first-hand knowledge of the facts or circumstances related to a suspected crime. Those events which are suspected to be both a crime and an IT incident should be reported first to the appropriate law enforcement agencies, and then a notification that a police report has been filed should be sent to the CIR. However, it should be noted that in such situations the CIR would not generally act on the report unless asked to do so by said law enforcement agencies.
Students, faculty, and staff should report crimes to the Snow College Police Department. Those persons external to Snow College should report crimes to their local law enforcement agency.
After receiving a report, assessing its veracity, determining whether or not the event constitutes an IT incident, and classifying the IT incident, the CIR will determine if the IT incident warrants a formal response. IT incidents that do not warrant formal response will be remanded to the appropriate SSC for handling. All reported events or IT incident must be documented throughout the response process. If an event report does warrant formal IT incident response procedures by the CIR, it is the responsibility of the CIR to coordinate the appropriate resources for such response. If deemed appropriate by the CIR, a CIRT will be formed and led by the handler assigned to the IT incident. The CIR is responsible for documenting appropriate procedures for responding to event reports and IT incidents, and coordinating CIRTs.
In the course of responding to an IT incident it may be necessary, subject to applicable laws and College policies, to require the suspension of involved or targeted services or systems in order to:
Any equipment not owned by the College which is using College IT resources, and is found to be the target, source, or party to an IT incident may be subject to immediate suspension of services without notice until the issue has been resolved, or the subject system is no longer a threat.
This policy covers students, faculty, staff, and any 3rd party using Snow College IT resources. Any individual or entity using Snow College IT resources consents to all of the provisions of the preceding policy and agrees to comply with all of the terms and conditions set forth herein, all other applicable College policies, regulations, procedures and rules, and with applicable local, state and federal law and regulations. Violations of this policy or any other College policy or regulation may result in the revocation or limitation of IT resource privileges as well as other disciplinary actions and may be referred to appropriate external authorities.
Laws that influence and affect this policy include but are not limited to:
For questions about this policy, contact the Information Security Office: infosecurity@snow.edu
Failure to honor the requirements set forth in this policy may result in disciplinary or administrative action; including temporary or permanent loss of IT resource privileges and services.