Information Security Incident Response Procedures
Information Security Incident Response Procedures
1.0 PURPOSE
The purpose of this document is to outline procedures and guidelines for responding to
CSUN information security incidents. This procedure allows for a coordinated response
from Information Security, the Computer Security Incident Response Team (CSIRT), and
others involved in investigation plus a follow-up of reported information security incidents.
2.0 SCOPE
This procedure applies to responses to all CSUN information security events reported to the
IT information security team and covers both the CSUN and its auxiliary organizations.
3.0 RESPONSIBILITY
4.0 PROCEDURE
4.1 IT ISO will receive an incident from many areas: Help Desk, Network Operations, Campus
Divisions, and the public. The IT ISO will assign the incident severity level, or assess the
incident severity level assigned by the Help Desk or a member of the Office of Information
Security.
4.3 The ISO or designee will immediately contact the individual that has reported the incident to
obtain an initial understanding of the scope of the incident. As needed, the ISO will call an
emergency CSIRT meeting to determine appropriate next steps and the ISO or designee will
prepare a CSIRT interim report, which will include a description of the incident , the number
of individuals affected, and the remedial steps that will be taken to address the cause of the
incident. Legal counsel will be engaged if necessary.
4.4 The ISO will inform the CIO. Either the ISO or the CIO will inform the campus President
and the ISO at the Chancellor’s Office.
4.5 If the decision is made to notify impacted individuals, the notification process must be
approved by University Advancement and other stakeholders as necessary. The notification
letter will be mailed by return receipt having the receipt responses directed to the ISO.
Notifications will be sent with certified mail return receipt requested for groups involving
less than fifty (50) individuals being notified. For groups larger than fifty (50) the most
effective method of notification will be determined.
4.6 The liability for the costs associated with production and dissemination of the notification
letter are the responsibility of the department(s) responsible for controlling access to and
security of the system(s).
4.7 If notices are sent to more than 10,000 individuals, the following consumer credit reporting
agencies shall be notified:
a. Experian: E-mail to [email protected]
b. Equifax: E-mail to lanett [email protected]
c. TransUnion: Email to [email protected] m with “Database Compromise” as the
subject CSIRT
4.8 University Advancement will prepare talking points to use if necessary in response to
campus or media questions. Talking points should be shared with the following people:
President
Cabinet
ISO
CSIRT
Designated individuals responding to any phone calls, emails, letters, and/or
walk-in traffic:
a. In general talking points will direct faculty and staff as follows:
i. Do not to offer unsolicited information or comments to the media
ii. Advise the inquirer that the incident is under investigation (if this
is the case)
iii. Direct the inquirer to a web site for incident information
iv. Direct inquirers from external law enforcement to CSUN
University Police
v. Direct inquirers from the media to the Public Relations Director
4.9 The ISO or designee will prepare a final written report to share with the CSIRT team,
including recommendations to the management staff of the campus unit for addressing the
causes of the incident.
4.11 For severity Medium Incidents the owner(s) or /operator(s) of the affected hosts should be
directed to disconnect the device/system from the network but not to use, modify or update
the device/system in any way until Information Security has contacted them to provide
further instructions.
4.12 The ISO or designee will immediately contact the individual that has reported the
information to obtain an initial understanding of the scope of the incident. The ISO will
review the severity of the incident and determine if a CSIRT meeting needs to be called to
determine appropriate next steps.
4.13 The stakeholders of the incident will be notified and depending upon the impact to the
campus the notification process may also involve the Vice President for Information
Technology/ CIO, the Vice President for University Advancement, and the President of the
University.
4.14 The ISO may be a primary incident handler to complete the appropriate actions for a medium
incident.
Low Severity can be handled within IT and do not require escalation outside of IT. Examples
include:
4.16 The ISO or designee will immediately contact the individual that has reported the
information to obtain an initial understanding of the scope of the incident.
4.17 The ISO may assign a primary incident handler to complete the appropriate actions for a low
incident.
a. Coordination of the incident may include but is not limited to the following:
Perform a preliminary analysis of the incident identifying incident
cause, personal and university information at risk, collection of
evidence, remedial action, and recommendations.
Examine incident computers or systems.
Remove the incident computing system from the campus network if
necessary.
Coordinate additional assistance to provide and to preserve incident
evidence.
Investigate information on web-site defacement.
Notify or alert campus users if newly reported vulnerabilities are
identified on operating systems, server or services, applications, or
network devices.
b. If the primary incident handler cannot be reached or does not confirm that they are
responding to the incident in the necessary time, than the incident should be escalated to
the ISO and then to the VP for Information Technology/CIO or designee.
c. A final report on the findings, causes, future concerns, and countermeasures will be
completed upon closure of high and medium level incidents.
5.0 DEFINITIONS:
Computer Securit y Incident Response Team (CSIRT) - The team responsible for the coordination
and management of all High and some Medium incident responses. CSIRT is a team made up with
members from the following Campus areas, Internal Audit, Risk Management, CSUN University
Police, University Counsel, Public Relations, Information Security and the CIO.
Digital Millennium Cop yright Act (DMCA) - A United States copyright law which implements
two 1996 World Intellectual Property Organization (WIPO) treaties. It criminalizes production and
dissemination of technology, devices, or services that are used to circumvent measures that control
access to copyrighted works commonly known as Digital Rights Management (DRM) and
criminalizes the act of circumventing an access control, even when there is no infringement of
copyright itself.
Event - An observable occurrence; an aspect of an investigation that can be documented, verified,
and analyzed.
Evidence - Data on which to base proof or to establish truth or falsehood.
Family Educat ion Rights and Privacy (FERPA) - This privacy Act also governs how state agencies
transmit testing data to federal agencies. The regulations cover violations such school employees
divulging information to someone other than the child's parents about a child's home life, grades or
behaviors, and schoolwork posted on a bulletin board with a grade.
Forensic Analysis - Examination of material and/or data to determine their essential features and
their relationship in an effort to discover evidence in a manner that is admissible in a court of law;
post-mortem examination.
Gramm-Leach-Bliley Act (GLBA) – This act provides for enhanced protection of nonpublic
personal information, including health information, and for other purposes.
Health Insurance Portability and Accountabilit y Act (HIPAA) – This act has administrative
safeguards that are meant to improve the efficiency and effectiveness of the nation's health care
system by encouraging the widespread use of electronic data interchange in the US health care
system. The administrative safeguard provisions also address the information security and privacy
of health data and relate to any private personal information.
Incident - An adverse event or series of events that affect information security or the ability of
California State University, Northridge or its affiliates to do business.
Incident Response Management - A CSUN leadership team comprising of the Provost, Vice
President for Administration/Finance, the VP of Student Affairs, Legal, and Public Relations.
Incident Response Team - A cross-functional team of technical and information security analysts
that are responsible for investigation of information security incidents.
Incident Severit y Levels - Level ratings for information security threat levels defined herein as
High, Medium, and Low.
Motion Picture Association of America (MPAA) - The Motion Picture Association of America and
its international counterpart, the Motion Picture Association (MPA) serve as the voice and
advocate of the American motion picture, home video and television industries, domestically
through the MPAA and internationally through the MPA.
Recording Industry Association of America (RIAA) - The Recording Industry Association of
America is the trade group that represents the U.S. recording industry.
Sarbanes-Oxley Act (SOX) - This act covers issues such as auditor independence, corporate
governance, internal control assessment, and enhanced financial disclosure.
6.0 REFERENCES:
California Civil Code 1798.29 and 1798.82 to 1798.84