Ever since we launched our customizable cybersecurity incident report template, I’ve been amazed by its volume of downloads.
I quickly realized that the increasing cyber threats from cyber criminals, malware, and ransomware are being taken seriously by organizations large and small and that there is a growing demand for guidance and information on cybersecurity incident response and reporting.
Mangools.com, a Slovakian company that provides advanced tools for monitoring online search engine activity, indicates that online searches for the phrases “cybersecurity incident report template” and “cybersecurity incident response” are increasing at a mind-blowing rate year over year.
Search volume for CYBER SECURITY INCIDENT REPORT TEMPLATE – mangools.com
Search volume for CYBER SECURITY INCIDENT RESPONSE – mangools.com
So, organizations are getting on board with cyber risk, and this is great news. I’ve been writing, tweeting, and giving talks about how to respond to cyber incidents for some time now—and companies are listening. Many are now taking action.
If you’re ready to get on board with properly minimizing the risk to your organization and data during or after a breach, but are not 100% sure of the process—this is the place to start. I’ll provide some procedure resources for handling the cyber incident response process, but let’s start by addressing 4 common questions.
- What is incident response?
Incident response is an organization’s reaction to halting and recovering from a cybersecurity incident, and the response plan must be in place before the incident occurs. Incident response is one of the major components to helping an organization become more resilient to cyber attacks.
You may already know a security incident as:
- An information security incident
- An IT security incident
- A network security incident
- A security breach
- A data breach
- A cyber attack
- A ransomware attack
- Or, “We’ve been hacked!”
They’re all pretty much cut from the same cloth, and the only good response is to meticulously follow a tailored cyber incident response plan (CIRP) that you have ready to go at a moment’s notice.
The goal of having an incident response plan is to ensure that your organization is fully prepared for, and ready to respond to any level of cybersecurity incident fast and effectively. And today, incidents are inevitable. All that varies is the breadth and depth.
Here’s Gartner’s definition of a CIRP: Also known as a “computer incident response plan,” this is formulated by an enterprise to respond to potentially catastrophic, computer-related incidents, such as viruses or hacker attacks. The CIRP should include steps to determine whether the incident originated from a malicious source — and, if so, to contain the threat and isolate the enterprise from the attacker.
- Is there a difference between incident response and incident handling?
Well, yes, although response and handling go hand in hand, and without both, you do not have a sound incident response process. Incident response refers to the technical aspects of incident analysis and containment, whereas incident handling refers to the human responsibilities: the communications, coordination, and cooperation required to see the process through.
- What is the incident response life cycle?
The life cycle of a cyber incident is defined by the stages a typical incident goes through, and it includes everything from preparing for an incident to analyzing the lessons you learned after experiencing one. I like this version of the incident response life cycle:
Preparation > Incident Discovery and Confirmation > Containment and Continuity > Eradication > Recovery > Lessons Learned
- What are the different types of information security incidents?
There are many types of cybersecurity incidents that can result in intrusions on your organization’s network or full-on data breaches, but I’m going to focus on the six to which I believe organizations are most vulnerable:
- Phishing attacks: you click on a link in an authentic-looking email and end up giving away sensitive information (like a password), or enabling ransomware or some other malware. Companies are super-vulnerable to phishing attacks because cybercriminals target the weakest links in most companies—its employees—and success rates are high! A more targeted type of phishing attack known as spearfishing occurs when the attacker invests time researching the victim in order to pull off an even more successful attack.
- Denial-of-service (DoS) attacks: the point of this attack is to shut down an individual machine or entire network so that it cannot respond to service requests. DoS attacks achieve this by inundating the target with traffic or sending it some information that triggers a crash.
- Man-in-the-middle (MitM) attacks: an outside entity intercepts and alters the communication between two parties who believe they are communicating with each other. By impersonating them both, the attacker manipulates both victims in an effort to gain access to data. The users are blissfully unaware that they are both talking to an attacker. Session hijacking, email hijacking, and Wi-Fi eavesdropping are all examples of MitM attacks.
- Drive-by attacks: a common method of spreading malware, criminal hackers seek out insecure websites and plant a malicious script into code on one of the pages. The script could install malware onto the computer of someone who visits the site or re-direct the victim to a different site controlled by the hackers.
- Password attacks: this sort of attack is aimed specifically at obtaining a user or an account’s password. Criminal hackers use a variety of techniques for getting their hands on passwords, such as password-cracking programs, dictionary attacks, password “sniffers”, or brute-force password guessing, often based on some personal knowledge of an individual (like the birthday, dog’s name, etc.) This is why strong passwords are so important.
- Malware and ransomware attacks: a broad term for any sort of malicious software that’s installed on your system without your consent can be considered malware. You are probably familiar with many types of malware—file infectors, worms, Trojans, ransomware, adware, spyware, logic bombs, and different types of viruses. Some are inadvertently installed when an employee installs freeware or other software, clicks on an ad, or visits an infected website. The possibilities are endless, therefore so are the chances of an employee falling victim to a malware attack.
Related Materials: Download our Free Guide – Ransomware on the Rise (Best practices to become more resilient so you can avoid being the next ransomware victim).
Industry-specific cybersecurity incident reporting
The incident response process described in the life cycle above is largely the same for all organizations, but the incident reporting procedure varies for certain industries. For example, if you’re in the healthcare industry you may need to observe the HIPAA incident reporting requirements.
These are some industry regulations that have very specific laws around incident reporting, and who they apply to:
HIPPA – if you create, receive, maintain or transmit electronically protected health information
FISMA/NIST – if you’re a Federal agency or government contractor
PCI DSS – if you accept, store, or transmit credit card data
NERC/CIP – if you’re an energy and utility company
SOX – if your organization is a public company (though in some cases private companies must also comply with SOX regulations)
NYCRR – if You’re a New York insurance company, bank, or other regulated financial services institution
If your organization must adhere to any of the above regulations, you must familiarize yourself with the incident reporting requirements that might uniquely apply to your industry. Links to helpful industry-specific information can be found in the incident response template.
The template also has:
- Customization instructions
- Assembling an incident response team, including IT, compliance, and communications representatives
- Threat classification
- A sample cyber Incident
- Phase of the incident, and the appropriate actions to take at each step (the template ensures you capture all the right information)
As an additional resource, our whitepaper provides a broader incident response strategy.
Incident response is a plan I hope you’ll never need
I talk about the incident response process often, but always with the hope that you’ll never need to report an incident. And as more organizations take steps to protect themselves, become more resilient and recover quickly, I look forward to seeing fewer victims of cybercrime.
In the past few years, Gartner’s number 1 security project is privileged account management (PAM) But like incident response, Cybersecurity has a technical AND a human aspect—employee cyber awareness training is critical to your organization’s security. cybercriminals view employees as the fast track into your company’s network, so security training should be introduced on day one of your new hire orientation process.
No cybersecurity solution is bulletproof
No solution you choose to protect your privileged access, nor any amount of employee training, will guarantee you bullet-proof cybersecurity. After all, the cybercriminal’s ongoing challenge is to stay a step ahead of you. But having a rock-solid incident response procedure in place can minimize the damage—even stop it before it gets a foothold—and save you money, time, and your reputation.
FAQs
What should be included in a cyber incident report? ›
Helpful information could include who you are, who experienced the incident, what sort of incident occurred, how and when the incident was initially detected, what response actions have already been taken, and who has been notified.
How do I write a security incident report? ›- Take notes. Details and observations make up the bulk of your security reports. ...
- Start with a summary. ...
- Detail the narrative. ...
- Follow the form. ...
- Proofread. ...
- Avoid emotional language. ...
- Avoid abbreviations and conjunctions. ...
- Be prompt.
- Preparation.
- Threat Detection.
- Containment.
- Investigation.
- Eradication.
- Recovery.
- Follow-Up.
Report computer or network vulnerabilities to the National Cybersecurity Communications and Integration Center (NCCIC) at 1-888-282-0870 or at www.us-cert.gov/report. Forward phishing emails or websites to NCCIC at phishing-report@us-cert.gov .
What are the three C's of an incident report? ›Training your brain before you find yourself in a high-pressure situation may help you save a life or potentially help someone in pain. There are three basic C's to remember—check, call, and care. When it comes to first aid, there are three P's to remember—preserve life, prevent deterioration, and promote recovery.
What are the three 3 requirements for writing an incident report? ›- Step 1: Provide Fundamental Information. ...
- Step 2: Take Note of Any Damages and Injuries. ...
- Step 3: Identify Affected Individual(s) ...
- Step 4: Identify Witnesses and Take Their Statements. ...
- Step 5: Take Action. ...
- Step 6: Close Your Report.
- the names and positions of the people involved.
- the names of any witnesses.
- the exact location and/or address of the incident.
- the exact time and date of the occurrence.
- a detailed and clear description of what exactly happened.
- a description of the injuries.
- The date and time of the incident.
- The location of the incident, including address.
- The type of incident, and a detailed account of what happened.
- Names of any victims including their injuries.
- Names of any witnesses, along with their accounts of what happened.
Incident reports include all of the facts related to the incident, such as the contact information of the people involved; a description of the incident itself; and any follow-up actions that were taken, like medical treatment.
What are the 5 C's of incident command? ›ICS divides an emergency response into five manageable functions essential for emergency response operations: Command, Operations, Planning, Logistics, and Finance and Administration. The basic structure of ICS is the same regardless of the type of emergency.
What are the 5 6 major stages of incident response? ›
Many organisations use NIST's Computer Security Incident Handling Guide as the basis of their incident response plan. It contains six phases: preparation, identification, containment, eradication, recovery and lessons learned.
What are the 8 basic elements of an incident response plan? ›- A Mission Statement.
- Formal Documentation of Roles and Responsibilities.
- Cyberthreat Preparation Documentation.
- An Incident Response Threshold Determination.
- Management and Containment Processes.
- Fast, Effective Recovery Plans.
- Post-Incident Review.
The OSI model's seven layers are the: Human Layer, Perimeter Layer, Network Layer, Endpoint Layer, Application Layer, Data Layer, and Mission Critical Layer.
What should be in a security assessment report? ›The Security Assessment Report should indicate what audit checks were performed, what passed and what failed, and what the final summary list of vulnerabilities are that the evaluation team found.
What is an incident response report? ›Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident or security incident. The goal is to handle the situation in a way that limits damage and reduces recovery time and costs.
What are the five elements of good incident report? ›- The date and time it occurred.
- The specific location of the incident.
- All of those who were involved and their immediate supervisors. ...
- Names and accounts of those who witnessed the incident.
- The series of events that took place leading up to the incident.
Effective Incident Reports identify the facts and observations. They avoid inclusion of personal biases; they do not draw conclusions/predictions, or place blame. Effective Incident Reports use specific, descriptive language and identified the action(s) taken by staff as a result of the unusual incident.
What are 3 basic elements in an incident? ›The Three Elements of Incident Response: Plan, Team, and Tools.
What are the four key elements of an incident investigation report? ›Scene management and scene assessment (secure the scene, make sure it is safe for investigators to do their job). Witness management (provide support, limit interaction with other witnesses, interview). Investigate the incident, collect data. Analyze the data, identify the root causes.
What are 7 C's of report writing? ›- Clear.
- Coherent.
- Concise.
- Concrete.
- Correct.
- Complete.
- Courteous.
What are the four rules of writing a report? ›
- 1 Choose a topic based on the assignment. ...
- 2 Conduct research. ...
- 3 Write a thesis statement. ...
- 4 Prepare an outline. ...
- 5 Write a rough draft. ...
- 6 Revise and edit your report. ...
- 7 Proofread and check for mistakes.
- Find a good role model or mentor. ...
- Decide what you're going to say. ...
- Plan the structure of your report. ...
- Gather & sift any source information. ...
- Respect intellectual property rights. ...
- Create a draft report. ...
- Engage readers by using writing techniques. ...
- Assess & review your draft.
Oftentimes “the 3 Cs” – collaboration, cooperation, and coordination - are believed to be the focus for a strong cybersecurity solution. Arguably, the most important one is missing or simply assumed and not discussed: communication. Without communication, the other Cs become impossible.
What are the 4 P's under security measures to provide effective security? ›To create a strong security program which integrates both prevention and response use the 4 P's: policy, procedure, plan, and practice.
What are the 5 elements of security? ›The U.S. Department of Defense has promulgated the Five Pillars of Information Assurance model that includes the protection of confidentiality, integrity, availability, authenticity, and non-repudiation of user data.
What are the 3 incident control zones? ›Most incident scenes will have at least three zones: Hot Zone (contaminated area), Warm Zone (the area where decontamination of personnel and equipment takes place) and the Cold Zone (the uncontaminated area where workers should not be exposed to hazardous conditions).
What are the 3 functional areas of incident command? ›At a multi-agency incident, different agencies may use three levels of command and control. These are Operational, Tactical and Strategic.
What is a Type 3 incident command? ›A Type 3 IMT or incident command organization manages initial action incidents with a significant number of resources, an extended attack incident until containment/control is achieved, or an expanding incident until transition to a Type 1 or 2 IMT. The incident may extend into multiple operational periods.
What are the 2 main frameworks for cyber security incident response? ›These are called Incident Response Frameworks, and two of the most commonly used ones are called the NIST and SANS frameworks. Let's dive into what each of these offers.
How do you handle a cyber security incident? ›- Preparation. ...
- Identification. ...
- Containment. ...
- Eradication. ...
- Recovery. ...
- Lessons learned.
What is the NIST incident response framework? ›
The NIST incident response process is a cyclical activity featuring ongoing learning and advancements to discover how to best protect the organization. It includes four main stages: preparation, detection/analysis, containment/eradication, and recovery.
What is an incident checklist? ›The Incident Report Checklist is a document that should be used to report any incidents to the proper authorities. It's important for people who are filling out these forms to make sure they include as much information as possible about the incident so it can be properly investigated and resolved quickly.
What makes a good incident response plan? ›Incident response planning typically includes:
Procedures for each phase of the incident response process. Communication procedures within the incident response team, with the rest of the organization, and external stakeholders. How to learn from previous incidents to improve the organization's security posture.
When we discuss data and information, we must consider the CIA triad. The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability.
What are the three A's of cyber security? ›Authentication, authorization, and accounting (AAA) is a term for a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
What are the six 6 types of attacks on network security? ›- Malware. Malware is an umbrella term for many forms of harmful software — including ransomware and viruses — that sabotage the operation of computers. ...
- Phishing. ...
- SQL Injection Attack. ...
- Cross-Site Scripting (XSS) Attack. ...
- Denial of Service (DoS) Attack. ...
- Negative Commentary Attacks.
- Identify Threat Sources. ...
- Identify Threat Events. ...
- Identify Vulnerabilities. ...
- Determine the Likelihood of Exploitation. ...
- Determine Probable Impact. ...
- Calculate Risk as Combination of Likelihood and Impact.
- Step 1: Determine Information Value. ...
- Step 2: Identify and Prioritize Assets. ...
- Step 3: Identify Cyber Threats. ...
- Step 4: Identify Vulnerabilities.
- Management's description of the entity's cybersecurity risk management program. ...
- Management's assertion. ...
- Practitioner's report.
The NCSC defines a cyber security incident as: A breach of a system's security policy in order to affect its integrity or availability. The unauthorised access or attempted access to a system.
What is an example of a security incident? ›
Examples of security incidents include: Computer system breach. Unauthorized access to, or use of, systems, software, or data. Unauthorized changes to systems, software, or data.
What is a cyber incident response plan? ›A Cybersecurity Incident Response Plan is a document that gives IT and cybersecurity professionals instructions on how to respond to a serious security incident, such as a data breach, data leak, ransomware attack, or loss of sensitive information.
› searchsecurity › incident-res... ›What is Incident Response? Definition from WhatIs.com
Security Incident Response - an overview
Report a Security Incident | Information Security Office
- The date and time it occurred.
- The specific location of the incident.
- All of those who were involved and their immediate supervisors. ...
- Names and accounts of those who witnessed the incident.
- The series of events that took place leading up to the incident.
An incident report may include the following information: The circumstances surrounding the incident. Date, time, and location of the incident. The details on witnesses and victims, if any.
What makes a good incident report? ›Effective Incident Reports identify the facts and observations. They avoid inclusion of personal biases; they do not draw conclusions/predictions, or place blame. Effective Incident Reports use specific, descriptive language and identified the action(s) taken by staff as a result of the unusual incident.
What are the 5 W's for an incident report? ›Some months ago, I was hosting a weekly virtual class and talked about the 5Ws and 1H of writing — What, Why, Who, Where, When, and How.
What are the 5 6 major stages of incident response? ›Many organisations use NIST's Computer Security Incident Handling Guide as the basis of their incident response plan. It contains six phases: preparation, identification, containment, eradication, recovery and lessons learned.
What are the 8 basic elements of an incident response plan? ›- A Mission Statement.
- Formal Documentation of Roles and Responsibilities.
- Cyberthreat Preparation Documentation.
- An Incident Response Threshold Determination.
- Management and Containment Processes.
- Fast, Effective Recovery Plans.
- Post-Incident Review.
- the names and positions of the people involved.
- the names of any witnesses.
- the exact location and/or address of the incident.
- the exact time and date of the occurrence.
- a detailed and clear description of what exactly happened.
- a description of the injuries.
What are 3 basic elements in an incident? ›
The Three Elements of Incident Response: Plan, Team, and Tools.
What are the four key elements of an incident investigation report? ›Scene management and scene assessment (secure the scene, make sure it is safe for investigators to do their job). Witness management (provide support, limit interaction with other witnesses, interview). Investigate the incident, collect data. Analyze the data, identify the root causes.
Why do incident reports need to be accurate? ›The purpose of an incident report is to state the cause of the problem along with corrective actions that can be taken to minimise the risk of a future occurrence. The forms can also be used as safety documents, outlining potential safety hazards around the workplace.