County DHS Incident Response Planning
Health Care Policy and Financing, Colorado Department of Human Services and Governor’s Office of Information Technology in partnership with the National Cybersecurity Center
Responding to an Incident
Prepare
Identify
Contain
Eradicate
Recover
Follow Up/Lessons Learned
Cyber Incident Response Team
Purpose
Objectives
Organizing for Incident Response
Our Cyber Incident Response Team
Role | Responsibilities | Primary/Alternate(s) |
Cyber Incident Response Management | Will have overall responsibility for directing activities in regard to the incident at Severity Level 2 and above. Will serve in advisory capacity for incidents at Severity Level 1. Coordinates external assistance as required. |
|
Cyber Incident Response Coordinator | Provides oversight to incident response. Requests resources as required to effectively contain and manage an incident response. Documents incident for purposes of law enforcement, lessons learned, and insurance. |
|
Cyber Operations Team / Technical Operations Team | Provide technical aspects of incident response. |
|
Communications / Media Team | Responsible for internal, external and media communications |
|
Extended Technical Team | Provides additional technical skill and capability to the Technical Operations team as required (ie. outside vendor or agency) |
|
Admin Support | Provides requested administrative support. |
|
Extended Team | Provide additional visibility and support to incident response as required. Provide specific HR, legal, finance, etc. skills as required. |
|
Additional Team Members
DATA OWNERS
DEPARTMENT LEADERSHIP
SUBJECT MATTER EXPERTS
Incident Categories
Severity Level | Description |
0 (Low) | Incident where the impact is minimal. Examples are e-mail SPAM, isolated Virus infections, etc. |
1 (Medium) | Incident where the impact is significant. Examples are a delayed ability to provide services, meet our mission, delayed delivery of critical electronic mail or data transfers, etc. |
2 (High) | Incident where the impact is severe. Examples are a disruption to the services, and/or performance of our mission functions. Our proprietary of confidential information has been compromised, a virus or worm has become widespread, and is affecting over 1% of employees, Public Safety systems are unavailable, or our Executive management has been notified. |
3 (Extreme) | Incident where the impact is catastrophic. Examples are a shutdown of all our network services. Our proprietary or confidential information has been compromised and published on a public site. Public safety systems are unavailable. Executive management must make a public statement. |
Incident Escalation and Team Activation
Escalation Level | Affected Team(s) | Description |
0 |
| Normal Operations. Engineering and cyber groups monitoring for alerts from various sources. |
1 |
| Our organization has become aware of a potential or actual threat. Determine defensive action to take. Message employees of required actions if necessary. |
2 |
| A threat has manifested itself. Determine course of action for containment and eradication. Message employees of required actions if necessary. |
3 |
| Threat is widespread or impact is significant. Determine course of action for containment, mitigation and eradication. Message employees. Prepare to take legal action. Prepare to make public statement. |
Special Circumstances
How will you communicate if email and/or phones systems are offline or compromised?
Develop alternative and offline communication methods now.
Identify reporting requirements for reporting breach of confidential information.
For instance HIPAA, CJIS, FERPA, and others have strict reporting requirements.
Are there templates you can use?
Post Incident
Cyber Incident Coordinator and Response Management
Extended Team
Continuous Improvement