Cybersecurity Response Plan

 

Companies use a Cybersecurity Response Plan to define and implement an operational framework that can detect, contain, investigate and report on cyber security incidents. 

The related Incident Response Plan identifies the company-wide incident management team. It also defines their roles, responsibilities and communication process for coordinated cybersecurity incident management.

Here is a brief overview of how to build a Cybersecurity Response Plan and what it should include.


Building the plan is done in three phases:

  • Discovery

  • Evaluation & Strategy

  • Implementation & Testing

In Discovery, you’ll need to gather:

  • Operational overview of the business

  • Key business technologies and data

  • Existing security measures

  • Operational policies, infrastructure documentation, organizational data

In the Evaluation & Strategy stage, you need to evaluate all the gathered data and use this to:

  • Identify risk levels

  • Build a response matrix

  • Identify key security team responsibilities

  • Create an incident response flow chart, including post-incident plan

The Implementation & Testing phase involves the whole organization, where they:

  • Approve Cybersecurity Response Plan

  • Distribute and train the organization

  • Review & Test the plan in controlled manner and conduct post-test evaluation

  • Schedule test & review of the plan


The Cybersecurity Response Plan should contain the following sections:

  • Detection & Initial Response

  • Containment

  • Remediation

  • Resolution

Detection & Initial Response is where the training of the whole organization provides the highest value. Employees should be able to recognize that ‘something is wrong’ and know whom to contact. Once an event (not-incident yet) is identified, the technical team should be able to validate and either identify the event as a non-incident or activate the response team to start Containment.

Containment. The team has to assess the damage, isolate the underlying issues, protect the organization’s systems from unauthorized access and initiate communication with all required parties (both internal and external).

Remediation. After containment, the next step is to repair any damage which has been done, restore all operation to normal state and assess the overall impact of the incident.

Resolution. At this stage, the organization can review the incident, provide lessons learned and use those lessons to adjust the Cybersecurity Response Plan.