Ten Steps to Planning an Effective Cyber-Incident Response
Here are 10 principles to guide companies in creating — and implementing — incident-response plans:
- Assign an executive to take on responsibility for the plan and for integrating incident-response efforts across business units and geographies.
- Develop a taxonomy of risks, threats, and potential failure modes. Refresh them continually on the basis of changes in the threat environment.
- Develop easily accessible quick-response guides for likely scenarios.
- Establish processes for making major decisions, such as when to isolate compromised areas of the network.
- Maintain relationships with key external stakeholders, such as law enforcement.
- Maintain service-level agreements and relationships with external breach-remediation providers and experts.
- Ensure that documentation of response plans is available to the entire organization and is routinely refreshed.
- Ensure that all staff members understand their roles and responsibilities in the event of a cyber incident.
- Identify the individuals who are critical to incident response and ensure redundancy.
- Train, practice, and run simulated breaches to develop response “muscle memory.” The best-prepared organizations routinely conduct war games to stress-test their plans, increasing managers’ awareness and fine-tuning their response capabilities.
(Tucker Bailey, 2013)
Tucker Bailey, J. B. (2013, July 1). Ten Steps to
Planning an Effective Cyber-Incident Response. Retrieved September 17,
2014, from Harvard Business Review:
http://blogs.hbr.org/2013/07/ten-steps-to-planning-an-effect/
No comments:
Post a Comment