Incident Response Plan¶
Compliance: GDPR (Art. 33-34), HIPAA (45 CFR §164.400+), ISO 27001 (A.16), NIST-800-53 (IR-1 through IR-9)
1. Overview¶
1.1 Purpose¶
This plan defines BeDefended's process for: - Detecting security incidents - Responding rapidly to minimize impact - Notifying authorities and affected parties - Learning from incidents to prevent recurrence
1.2 Scope¶
Incidents Covered: - Unauthorized access to systems/data - Data exfiltration or loss - System compromise (malware, APT) - Denial of Service (DoS/DDoS) - Insider threat/data theft - Third-party vendor breach - Compliance violations (accidental ePHI disclosure, etc.)
Not Covered: - Non-security operational issues (server downtime, bugs) - Requests from law enforcement (handled per Section 5)
1.3 Key Metrics¶
| SLA | Target |
|---|---|
| Detection Time | < 4 hours (automated alerts) |
| Triage | < 24 hours |
| Notification (Low Risk) | < 72 hours |
| Notification (High Risk) | < 24 hours |
| Notification (HIPAA Breach) | < 60 days (HHS) |
| Root Cause Analysis | < 7 days |
| Remediation | < 30 days |
2. Incident Response Team (IRT)¶
2.1 Roles & Responsibilities¶
Incident Commander (IC)¶
Role: Overall incident coordination and decision-making - Declares incident severity - Initiates response - Escalates to management/legal/privacy - Communicates with external parties - Primary: Chief Technology Officer - Backup: VP Engineering
HIPAA/Privacy Officer¶
Role: Compliance and data protection - Determines if HIPAA breach occurred - Notifies HHS, state AGs, individuals - Coordinates with legal - Manages GDPR/HIPAA-specific notifications - Primary: privacy@bedefended.com - Backup: Chief Compliance Officer
Forensics & Investigation¶
Role: Technical investigation and evidence preservation - Collects logs, network packets, memory dumps - Determines attacker TTPs - Preserves evidence for law enforcement - Conducts root cause analysis - Primary: Senior Security Engineer - Backup: Infrastructure Team Lead
Communications¶
Role: Internal and external communications - Notifies internal teams (eng, ops, client success) - Drafts statements for clients/media - Manages customer communications - Coordinates with PR/legal - Primary: Chief Communications Officer - Backup: General Counsel
Operations¶
Role: System remediation and recovery - Isolates compromised systems - Applies patches/fixes - Restores from backup if necessary - Rebuilds systems if needed - Primary: VP Operations - Backup: DevOps Lead
2.2 Incident Response Hotline¶
- Email: incident@bedefended.com (monitored 24/7)
- Phone: [+39 INCIDENT HOTLINE] (manned during business hours, voicemail after-hours)
- Slack: #incident-response (internal)
3. Incident Classification¶
3.1 Severity Levels¶
CRITICAL (P1) — Immediate Response Required¶
- ✗ Active data exfiltration confirmed
- ✗ Multiple systems compromised
- ✗ Production systems down (RTO < 4 hours)
- ✗ ePHI breach confirmed (affects 500+ individuals)
- ✗ External attacker actively in systems
Response: Declare incident immediately; IRT assembles within 1 hour
HIGH (P2) — Urgent Response¶
- ⚠ One system compromised (not critical)
- ⚠ Data loss/corruption confirmed but limited scope
- ⚠ Malware detected but contained
- ⚠ ePHI breach affects < 500 individuals
- ⚠ Service degradation (RTO < 24 hours)
Response: IRT assembles within 4 hours
MEDIUM (P3) — Standard Response¶
- △ Unauthorized access detected but no data loss
- △ Vulnerability discovered in non-critical system
- △ Failed intrusion attempt (blocked by WAF)
- △ Policy violation by staff (accidental)
Response: IRT meets within 24 hours; investigation timeline 7 days
LOW (P4) — Information/Logging¶
- ○ Non-security operational issue
- ○ Suspected false-positive alert
- ○ No evidence of actual compromise
Response: Log and monitor; no formal IRT meeting required
3.2 Classification Criteria Matrix¶
| Criteria | CRITICAL | HIGH | MEDIUM | LOW |
|---|---|---|---|---|
| Scope | Multiple systems | Single system | Non-critical | Non-security |
| Data Affected | >500 records | 1-500 records | <100 records | None |
| Confidentiality Risk | High/Certain | Medium | Low | None |
| Attack Status | Active | Contained | Isolated | N/A |
| Business Impact | Major | Moderate | Minor | None |
4. Incident Response Workflow¶
Phase 1: DETECTION (0-4 hours)¶
4.1 Detection Methods¶
- ✓ Automated alerting (IDS/IPS, WAF, SIEM)
- ✓ Audit log anomaly detection
- ✓ Failed login patterns (5+ from same IP → alert)
- ✓ Unusual API usage (>1000 req/min from single user)
- ✓ Data export alerts (>100 records downloaded in <1 minute)
- ✓ Manual report (staff, security researcher, customer)
- ✓ Third-party notification (vendor breach disclosure, threat intel)
4.2 Initial Response¶
Upon incident discovery: 1. Document discovery: Who, when, how detected, initial details 2. Preserve evidence: Do NOT immediately shut down systems - Enable logging (if not already) - Snapshot running processes - Collect network traffic (tcpdump if available) 3. Notify Incident Commander: Call/page immediately if P1 4. Classify severity: Use Section 3 matrix 5. Assemble IRT: Based on severity
4.3 Detection Confirmation¶
- Validate alert is not false-positive (e.g., legitimate traffic pattern)
- Confirm systems are actually compromised/affected
- Document confirmation method (log review, manual testing, etc.)
Phase 2: TRIAGE & INVESTIGATION (4-24 hours)¶
4.4 Scope Assessment¶
Forensics team determines: - What happened? (attack type: breach, malware, unauthorized access) - When did it occur? (initial compromise → detection) - How many systems affected? (1, 10, 100+) - What data was accessed/exfiltrated? (categories, record count, sensitivity) - Who/what was responsible? (attacker, malware, insider, misconfiguration)
4.5 Evidence Collection¶
Preserve for investigation & law enforcement: - Collect logs: Web server, app server, database, OS, firewall, IDS - Snapshot memory: For malware analysis - Network packets: tcpdump/Wireshark captures - File hashes: Create SHA-256 hashes of suspicious files - Timeline: Build chronological sequence of events
Chain of Custody: - Document every person who touched evidence - Use write-blocking devices for disk imaging - Store evidence encrypted and segregated
4.6 Risk Assessment¶
Determine: - Confidentiality Risk: Was PII accessed? Were credentials stolen? - Integrity Risk: Was data modified? Are backups clean? - Availability Risk: Can systems be recovered? What's the RTO? - Breach Determination: Does this meet GDPR/HIPAA breach definition?
Phase 3: NOTIFICATION (24-72 hours)¶
4.7 GDPR Breach Notification (GDPR Art. 33-34)¶
Timeline: - 4 hours: Assessment complete - 24 hours: Notify supervisory authority (if required) - 72 hours: Notify affected individuals (if high-risk)
Conditions for notification: - ✓ NOTIFY GDPA if: Unauthorized access/disclosure of personal data + high risk to rights/freedoms - ✓ DO NOT NOTIFY if: Data encrypted/pseudonymized AND attacker has no keys
Content for DPA notification: 1. Breach description: Date occurred, date discovered, cause 2. Scope: Categories of data (name, email, credit card, etc.), # individuals, # records 3. Likely consequences: What can attacker do with the data? 4. Measures taken: Containment, investigation, remediation 5. Contact point: Forensics team / Privacy Officer for questions
Content for individual notification: 1. Plain language explanation (non-technical) 2. Breach description (what happened, when, what data) 3. Protective measures (recommended actions by individual: password change, credit monitoring) 4. Contact for questions (privacy@bedefended.com)
4.8 HIPAA Breach Notification (45 CFR §164.400)¶
Timeline: - < 60 days: Notify affected individuals - < 60 days: Notify media (if > 500 individuals in same jurisdiction) - < 60 days: Notify HHS (HIPAA Breach Notification Portal)
Definition of HIPAA Breach: - ✓ BREACH if: Unauthorized acquisition, access, use, disclosure of ePHI - ✓ NO BREACH if: Data encrypted (NIST SP 800-111 standards) or destroyed - ✓ NO BREACH if: Reasonable assurance ePHI was not acquired/viewed
Notification content: 1. Breach description: Date discovered, nature of ePHI, causes 2. Risk assessment: Whether data was actually acquired/viewed 3. Measures taken: Steps to prevent future breaches 4. ePHI recovered: If attackers caught, data recovered, etc.
4.9 Customer Notification¶
All affected customers notified with: - Executive summary (what happened in plain language) - Timeline (when incident occurred, when discovered) - Scope (did this affect YOUR data? yes/no) - Evidence (findings report, technical details if requested) - Remediation (what are we doing to fix it) - Contact (dedicated incident manager assigned)
Phase 4: CONTAINMENT & REMEDIATION (1-30 days)¶
4.10 Containment Actions¶
Stop the bleeding: 1. Isolate compromised systems from network if still active 2. Revoke compromised credentials (passwords, API keys, certificates) 3. Block attacker IPs at firewall/WAF 4. Disable breached accounts temporarily (re-enable after remediation) 5. Patch vulnerabilities exploited (if known)
4.11 Remediation Steps¶
- Eradicate malware (antivirus scans, manual cleanup, rebuild if necessary)
- Remove backdoors (check for persistence mechanisms)
- Patch systems (OS, applications, dependencies)
- Harden configuration (close unnecessary ports, tighten access control)
- Rotate credentials (all passwords, API keys, certificates)
- Restore from backup (if necessary; verify backup is clean)
4.12 Recovery & Testing¶
- Rebuild compromised systems from clean baseline
- Deploy patches/fixes
- Restore data from verified-clean backups
- Conduct security testing to confirm compromise removed
- Monitor closely for re-compromise (24/7 for 30 days post-incident)
Phase 5: POST-INCIDENT ANALYSIS (7-30 days)¶
4.13 Root Cause Analysis (RCA)¶
Document: - Root Cause: What allowed this attack to succeed? (unpatched system, weak password, misconfiguration, social engineering, zero-day, insider) - Contributing Factors: What else made it easier? (no monitoring, no MFA, no segmentation) - Timeline: Reconstruct exact sequence of events - Evidence: Supporting logs, artifacts, screenshots
4.14 Lessons Learned¶
- What worked well in our response?
- What could be improved?
- What do we need to change?
- Required: Capture in meeting notes + action items
4.15 Action Items¶
By severity: - CRITICAL: Must complete within 30 days (security fix) - HIGH: Must complete within 90 days (process improvement) - MEDIUM: Nice-to-have, queue for next sprint
Examples: - Implement MFA for critical systems - Add monitoring for specific attack pattern - Improve patch management process - Additional staff training
4.16 Incident Report¶
Completed within 30 days, includes: - Executive summary (1-page) - Timeline (detailed) - Root cause analysis - Scope & impact - Remediation actions taken - Lessons learned - Action items + responsible parties - (Sensitive details redacted for customer-facing version)
5. Specific Incident Types¶
5.1 Data Breach (Unauthorized Access/Disclosure)¶
Indicators: - Attacker uploaded data exfiltration tool - API keys exposed in logs/config - Database dump found on attacker's server - Large data export in audit logs
Investigation Focus: - What data was accessed? (PII, ePHI, IP addresses, credentials) - Was it actually exfiltrated? (check attacker infrastructure) - How long was access active? (days? weeks?) - Can we recover exfiltrated data? (ask attacker/law enforcement)
Notification: - GDPR Art. 33 to DPA (within 72 hours if high-risk) - HIPAA notification (if ePHI, within 60 days) - Individual notification immediately
5.2 Malware Infection¶
Indicators: - Antivirus alert - Suspicious process in memory - Unexpected network connections (C2 beaconing) - Persistence mechanism detected (cron job, registry entry)
Investigation Focus: - Malware family identification (hash it, submit to VirusTotal) - Entry point (compromised dependency, phishing, vulnerability) - What did it do? (theft, encryption, lateral movement) - How long was it active?
Containment: 1. Isolate infected system immediately 2. Identify all systems with same malware 3. Block C2 domain at firewall 4. Eradicate from all systems (antivirus + manual cleanup)
5.3 Insider Threat / Unauthorized Access¶
Indicators: - Staff member accessing data outside their role - Mass data export by unusual user - Off-hours login from unexpected location - Multiple failed attempts then successful login (credential stuffing)
Investigation Focus: - Was it intentional or accidental? (check user's job responsibilities) - What data was accessed? (was it authorized?) - Did user disclose/exfiltrate data? - Is user aware they violated policy?
Response: - Immediate suspension of access (if intentional) - Retraining if accidental - Escalation to legal/HR for disciplinary action - Consider law enforcement notification if data theft suspected
5.4 Ransomware¶
Indicators: - Files encrypted with unknown extension - Ransom note on screen - Unexpected file modifications (bulk rename)
Response (DO NOT PAY): 1. Immediately isolate infected system 2. Check backups (are they encrypted too?) 3. Preserve evidence (logs, ransom note) 4. Attempt decryption with known tools (https://ransomwhere.nomoreransom.org/) 5. Restore from clean backups 6. Report to law enforcement
6. Communication & Escalation¶
6.1 Internal Communications¶
During incident, escalate to: - Board: If customer data breach or major incident - Legal: If potential criminal activity or law enforcement involvement - HR: If insider threat suspected - Customer Success: To coordinate customer notifications - PR: If media attention expected
6.2 External Communications¶
Law Enforcement¶
- When: If attacker identity known or crime suspected
- Contact: Local police + FBI Cyber Division (if international/serious)
- Information: Evidence, logs, timeline, attacker IOCs
- Cooperation: Full cooperation with investigation
Security Researchers / Threat Intel¶
- When: If vulnerability or attack pattern should be shared
- Contact: Security mailing lists, CERT/CC, trusted partners
- Information: Sanitized technical details (no customer PII)
Regulatory Authorities¶
- GDPR Breach: Italian DPA + any member state where individuals reside
- HIPAA Breach: HHS Office for Civil Rights + state AGs
- Other: Relevant regulator per jurisdiction
7. Legal Compliance & Cooperation¶
7.1 Law Enforcement¶
- ✓ Preserve evidence for potential prosecution
- ✓ Provide information when subpoenaed
- ✓ Cooperate with FBI/Europol/Carabinieri investigations
- ✗ DO NOT contact attacker directly (interferes with investigation)
- ✗ DO NOT attempt to recover data yourself (evidence tampering)
7.2 Regulatory Cooperation¶
- ✓ Respond to GDPR/HIPAA investigation requests
- ✓ Provide audit logs, security assessments
- ✗ DO NOT claim privilege (unless attorney involved)
8. Tabletop Exercise & Testing¶
8.1 Annual Tabletop Exercise¶
Quarterly incident simulations to test: - Can team be contacted/assembled quickly? - Are communication procedures clear? - Do forensics collect evidence correctly? - Is notification language appropriate? - Are timelines realistic?
8.2 Penetration Testing¶
- Annual external pen-test of BeDefended platform
- Attempts to find vulnerabilities before attackers
- Tests incident response during simulated breach
9. Documentation & Retention¶
9.1 Records to Retain¶
- Incident reports (final)
- Timeline reconstruction
- Root cause analysis
- Forensic reports
- Evidence artifacts (hashes, logs)
- Notification records (to DPA, individuals, customers)
- Communication logs
Retention: Minimum 3 years (may be longer per GDPR/HIPAA audits)
Appendix A: Emergency Contacts¶
| Role | Name | Phone | After-Hours | |
|---|---|---|---|---|
| Incident Commander | [CTO NAME] | [EMAIL] | [PHONE] | Voicemail → escalates |
| Privacy Officer | privacy@bedefended.com | 24/7 monitoring | [PHONE] | [ALTERNATE] |
| Forensics Lead | [SEC ENGINEER] | [EMAIL] | [PHONE] | [BACKUP] |
| CEO (Escalation) | [CEO NAME] | [EMAIL] | [PHONE] | [PERSONAL] |
Document Version: 1.0 | Last Updated: 2026-03-17 | Next Review: 2027-03-17