What is Included in a Cybersecurity Incident Response Plan?

Cybersecurity

With the threat of cyberattacks increasing, many businesses are focused on implementing Cybersecurity Incident Response Plans (IR Plans) to help prevent and mitigate cyber threats. The purpose of IR Plans is to ensure that businesses have an organizational map for assessing security events in an effective and efficient manner.

What are the key features of a Cybersecurity Incident Response Plan?

Perhaps the most important feature of an IR Plan is the establishment of company-wide roles and responsibilities. This provides an organizational framework that facilitates the spread of information and responses, as well as increasing efficiency. When a data breach occurs, the last thing a business wants to be concerned with is determining who is supposed to do what. A detailed roles and responsibilities outline ensures that the proper individuals will spring into action when expected. While the roles a business implements are determined by a variety of internal and external factors, some key roles that should be considered include: a senior management team involved in critical decisions, an incident manager that is responsible for overseeing the issue, and third-party companies that may assist in the recovery process. 

What is the OODA Loop?

The OODA Loop is a decision-making analysis which, although originally intended for military use, has been adopted by many businesses to train workers on how to properly identify and address critical issues. In the world of cybersecurity, the four components of the OODA Loop – observe, orient, decide, and attack – present an organizational scheme aimed at devoting full attention to the task at hand in a professional and reasonable manner. 

The first stage of the OODA Loop, the observation, is focused on data collection and reconnaissance to evaluate potential threats. When a threat has been detected, this stage assists in determining whether it is a security incident or a false positive. Important considerations that should be made during the observation stage include: who reported the potential incident; what systems or operations have been affected; and how was the incident first discovered?

In the orientation stage, the information collected is analyzed, transforming raw data into vital information. This allows for the formation of hypotheses as to the origins, purposes, and effects of the security incident, and provides an opportunity to perform operations for testing the hypotheses. Importantly, all the information analyzed and tested during this stage should be properly recorded and stored in case it is needed in the future. 

During the decision stage, senior members of an organization synthesize all the information obtained during the observation and orientation stages in order to formulate an appropriate response. The most critical component of this stage is knowing which of the many available options is the one best suited for the current situation. As a result, it is necessary to have a complete understanding of the current issue and carefully analyze all the available options. This stage requires patience and detailed analysis, for selecting the wrong approach may exacerbate the accident. 

The final stage of the OODA Loop is when the response selected in the decision stage is put to action in order to contain and eradicate the threat. Some of the actions that may be taken include: resetting credentials, removing malicious files, and monitoring networks. Importantly, while the action stage is technically the final part of the OODA Loop, it never really ends. Instead, the information and knowledge gained in this stage is analyzed and applied in the other stages when another threat presents itself. 

EPGD Business Law is located in beautiful Coral Gables. Call us at (786) 837-6787, or contact us through the website to schedule a consultation.

*Disclaimer: this blog post is not intended to be legal advice. We highly recommend speaking to an attorney if you have any legal concerns. Contacting us through our website does not establish an attorney-client relationship.*

Share this post

Silvino Diaz

Silvino E. Diaz’s practice ranges from Civil and Commercial Litigation to Entertainment and Intellectual Property Law. Silvino has earned a reputation as one of Puerto Rico’s foremost advocates for independent musicians and artists. As a result of his sustained commitment to creative industries, he was named Professor of Intellectual Property Law at Atlantic University College (Guaynabo, PR) – the Caribbean’s leading digital arts institution – where he spearheaded the “Introduction to IP” course for both the graduate and undergraduate programs, and was appointed by the Office of the President to develop an Intellectual Property graduate curriculum, where he served until moving to Miami in 2017. He is the founder of the service known as Starving Artists, where he offers innovative business and legal counsel for artists and creatives.

Discussion

*The following comments are not intended to be treated as legal advice. The answer to your question is limited to the basic facts presented. Additional details may heavily alter our assessment and change the answer provided. For a more thorough review of your question please contact our office for a consultation.
Search

Categories

Categories
FREE DOWNLOAD

The Entrepreneurs Handbook

This is a quick legal reference guide covering 16 topics that every business owner needs to have to start a business

FREE DOWNLOAD

The Entrepreneur's Handbook

This is a quick legal reference guide covering 16 topics that every business owner needs to have to start a business.

DESARGA GRATUITA

El Manual del Empresarios

Esta es una guía rápida de referencia jurídica que cubre 16 temas que cada empresario necesita saber para empezar un negocio.