Computer Incident Response Plan

Home

The purpose of this Computer Incident Response Plan (CIRP) is to provide the University with a plan that addresses the dynamics of a computer security incident.

1 Purpose

The purpose of this Computer Incident Response Plan (CIRP) is to provide the University with a plan that addresses the dynamics of a computer security incident. A computer security incident is one that threatens confidentiality, integrity or availability of University information assets with high impact, high threat involving high risk and great vulnerability. A security incident includes unintentional disclosure of sensitive or protected information such as Social Security Number or Protected Health Information as defined by the Health Insurance Portability and Accountability Act of 1996. The CIRP defines the roles and responsibilities for incident response team members, defines incident severity levels, outlines a process flow for incident management, and includes methodologies for conducting response activities.

The CIRP may be used simultaneously during certain disasters along with the University Technology Services Hurricane and Disaster Recovery Plan to address information security and production computer/network continuity.

2 Scope

This CIRP applies to all computer systems and networks connected to Tulane University’s network. The CIRP contains actions required to assure the protection of Tulane University’s reputation, information assets and the student’s, faculty’s, and staff’s information assets that reside under Tulane University’s control.

Definitions and Acronyms

CIRT – Computer Incident Response Team
VPIT – Vice President of Information Technology
ISO – Information Security Officer (Chief or designee)
PCAB – Presidential Cabinet
TS – Technology Services
WFMO – Workforce Management Organization

Policy for Technology Services

Computer security incidents will occur that require full participation of TS technical personnel as well as divisional leadership to properly manage the outcome. TS will establish computer incident response procedures that will ensure that appropriate leadership and technical resources are involved to

  1. Assess the seriousness of an incident,
  2. Assess the extent of damage,
  3. Identify the vulnerability created,
  4. Estimate what additional resources – if any – are required to mitigate the incident,
  5. Mitigate the incident,
  6. Perform proper follow-up reporting, and
  7. Adjust procedures so that responses to future incidents are improved.

3 Role and Responsibilities

Within this section, the roles and responsibilities for the VPIT, CIRT, ISO, and Supporting Groups are defined. In addition, this section addresses the various Technology Services functional areas within the University and their CIRT responsibilities.

3.1 Vice President of Information Technology - Chief Technology Officer

The VPIT will either involve or inform as the needs of the incident dictate. Communication of information during an incident will follow this flow to eliminate confusion and misinformation between groups.

The VPIT is responsible for executing or delegating the following:

3.2 Information Security Officer (ISO)

This position will update the VPIT on a regular basis during a critical incident. The ISO will obtain technical expertise based on the incident declared.

The ISO is responsible for the following:

3.3 Computer Incident Response Team (CIRT)

During an incident the ISO will assemble a team. Members will vary depending on the skill sets required to assist during an incident. Teams will vary in size depending on the need. This team will remain active until the incident is closed. This team will be responsible for both response and recovery. The core membership of the CIRT is defined in section 6.

Response Phase: The response duties of the team are to conduct a triage of the incident, assist in containment of the incident, collect evidence for the post mortem report and if necessary, conduct or assist in a forensic investigation.

Assisting in the collection of evidence during an incident investigation
Making recommendations to the ISO on remedial action on affected systems
The CIRT may be called up 24 hours a day, 7 days a week, 365 days a year during a critical incident

Recovery Phase: The response aspects of the team are centered on damage assessment, return to normal operations, rebuilding servers and systems, etc.

Follow-up Phase:

3.4 Public Safety

3.5 General Counsel

3.6 WFMO

3.7 University Communications

4 Incident Defined

A computer security incident is any adverse event that threatens the confidentiality, integrity, or availability of university information assets, information systems, and the networks that deliver the information. Any violation of computer security policies, acceptable use policies, or standard computer security practices is an incident.

Adverse events may include unauthorized access to systems and information, denial-of-service attacks, loss of accountability, or damage to any part of the system. If an incident has happened or there is suspicion of an incident, the ISO must be notified to help determine the level of the incident and next steps in response as defined in this document.

4.1 Incident Levels

Incident levels are defined here for clarity although with any potential incident the ISO must be notified to help determine next steps.As part of the initial incident response process, the ISO will need to make an assessment of the incident’s impact and assign an appropriate severity level. This severity level will be based upon the potential impact to the operations or reputation of Tulane University, and/or their students, faculty, and/or staff.

An incident’s severity level dictates the initial response and management activities associated with the event. As incident management activities continue, further assessment may effect a reassignment to a higher or lower severity level.

Critical Incident: Any unexpected or unauthorized change, disclosure or interruption to Tulane University’s information resources that could be severely damaging to our students, staff, faculty, and/or reputation. These incidents impact on the University’s ability to meet its mission objectives.

High Level: Successful penetration or denial-of-service attack(s) detected with significant impact on operations. These incidents are: very successful; difficult to control or counteract; compromise large number of systems; cause significant loss of confidential data, loss of mission-critical systems or applications; compromise admin/root, user account; result in illegal file server share access; and cause significant risk of negative financial or public relations impact.

Medium Level: Penetration or denial-of-service attack(s) detected with limited impact on operations. These incidents are: minimally successful, easy to control or counteract, compromise small number of systems, result in little or no loss of confidential data and no loss of mission-critical systems or applications. This includes widespread instances of a new computer virus or worm that cannot be handled by deployed anti-virus software that may require corporate-wide activations of CIRT and/or site-administrators. Also includes illegal mirrors and unapproved content (e.g. games, pornography, multi-media servers on corporate networks). These incidents have small risk of negative financial or public relations impact.

Low Level: These incidents involve: a significant level of network probes, scans and similar activities detected indicating a pattern of concentrated reconnaissance; intelligence received concerning threats to which systems may be vulnerable; penetration or DoS attacks attempted with no impact on operations; isolated instances of a new computer virus; or work that cannot be handled by deployed anti-virus software.

5 Escalation levels and Roles and Responsibilities

The roles and responsibilities of each of the teams involved in incident response vary with the particular escalation level that is active at any particular point in time. These roles & responsibilities are described below.

5.1 Low Level Incident

Normal system operations coupled with periodic and real time monitoring of the university’s information assets.

5.2 Medium Level Incident

The monitoring processes have detected early indications of an incident.

5.3 High Level Incident

A threat has manifested itself.

CIRT

5.4 Critical Level Incident

The threat has become wide spread or is of high severity level.

5.5 Post Incident

The threat has been removed. Full recovery is made. Normal operations have commenced.

WFMO and General Counsel

5.6 Incident Review Report Template

Preparation/Documentation

Identification/Detection

Containment

Removal and Recovery

6 CIRT Core Team