Vanta policy template instructions
This Vanta policy template represents a complete, compliance-ready policy with placeholders for company specific text. Each policy section represents a policy-specific topic that you should consider and/or modify to match your company’s practices.
For each policy section
Consider if this section and its corresponding risks applies to you. If it does not, remove it and/or replace it with your organization’s corresponding practices.
Replace any highlighted text in angled brackets < >1 with your own language
Rewrite the policy language such that it reflects the practices of your organization
Policy completion checklist
Use Find to make sure that all text in angled brackets is replaced
Proofread your policy for spelling and grammar mistakes
Confirm that the policy’s content reflects your organizations practices
Add any company-specific letterhead, branding, and formatting
Remove this instructions page
Export this document as PDF — File > Save As > Change “File Format” to PDF
Upload the PDF to Vanta at https://app.vanta.com/policies
More questions?
A good rule-of-thumb is to keep your language high enough level such that it stays representative for at least a year. If you have more questions about how to use this template, please reach out to support@vanta.com or your auditor for additional guidance.
Incident Response Plan
Policy Owner: <Policy owner>
Effective Date: <Effective date>
Purpose
This document establishes the plan for managing information security incidents and events, and offers guidance for employees or incident responders who believe they have discovered, or are responding to, a security incident.
Scope
This policy covers all information security or data privacy events or incidents.
Incident and Event Definitions
A security event is an observable occurrence relevant to the confidentiality, availability, integrity, or privacy of company controlled data, systems or networks.
A security incident is a security event which results in loss or damage to the confidentiality, availability, integrity, or privacy of company controlled data, systems or networks.
Incident Reporting & Documentation
Reporting
If a <Company Name> employee, contractor, user, or customer becomes aware of an information security event or incident, possible incident, imminent incident, unauthorized access, policy violation, security weakness, or suspicious activity, then they shall immediately report the information using one of the following communication channels:
Email help@<Company Name>.com information or reports about the event or incident2
Reporters should act as a good witness and behave as if they are reporting a crime. Reports should include specific details about what has been observed or discovered.
Severity3
<Team or role responsible for monitoring reports of security incidents or events, e.g., <Company Name> Support Team> shall monitor incident and event tickets and shall assign a ticket severity based on the following categories.
S3/S4 - Low and Medium Severity
Issues meeting this severity are simply suspicions or odd behaviors. They are not verified and require further investigation. There is no clear indicator that systems have tangible risk and do not require emergency response. This includes lost/stolen laptop with disk encryption, suspicious emails, outages, strange activity on a laptop, etc.
S2 - High Severity
High severity issues relate to problems where an adversary or active exploitation hasn’t been proven yet, and may not have happened, but is likely to happen. This may include lost/stolen laptop without encryption, vulnerabilities with direct risk of exploitation, threats with risk or adversarial persistence on our systems (e.g.: backdoors, malware), malicious access of business data (e.g.: passwords, vulnerability data, payments information).
S1 - Critical Severity
Critical issues relate to actively exploited risks and involve a malicious actor or threats that put any individual at risk of physical harm. Identification of active exploitation is required to meet this severity category.
Escalation and Internal Reporting4
The incident escalation contacts can be found below in Appendix A5.
S1 - Critical Severity: S1 issues require immediate notification to <describe the role/team that should be immediately notified about S1 issues, e.g., IT and/or Engineering> management.
S2 - High Severity: A <type of ticket that should be created in the event of a S2 event or incident, e.g., support> ticket must be created and the appropriate manager (see S1 above) must also be notified via <channel for notifying the appropriate contact, e.g., email or Slack> with a reference to the ticket number.
S3/S4 - Medium and Low Severity: A <type of ticket that should be created in the event of a S2 event or incident, e.g., support> ticket must be created and assigned to the appropriate department for response.
Documentation6
All reported security events, incidents, and response activities shall be documented and adequately protected in <describe where this will be documented, e.g., the ServiceDesk or Salesforce ticket system>.
A root cause analysis may be performed on all verified <S1> security incidents. A root cause analysis report shall be documented and referenced in the incident ticket. The root cause analysis shall be reviewed by the <reviewer of root cause analysis decider of requirement for a post-mortem, e.g., VP of Support, VP of Engineering, and/or the IT Manager> who shall determine if a post-mortem meeting will be called.
Incident Response Process7
For critical issues, the response team will follow an iterative response process designed to investigate, contain exploitation, eradicate the threat, recover system and services, remediate vulnerabilities, and document a post-mortem report including the lessons learned from the incident.
Summary
Event reported
Triage and analysis
Investigation
Containment & neutralization (short term/triage)
Recovery & vulnerability remediation
Hardening & Detection improvements (lessons learned, long term response)
Detailed
IT Manager or VP of Support will manage the incident response effort
If necessary, a central “War Room” will be designated, which may be a physical or virtual location (i.e Slack channel)
A recurring Incident Response Meeting will occur at regular intervals until the incident is resolved
Legal and executive staff will be informed as required
Incident Response Meeting Agenda
Update Incident Ticket and timelines
Document new Indicators of Compromise (IOCs)
Perform investigative Q&A
Apply emergency mitigations
External Reporting / Breach Reporting
Plan long term mitigations
Document Root Cause Analysis (RCA)
Additional items as needed
Special Considerations8
Internal Issues9
Issues where the malicious actor is an internal employee, contractor, vendor, or partner requires sensitive handling. The incident manager shall contact <direct contact for sensitive information, e.g., HR or the CEO> directly and will not discuss with other employees. These are critical issues where follow-up must occur.
Compromised Communications10
Incident responders must have <communication method, e.g., Slack messaging> arranged before listing themselves as incident members. If there are IT communication risks, an out of band solution will be chosen, and communicated to incident responders via <how changes to communication will be communicated if needed, e.g., cell phone>.
Root Account Compromise11
If an AWS root account compromise is known or expected, refer to the playbook in Appendix D.
Additional Requirements
Suspected and reported events and incidents shall be documented
Suspected incidents shall be assessed and classified as either an event or an incident
Incident response shall be performed according to this plan and any associated procedures.
All incidents shall be formally documented, and a documented root cause analysis shall be performed
Incident responders shall collect, store, and preserve incident-related evidence in accordance with industry guidance and best practices such as NIST SP 800-86 ‘Guide to Integrating Forensic Techniques into Incident Response’12
Suspected and confirmed unauthorized access events shall be reviewed by the Incident Response Team. Breach determinations shall only be made by the <who determines if a breach occurred, e.g., CEO and legal counsel in coordination with executive management>
<Company Name> shall promptly and properly notify customers, partners, users, affected parties, and regulatory agencies of relevant incidents or breaches in accordance with <Company Name> policies, contractual commitments, and regulatory requirements, as determined by the <CEO, Legal Department>
This Incident Response Plan shall be reviewed and formally tested at least <how often the Incident Response Plan will be reviewed, e.g., annually>. Results of IR plan testing activities including findings and lessons learned will be formally documented and maintained to support security, compliance and audit requirements
External Communications and Breach Reporting13
Legal and executive staff shall confer with technical teams in the event of unauthorized access to company or customer systems, networks, and/or data. Legal staff along with the CEO shall determine if breach reporting or external communications are required. Breaches shall be reported to customers, consumers, data subjects and regulators without undue delay and in accordance with all contractual commitments and applicable legislation.
No personnel may disclose information regarding incident or potential breaches to any third party or unauthorized person without the approval of legal and/or executive management.
Mitigation and Remediation14
Legal and executive staff shall determine any immediate or long term mitigations or remedial actions that need to be taken as a result of an incident or breach. In the event that mitigations or remedial actions are needed, executive staff shall direct personnel with respect to planning, communicating and executing those activities.
Cooperation with Customers, Data Controller and Authorities15
As needed and determined by legal and executive staff, the company shall cooperate with customers, Data Controllers and regulators to fulfill all of its obligations in the event of an incident or data breach.
Roles & Responsibilities
Every employee and user of any <Company Name> information resources has responsibilities toward the protection of the information assets. The table below establishes the specific responsibilities of the incident responder roles.
Response Team Members16
Role | Responsibility |
Incident Manager | The Incident Manager is the primary and ultimate decision maker during the response period. The Incident Manager is ultimately responsible for resolving the incident and formally closing incident response actions. See Appendix A17 for Incident Manager contact information. These responsibilities include: Ensuring the right people from all functions are actively involved as appropriate Communicating status updates to the appropriate person or teams at regular intervals Resolving incidents in the immediate term Determining necessary follow-up actions Assigning follow-up activities to the appropriate people Promptly reporting incident details which may trigger breach reporting, in writing to the <person that receives incident details and decides on breach reporting requirement, e.g., Chief Information Officer> |
Incident Response Team (IRT) | The individuals who have been engaged and are actively working on the incident. All members of the IRT will remain engaged in incident response until the incident is formally resolved, or they are formally dismissed by the Incident Manager. |
Engineers (Support and Development) | Qualified engineers will be placed into the on-call rotation and may act as the Incident Manager (if primary resources are not available) or a member of the IRT when engaged to respond to an incident. Engineers are responsible for understanding the technologies and components of the information systems, the security controls in place including logging, monitoring, and alerting tools, appropriate communications channels, incident response protocols, escalation procedures, and documentation requirements. When Engineers are engaged in incident response, they become members of the IRT. |
Users | Employees and contractors of <Company Name>. Users are responsible for following policies, reporting problems, suspected problems, weaknesses, suspicious activity, and security incidents and events. |
Customers | Customers are responsible for reporting problems with their use of <Company Name> services. Customers are responsible for verifying that reported problems are resolved. |
Legal Counsel | Responsible, in conjunction with the CEO and executive management, for determining if an incident presents legal or regulatory exposure as well as whether an incident shall be considered a reportable breach. Counsel shall review and approve in writing all external breach notices before they are sent to any external party. |
Executive Management | Responsible, in conjunction with the CEO and Legal Counsel, for determining if an incident shall be considered a reportable breach. An appropriate company officer shall review and approve in writing all external breach notices before they are sent to any external party. <Company Name> shall seek stakeholder consensus when determining whether a breach has occurred. The <Company Name> CEO shall make a final breach determination in the event that consensus cannot be reached. |
Management Commitment
<Company Name> management has approved this policy and commits to providing the resources, tools and training needed to reasonably respond to identified security events and incidents with the potential to adversely affect the company or its customers.
Exceptions
Requests for an exception to this Policy must be submitted to and authorized by the <approver of exceptions to this policy, e.g., IT Manager> for approval. Exceptions shall be documented.
Violations & Enforcement
Any known violations of this policy should be reported to the <receivers of policy violation reports, e.g., IT Manager or the CEO>. Violations of this policy may result in immediate withdrawal or suspension of system and network privileges and/or disciplinary action in accordance with company procedures up to and including termination of employment.
Version | Date | Description | Author | Approved by |
<1.0> | <29-Apr-2020> | <First Version> | <OWNER> | <APPROVER> |
Appendix A – Contact Information
Contacts for IT and Engineering Management as well as executive staff and can be found <where contacts for IRT members can be found, e.g., at the bottom of the On-Call list here: <link>>18
Appendix B – Incident Collection Form19
General Information | ||||
Incident Detector’s Information | ||||
Name: | Date and Time Detected: | |||
Title: | ||||
Phone: | Location Incident Detected From: | |||
E-mail: | ||||
Additional Information: | ||||
Incident Summary | ||||
Type of Incident Detected: | ||||
Denial of Service | Unauthorized Use | Espionage | Probe | Hoax |
Malicious Code | Unauthorized Access | Other: | ||
Incident Location: | ` | |||
Site: | ||||
Site Point of Contact: | ||||
Phone: | ||||
Email: | ||||
How was the Incident Detected: | ||||
Additional Information: | ||||
Location(s) of affected systems: | ||||
Date and time incident handlers arrived at site: | ||||
Describe affected information system(s) (one form per system is recommended): | ||||
Hardware Manufacturer: | ||||
Serial Number: | ||||
Corporate Property Number (if applicable): | ||||
Is the affected system connected to a network? | Yes | No | ||
Describe the physical security of the location of affected information systems (locks, security alarms, building access, etc.): | ||||
Isolate affected systems: | ||||
Approval to removal from network? | Yes | No | ||
If YES, Name of Approver: | ||||
Date and Time Removed: | ||||
If NO, state the reason: | ||||
Backup of Affected System(s): | ||||
Last System backup successful? | Yes | No | ||
Name of persons who did backup: | ||||
Date and time last backups started: | ||||
Date and time last backups completed: | ||||
Backup Storage Location: | ||||
Incident Eradication: | ||||
Name of persons performing forensics: | ||||
Was the vulnerability (root cause) identified: | Yes | No | ||
Describe: | ||||
How was eradication validated: | ||||
Appendix C – HIPAA Breach Procedures for Protected Health Information (PHI)20
Procedures
In the event that <customer name> identifies a potential breach of PHI occurs, the following procedures shall be followed.
Step 1: Identification (Discovery)
A breach of PHI will be deemed “discovered” as of the first day <customer name> knows of the breach or, by exercising reasonable diligence, would or should have known about the breach.
If a potential breach is discovered, it is very time sensitive and must be immediately reported.
The following is full description of what constitutes PHI
PHI is any health information that can be tied to an individual to include the following:
Names (Full or last name and initial)
All geographical identifiers smaller than a state, except for the initial three digits of a zip code if, according to the current publicly available data from the U.S. Bureau of the Census: the geographic unit formed by combining all zip codes with the same three initial digits contains more than 20,000 people; and the initial three digits of a zip code for all such geographic units containing 20,000 or fewer people is changed to 000
Dates (other than year) directly related to an individual including birth date, admission date, discharge date, date of death; and all ages over 89 and all elements of dates (including year) indicative of such age, except that such ages and elements may be aggregated into a single category of age 90 or older.
Phone numbers
Fax numbers
Email addresses
Social Security numbers
Medical record numbers
Health insurance beneficiary numbers
Account numbers
Certificate/license numbers
Vehicle identifiers (including serial numbers and license plate numbers)
Device identifiers and serial numbers
Web Uniform Resource Locators (URLs)
Internet Protocol (IP) address numbers
Biometric identifiers, including finger, retinal and voice prints
Full face photographic images and any comparable images
Any other unique identifying number, characteristic, or code except the unique code assigned by the investigator to code the data
There are also additional standards and criteria to protect individual's privacy from reidentification. Any code used to replace the identifiers in datasets cannot be derived from any information related to the individual and the master codes, nor can the method to derive the codes be disclosed. For example, a subject's initials cannot be used to code their data because the initials are derived from their name. Additionally, the researcher must not have actual knowledge that the research subject could be re-identified from the remaining identifiers in the PHI used in the research study. In other words, the information would still be considered identifiable if there was a way to identify the individual even though all of the 18 identifiers were removed.
Step 2: Initial Reporting / Escalation
If there is belief that a potential breach of PHI has occurred, the designated Security and/or Privacy Officer, or their designated representative, must be immediately notified.
Please provide all of the information available at the time of the initial regarding the potential breach, to include the following:
Names
Dates
The nature of the PHI potentially breached
The manner of the disclosure (fax, email, mail, verbal)
All employees involved
The recipient
All other persons with knowledge
Any associated written or electronic documentation that may exist.
Notification and associated documentation may itself contain PHI and should only be given to the designated Security and/or Privacy Officer, or their designated representative.
Do not discuss the potential breach with anyone else, and do not attempt to conduct an investigation as these tasks will be performed by the designated Security and/or Privacy Officer, or their designated representative.
Step 3: Investigation
Upon receipt of notification of a potential breach the designated Security and/or Privacy Officer, or their designated representative shall promptly conduct an investigation.
The investigation shall include the following activities:
Interviewing employees involved
Collecting written documentation
Completing all appropriate documentation
Forensic investigation (optional depending on incident)
The designated Security and/or Privacy Officer, or their designated representative, shall retain all documentation related to potential breach investigations, in accordance with established record retention requirements, or for a minimum of six years, whichever is greater.
Step 4: Risk Assessment and Recommendation
Upon completion of the investigation, the designated Security and/or Privacy Officer, or their designated representative, shall perform a Risk Assessment to determine if the use or disclosure of PHI constitutes a breach and requires further notification to the Covered Entity.
The designated Security and/or Privacy Officer, or their designated representative, shall appropriately document the Risk Assessment and make a recommendation to executive management and/or legal counsel regarding whether notification to the Covered Entity of the potential breach would be prudent.
When executing the risk assessment, a “reasoned judgment” standard will be applied to the incident which shall be fact specific, and shall include consideration of the following factors:
Did the disclosure involve Unsecured PHI in the first place?
Who impermissibly used or disclosed the Unsecured PHI?
To whom was the information impermissibly disclosed?
Was it returned before it could have been accessed for an improper purpose?
What type of Unsecured PHI is involved and in what quantity?
Was the disclosure made for any improper purpose?
Is there the potential for significant risk of financial, reputational, or other harm to the individual whose PHI was disclosed?
Was immediate action taken to mitigate any potential harm?
Do any of the specific breach exceptions apply?
Step 5: Final Determination
<customer name>’s executive management in collaboration with legal counsel shall, after review of the evidence and risk assessment, have final authority to determine whether a breach of PHI occurred and what, if any, further action is warranted.
Step 6: Notification
In the event that <customer name>’s executive management and/or legal counsel determines that notice to the Covered Entity is warranted, <customer name>’s executive management and/or legal counsel or the designated representative shall promptly prepare and transmit a notice to the Covered Entity.
Timing of Notification
<customer name> shall notify the Covered Entity “without unreasonable delay” but no later than 60 days after discovery and/or notification of the breach, as required by law.
<customer name> Service and Business Associate Agreements provides that <customer name> is an independent contractor; therefore, the Covered Entity’s time to provide the requisite notice begins to run on the date that <customer name> notifies the Covered Entity of the breach.
Delay of Notification
Unjustified Delay
If it appears to the designated Security and/or Privacy Officer, or their designated representative, that their investigation will not be completed within a reasonable time, executive management and/or legal counsel shall be informed to ensure that the Covered Entity will be notified before completion of the investigation.
Law Enforcement Delay
A delay in notification is permissible if a law enforcement official states that a breach notification would impede a criminal investigation or cause damage to national security
If a law enforcement request is received, the law enforcement statement must be in writing and must specify the length of the delay required.
If the request for a delay in notification is oral, <customer name> must document the statement and request written confirmation within 30 days. If no written request for a delay is received within that time, <customer name> must send notification of the breach to the Covered Entity.
Content of Notification
Any notification to the Covered Entity (CE) provided by <customer name> shall include all information as required by law, but at a minimum, will contain the following content:
Identification of each individual whose PHI is believed to have been breached
The date of the incident discovery
The date of disclosure
The facts and circumstances surrounding the disclosure
All associated documentation
All other available information known to <customer name> that the Covered Entity will be required to include in its own Notice to the individual(s).
Any additional information regarding the breach that <customer name> discovers after the initial notice to the Covered Entity be promptly provided to the Covered Entity as required by law.
Any notice to the Covered Entity shall be sent via first class mail with a return receipt requested and the return receipt as well as a copy of the Covered Entity Notice shall be kept with related documentation and retained in accordance with established record retention requirements or for a minimum of six years, whichever is greater.
Step 7: Documentation
All phases of the process must be documented in detail on a case-specific basis, in a manner sufficient to demonstrate that all appropriate steps were completed. All supporting documentation associated with the potential breach shall be kept on file in accordance with established record retention requirements or for a minimum of six years, whichever is greater.
HIPAA Breach Check List
Following any actual or suspected breach of unsecured electronic protected health information (ePHI), <customer name> must notify the affected Covered Entity (CE).
Notify the Security Officer and/or Privacy Officer and Legal of a suspected ePHI breach, within four (4) hours.
Incident Response Team investigates suspected breach and execute risk assessment to verify if ePHI data has been compromised.
Incident Response Team shall complete a Breach Notification Report
Incident Response Team provides the completed Breach Notification Report to the Security Officer and/or Privacy Officer for review and approval
Security and/or Privacy Officer review and approve the submitted Breach Notification Report
Security and/or Privacy Officer provide a copy of the final Breach Notification Report to <customer name> Legal department within one (1) business day after approval
Legal reviews Breach Notification Report and submits the report to the Covered Entity through approved communication channels
Legal will ensure that notification to the Covered Entity occurs no later than sixty (60) calendar days following the initial discovery of a breach or suspected breach, unless delayed by an appropriate law enforcement agency.
HIPAA Breach Notification Content and Template
The Breach Notification Report to the Covered Entity (CE) notification must include the following information.
Identification of each individual associated with the affected Covered Entity (CE) whose ePHI was suspected to have been accessed, acquired, used, or disclosed (to the extent possible).
Any other information that the covered entity is required to include in notification to the affected individual under CFR 164.404(c) which includes:
A brief description of what happened, including the date of the breach and the date of the discovery of the breach, if known.
A description of the types of unsecured protected health information that were involved in the breach (such as whether full name, social security number, date of birth, home address, account number, diagnosis, disability code, or other types of information were involved).
Any steps individuals should take to protect themselves from potential harm resulting from the breach.
HIPAA Breach Notification Template
Information Security: HIPAA / ePHI Breach Notification Report | |
Incident Number: <###-MMYYYY or Ticket #> | |
Other Incidents Related to this Incident: | |
Breach Incident Status | (i.e., New, In progress, Forwarded for investigation, Resolved) |
Incident Summary | Description of what happened and is known to date |
Incident Description | Date and Time Incident Discovered: |
Date and Time Incident Reported: | |
Date and Time Incident Occurred: | |
Place of Incident: | |
Personnel Involved in Incident: | |
Type and Volume of Information Involved: | |
Accessibility/Vulnerability of ePHI / Protective Controls in Place: (e.g. Encryption, etc.): | |
Indicators of Compromise Related to the Incident: | |
Root Cause of Incident: | |
Awareness of Incident (who knows about it now): | |
Initial Risk Assessment | Number of Individuals Potentially Affected: |
Potential Privacy Breach (Yes/No): | |
Risk to Individuals (Types and Extents): | |
Financial Risk to Organization: | |
Legal/Contractual Risk to Organization: | |
Regulatory Risk to Organization: | |
Public Relations Risk to Organization: | |
ePHI Accessed or Modified in an Unauthorized Manner (Yes / No): | |
Steps Taken | Current Actions Taken: |
Evidence Gathered / Chain of Custody: | |
People Contacted: (e.g., system owners, system administrators, Law enforcement, outside counsel, forensics investigators): | |
Data Breach Services Provider Contacted: | |
Agencies Notified: | |
Close or Move to Investigation Phase and Why: | |
Notification | Covered Entity(s) (CE) Affected: |
Date Covered Entity(s) (CE) Notified: | |
Method(s) used to Notify Covered Entity(s) (CE): | |
Notification Record (Ticket # Documenting Notification): | |
System Generated List of Individuals Affected Attached (Required): | |
Supporting Details: | |
Recommendations | Immediate Notification Requirements: Affected Covered Entities MUST be notified within sixty (60) days of a suspected breach. |
Priorities and Considerations for Further Investigation | |
Next Steps to be Taken (e.g., Rebuild the host, upgrade an application, implement additional controls, etc.). | |
Recommendations for Affected Individuals: |
Appendix D – AWS Root Account Compromise Playbook21
Incident Response Runbook – Root Usage
Objective
The objective of this runbook is to provide specific guidance on how to manage Root AWS account usage. This runbook is not a substitute for an in-depth Incident Response strategy. This runbook focuses on the IR lifecycle:
Establish control.
Determine impact.
Recover as needed.
Investigate the root cause.
Improve.
The Indicators of Compromise (IOC), initial steps (stop the bleeding), and the detailed CLI commands needed to execute those steps are listed below.
Assumptions
CLI configured and installed.
Reporting process is already in place.
Trusted Advisor is active.
Security Hub is active.
Indicators of Compromise
Activity that is abnormal for the account.
Creation of IAM users.
CloudTrail turned off.
Cloudwatch turned off.
SNS paused.
Step Functions paused.
Launching of new or unexpected AMIs.
Changes to the contacts on the account.
Steps to Remediate – Establish Control
AWS documentation for a possible compromised account calls out the specific tasks listed below. The documentation for a possible compromised account can be found at: What do I do if I notice unauthorized activity in my AWS account?
Contact AWS Support and TAM as soon as possible.
Change and rotate Root password and add an MFA device associated with Root.
Rotate passwords, access/secret keys, and CLI commands relevant to remediation steps.
Review actions taken by the root user.
Open the runbooks for those actions.
Close incident.
Review the incident and understand what happened.
Fix the underlying issues, implement improvements, and update the runbook as needed.
Further Action Items – Determine Impact
Review created items and mutating calls. There are may be items that have been created to allow access in the future. Some things to look at:
IAM Cross account roles.
IAM Users.
S3 buckets.
EC2 instances.
[Your application and infrastructure will drive this list.]
1 All fields in this document marked by angled brackets < > and highlighted must be filled in.
2 List out the communication channels that should be used if someone observes a security event or incident
3 In this section, describe your company’s security incident or event severity labels. Your company might used other labels like “P1”—if that’s the case, reflect that here and below.
4 In this section, describe your company’s process for reporting and escalating security events or incidents
5 This is a reference to an Appendix in this document. If you are not using this appendix to describe incident escalation response contacts, remove this reference.
6 In this section, describe your company’s documentation process for security events and incidents
7 In this section, describe your company’s incident response process for security events and incidents.
8 In this section, describe special considerations for your company’s incident responses
9 Describe your company’s process for handing issues with internal actors
10 Describe your company’s process for handing issues with member of your company’s incident response team
11 AWS Root Account Compromise added for AWS FTR compliance. Delete if not applicable.
12 Describe your company’s process for handing issues with member of your company’s incident response team
13 External communications added for v2
14 Mitigation added for v2
15 Cooperation with 3rd parties added for v2
16 Use this table to describe your company’s incident response team members roles and responsibilities
17 This is a reference to an appendix in this document. If you are not planning on using this appendix, list the Incident Manager’s contact information here. It is recommended that you use the appendix to avoid needing to frequently update the policy itself.
18 Add external on-call list or delete Appendix
19 This form can be used to collect information about a security incident. If your process does not include this form, remove this appendix.
20 Tailor for your environment. This addendum addresses HIPAA requirements. If your organization is not subject to HIPAA you can delete this Appendix. - added for v2
21 AWS Root compromise playbook delete if not relevant