To maintain the trust of our employees, customers, and partners and meet regulatory requirements, it is essential that we do everything we can to protect confidential information and systems in the face of a cyberattack. The better prepared we are to respond to a potential cyberattack, the faster we can eradicate any threat and reduce the impact on our business.
This document describes the overall plan for responding to information security incidents at Door. It defines the roles and responsibilities of participants, definition of incidents, relationships to other policies and procedures and reporting requirements. The goal of the Security Incident Response Plan is to:
Effective incident response involves every part of our organization, including IT teams, legal, technical support, human resources, corporate communications, and business operations. It is important that you read and understand your role as well as the ways you will coordinate with others.
This plan will be updated annually to reflect organizational changes, new technologies and new compliance requirements that inform our cybersecurity strategy. We will conduct regular testing of this plan to ensure everyone is fully trained to participate in effective incident response.
Door’s Information Security Program Manager is responsible for the maintenance and revision of this document.
Use of ‘Door’ in this policy relates to Door Ventures Inc and Door Ventures Ltd as opposed to the Door platform.
An event is an exception to the normal operation of IT infrastructure, systems, or services. Not all events become incidents.
An incident is an event that, as assessed by Door’s Information Security Program Manager, violates the Data Security Policy; Information Security Policy; other Door policy, standard, or code of conduct; or threatens the confidentiality, integrity, or availability of Information Systems or Client Data.
Incidents may be established by review of a variety of sources including, but not limited to monitoring systems, reports from staff or outside organisations and service degradations or outages.
Service outage procedures are detailed in Door’s Business Continuity Plan.
Incidents will be categorised according to the potential for restricted data exposure or criticality of resource using High-Medium-Low categories. The initial severity rating may be adjusted during plan execution. Detected vulnerabilities will not be classified as incidents. (See Appendix A: Threat Classification)
In addition to the company environment, Door employs platform monitoring to help identify any data breaches on the Door platform. Door has allocated staff members to monitor this. In the absence of indications of sensitive data exposure, vulnerabilities will be communicated, and the Information Security Program Manager will pursue available technology remedies to reduce that risk.
This plan outlines the most general tasks for Security Incident Response and will be supplemented by specific internal guidelines and procedures. These internal guidelines and procedures are subject to amendment as technology changes.
The goal of Incident Response is to reduce and contain the scope of an incident and ensure that technology assets are returned to service as quickly as possible. Rapid response is balanced by the requirement to collect and preserve evidence.
Door has service agreements with its customers. Interruption will be minimised alongside this agreement. However, Door’s management supports the priority of investigation activities where there is significant risk, and this may result in temporary outages or interruptions. Door will communicate any relevant issues to its customers.
Door will endeavour to maintain sufficient staffing and third-party augmentation to investigate each incident to completion and communicate its status to other parties while it monitors the tools that detect new events.
The continuous improvement of incident handling processes implies that those processes are periodically reviewed, tested and translated into recommendations for enhancements. Door staff will be periodically trained on procedures for reporting and handling incidents to ensure that there is a consistent and appropriate response to incidents, and that post-incident findings are incorporated into procedural enhancements.
Door’s incident process encompasses six phases:
Review and codify an organizational security policy, perform a risk assessment, identify sensitive assets, define which are critical security incidents the team should focus on, and build a Computer Security Incident Response Team (CSIRT).
Monitor IT systems and detect deviations from normal operations and see if they represent actual security incidents. When an incident is discovered, collect additional evidence, establish its type and severity, and document everything.
The response time depends on several factors, such as the type of incident, the criticality of the resources and data that are affected, the severity of the incident, existing Service Level Agreements (SLA) for affected resources, the time and day of the week, and other incidents that the team is handling. Generally, the highest priority is handling incidents that are likely to cause the most damage to the organization or to other organizations.
Incidents will be classified based on severity and accordingly resolution timelines will be decided. CSIRT will use the criteria defined below when assigning labels.
The severity is used to indicate the actual or potential impact and helps determine the timeline for resolution. Severity should remain the highest level assessed once triage has been done. If it is determined the severity was inaccurately assessed, it should be updated with why the adjustment was made and how we arrived at that conclusion clearly documented in the issue comments.
Impact | Example |
---|---|
Critical | Severe impact to production data confidentiality, integrity or availability is likely if immediate action is not taken. Current controls do not satisfactorily mitigate the risk. Possibility of mass customer impact. Or, reputational risk is severe. |
High | Impact to production data confidentiality, integrity or availability is likely if one or more security controls are circumvented. Current controls mitigate the initial risk. Customer impact or high likelihood of customer impact. Or, reputational risk is high. |
Moderate | Unlikely to impact production data confidentiality, integrity or availability unless multiple security controls fail or are bypassed. Current controls mitigate the initial risk. No customer impact. Or, reputational risk is moderate. |
Low | No risk to impact production data confidentiality, integrity or availability unless multiple security controls fail or are bypassed. Current controls are adequate. No risk of customer impact. Reputational risk is low or highly unlikely. |
Every time there is a security incident, evaluation of the scope and exposure of the risk, the confidentiality level, and more. By doing so, we split the issue into multiple, easier to assess, sub-issues. Here are a few examples:
How many of the following areas of the CIA Triad apply?
Affected Surface - What is the affected surface?
Exploitability - How easy is it to exploit the issue?
Visibility - Who can see this issue?
The more areas of the CIA Triade that apply combined with the significance of the Affected Surface, Exploitability, and Visibility should be used to determine an estimated Severity.
Severity | Example | Expected Resolution timeline |
---|---|---|
Critical | Unauthenticated RCE vulnerability on production instances. | Immediate response from CSIRT is needed with a resolution timeline of 12 hours. |
High | A patched RCE vulnerability on production instances. | The issue can wait until next business day with the resolution time of 1 working day |
Moderate | A patched RCE vulnerability on production instances that is being rolled out to the wider public. | No urgent action required, but actively monitored by CSIRT. Medium incidents have 3 days resolution timeline. |
Low | A previously revoked and investigated access token has been discovered. | No action required, monitored in case the situation changes. Medium incidents have 1 week of resolution timeline. |
Eventually | False positives kept open for review, informational notices. | No action required, handled when/if CSIRT has spare cycles. |
Perform short-term containment, for example by isolating the network segment that is under attack. Then focus on long-term containment, which involves temporary fixes to allow systems to be used in production, while rebuilding clean systems.
Remove malware from all affected systems, identify the root cause of the attack, and take action to prevent similar attacks in the future.
Bring affected production systems back online carefully, to prevent additional attacks. Test, verify and monitor affected systems to ensure they are back to normal activity.
No later than two weeks from the end of the incident, perform a retrospective of the incident. Prepare complete documentation of the incident, investigate the incident further, understand what was done to contain it and whether anything in the incident response process could be improved.
In the process of responding to an incident, many questions arise, and problems are encountered, any of which may be different for each incident. This section provides guidelines for addressing common issues. The Door Information Security Program Manager and legal counsel may be consulted for questions and incident types not covered by these guidelines.
In the case that the Door Information Security Program Manager is a person of interest in an incident, Door’s Co-Founders will assign another person to be responsible.
All communications with external law enforcement authorities are made after consulting with legal counsel.
All client communications about an incident or incident response will be prepared and agreed with the Door Information Security Program Manager and Co-Founders.
This Security Incident Response Plan must be followed by all personnel, including all employees, temporary staff, consultants, contractors, suppliers and third parties operating on behalf of Door. All personnel are referred to as ‘staff’ within this plan.
Below are details about the roles and responsibilities of each member of Door to prevent and respond to a workplace incident. It is not an exhaustive list of duties but designed to give each employee a general understanding of their role and the roles of other employees in incident response and prevention.
The Incident Response Lead is responsible for:
Responsibilities
Responsibilities
Responsibilities
Responsibilities
Responsibilities
Responsibilities
Responsibilities
Responsibilities
Responsibilities
Responsibilities
Responsibilities
Responsibilities
All incident response activities will be documented. Incidents will be prioritised and ranked according to their potential to disclose restricted data.
To demonstrate and improve the effectiveness of Door’s incident response team and security tools, Door requires a record of all actions taken during each phase of an incident. Supporting documentation is required, including all forensic evidence collected such as activity logs, memory dumps, audits, network traffic, and disk images. (See Appendix B: Incident Response Checklist)
As an investigation progresses, its ranking may change, resulting in a greater or lesser prioritisation of Door resources. Incidents will be reviewed post-mortem to assess whether the investigational process was successful and effective. Subsequent adjustments may be made to methods and procedures used by Door to improve the incident response process.
At any time during the incident response process, the Door Co-Founders and the Information Security Program Manager may be called upon to escalate any issue regarding the process or incident. They will determine if, and when, an incident should be escalated to external authorities.
This policy will be reviewed as it is deemed appropriate, but no less frequently than every 12 months.
Further information and advice on this policy can be obtained from Rob Sanders, rsanders@doorfunds.com
The CIA Triad (Confidentiality
, Integrity
, and Availability
) is a framework for incident classification that helps to prioritize the level of incident response required for a cyberattack.
Confidentiality
– Incidents involving unauthorized access to systems, including privileged account compromise. The more confidential the data or the more important the systems are to the business, the higher the potential impact.Integrity
– Incidents involving data poisoning, including leveraging a privileged account to corrupt or modify data. The more sensitive the data, the higher the potential impact.Availability
– Incidents that impact the availability or proper functioning of services, such as Distributed Denial of Service (DDoS) or ransomware, including use of privileged accounts to make unauthorized changes. The more critical the services to the business, the higher the potential impact.When ranking the level of risk to the organization and the type of incident response required, Door must consider the extent to which privileged accounts are compromised, including those associated with business users, network administrators, and service or application accounts. When privileged accounts are involved in the breach, the level of risk increases exponentially as does the response required.
ACTION TAKEN
ACTION TAKEN
ACTION TAKEN
ACTION TAKEN
ACTION TAKEN
Any organization that creates, receives, maintains, or transmits electronic protected health information (ePHI) in the United States must meet HIPAA requirements for access control and data sharing.
Sarbanes-Oxley (SOX) is designed to reduce corporate fraud by requiring an increase in the strength and granularity of security controls for financial auditing and reporting.
Any organization dealing with EU citizens’ Personally Identifiable Information is obligated to meet standards for effective data protection, adequate security measures, and privacy by design to comply with EUGDPR.