This document outlines the plan for responding to information security incidents at LightForce, including defining the roles and responsibilities of participants, the overall characterization of incident response, relationships to other policies and procedures and guidelines for reporting requirements. Due to the wide variety of incidents that could face LightForce and the rapid advancement of threats against LightForce, its data and systems, this document is designed to provide guidance in reacting to data security incidents, determination of their scope and risk, and ensuring an appropriate response to information security incidents, including communication of incidents to the appropriate stakeholders and reducing the incident from recurring. This protocol is not to be considered as policy due to the varied nature of incidents that can occur within a LightForce environment. This variation in incidents may cause deviations from this protocol that are meant to provide LightForce’ ability to respond to incidents in an optimal manner.
Anyone suspecting an exposure of LightForce data or systems should immediately contact: IT Help Desk Information Security Office – security@Lightforceortho.com
This plan applies to all information systems, data, and networks of LightForce and any person or device accessing these systems or data. The Information Security Office (ISO) acts on behalf of the LightForce community and will request cooperation and assistance in investigating incidents from community members as required.
LightForce’s Information Security Office (ISO) is responsible for the maintenance and revision of this document.
An event is an exception to the normal operation of IT infrastructure, systems or services. Events may be identified through the use of automated systems; reported violations to the ISO, Compliance/Privacy or other LightForce department; or in the course of normal system reviews including system degradation/outage. It is important to note that not all events become incidents.
An incident is an event that, as assessed by ISO staff, violates the Acceptable Use Policy, Access Control Policy, Confidential Data Policy or other LightForce policy, standard, or Code of Conduct or threatens the confidentiality, integrity, or availability of Information Systems or LightForce Data.
Regulated Data may have additional reporting and regulatory requirements when dealing with incidents. Examples of the various types of regulated data that may reasonably be found in LightForce environment are further detailed in Appendix C.
Throughout the course of the protocol, the CISO is broadly responsible for:
Throughout the course of the protocol, the Privacy Officer is broadly responsible for:
The Executive Response Team (ERT) consists of LightForce Officials with the authority to make key decisions in managing an incident related to data with regulatory requirements for reporting. The ERT shall be comprised of the following standing members (note: other members may be asked to collaborate where appropriate):
Throughout the course of the protocol, the Incident Response Coordinator is broadly responsible for:
Throughout the course of the protocol, Incident Response Handlers are broadly responsible for:
This plan outlines the general tasks for Incident Response. Due to the ever-changing nature of incidents and attacks upon LightForce, this incident response plan may be supplemented by specific internal guidelines, standards and procedures as they relate to the use of security tools, technology, and techniques used to investigate incidents.
The Information Security Office represents all LightForce provided Information System(s) and Data including data residing in cloud-based services. To the extent possible during an investigation, the ISO will attempt to coordinate investigation efforts with other groups in ensuring the security of LightForce systems and data in relation to the activities in support of LightForce. Specific actions and resources utilized in the investigation of an incident will be in alignment with the type, scope and risk of the threat to LightForce systems and data.
The primary goals of incident response are to contain the scope of an incident and reduce the risk to LightForce systems and data and to return affected systems and data back to an operational state as quickly as possible. The ability to quickly return systems to operation may at times be hampered by the collection of data necessary as evidence in the event of an exposure of data.
In today’s technology centered world many individuals have expectations about the availability of systems and data for themselves and the constituents they serve. The interruption of services can cause hardship and the ISO will cooperate with the affected groups to ensure downtime is minimized. However, LightForce leadership supports the priority of investigation activities where there is significant risk, and this may result in temporary outages or interruptions.
The continuous improvement of incident handling processes implies that those processes are periodically reviewed, exercised and evaluated for process improvement. LightForce staff inside and outside of IT will be periodically trained on procedures for reporting and handling incidents to ensure there is familiarity with the process and with the responsibilities of the Incident Response Team. These exercises may take the form of either external or internal training including tabletop exercises.
The Incident Response process encompasses six phases including preparation, detection, containment, investigation, remediation and recovery. These phases are defined in NIST SP 800-61 (Computer Security Incident Handling Guide). In the execution of responding to an incident, the Incident Response Team will focus on the detection, containment, investigation, remediation and recovery of the specific incident.
Preparation for incident response includes those activities that enable the organization to respond to an incident and include the creation and review of policies, standards and guidelines supporting incident response; security and technology related tools; effective communication plans and governance. Preparation also implies that the Departments across LightForce have implemented the controls necessary to enable the containment and investigation of an incident. As preparation happens outside the official incident process, process improvements from prior incidents should form the basis for continuous improvement at this stage.
Detection is the identification of an event or incident whether through automated means with security tools or notification by an inside or outside source about a suspected incident. This phase includes the declaration and initial classification of the event/incident.
Containment of an incident includes the identification of affected hosts or systems and their isolation or mitigation of the immediate threat. Communication with affected parties is established at this phase of incident response.
Investigation is the phase where ISO/IT personnel determine the priority, scope, risk and root cause of the incident.
Remediation includes the repair of affected systems and services, addressing residual attack vectors against other systems, communication and instructions to affected parties and an analysis that confirms the threat has been contained. If the CISO or Privacy Officer reasonably believe that an exposure of regulated data may have occurred, the CISO or Privacy Officer will contact the Office of the General Counsel to provide situational information in determining a proper response at this stage. Apart from any formal reports, the after-action analysis will be completed at this stage.
Recovery is the analysis of the incident for possible procedural and policy implications. Recovery also includes the incorporation of any “lessons-learned” from the handling of the incident into future exercises and/or training initiatives.
The Executive Response Team is responsible for actions such as communication, information sharing, and minimizing impact from an exposure of regulated data. As LightForce responses to each incident may vary, this section provides an overview of those actions that the Executive Response Team may take in responding to an incident in which regulatory data has been exposed.
Each incident presents a unique set of challenges and problems. This section provides some common guidelines for preferred actions in these types of events. For any issues outside of these guidelines, the Chief Information Security Officer or Office of General Counsel should be consulted.
In incidents where a member of the incident response team, their leadership or the leadership of LightForce is being investigated, appropriate resources will be selected to remove any conflicts of interest at the direction of or in conjunction with General Counsel.
All communications with external law enforcement agencies are made after consulting with the Office of General Counsel.
All public communications about an incident or incident response to external parties outside of LightForce are made in consultation with the Office of General Counsel and LightForce. Private communications with other affected or interested parties should contain the minimum information necessary as determined by the Incident Coordinator or Chief Information Security Officer.
LightForce respects the privacy of all individuals, and wherever possible the incident response process should be executed without knowledge of any individual identities until necessary.
All incident response activities will be documented to include artifacts obtained during any investigation. As any incident could require proper documentation for law enforcement action, all actions should be documented, and data handled in an appropriate manner to provide a consistent chain of custody for the validity of the data gathered.
At any time during the incident response process, the Incident Response Coordinator or the Chief Information Security Officer may be called upon to escalate any issue regarding the process or incident. The Chief Information Security Officer in consultation with the Office of General Counsel will determine if and when an incident should be escalated to external authorities.
PII is defined as a person’s first name or first initial and last name in combination with one or more of the following data elements:
PHI is identified as “individually identifiable health information” transmitted by electronic media, maintained in electronic media, or transmitted or maintained in any other form or medium by a Covered Entity as defined in 45 CFR 160.103. PHI is considered individually identifiable if it contains one or more of the following identifiers: