This document offers guidance for employees or incident responders who believe they have discovered or are responding to a security incident.

Escalation

Untitled

Internal Issues

When the malicious actor is an employee, contractor, vendor, or partner, please contact the Security team directly. Do not discuss the issue with other employees.

Compromised Communications

If there are IT communication risks (i.e. company phones, laptops, email accounts, etc. are compromised) the Security team will announce an out-of-band communication tool within the office or across the company.

Response Steps

For critical issues, the Response team will follow an iterative response process designed to investigate, contain the exploitation, remediate the vulnerability, and write post mortem and lessons learned documents.

  1. The Security team should determine if a lawyer should be involved with attorney-client privilege.
  2. A “War Room” will be designated.
  3. The following meeting will take place at regular intervals, starting with twice per day, until the incident is resolved.

Response Meeting – Agenda

Response Team Members