• Skip to main content
  • Skip to primary sidebar

Information Security Management ResourceKit

A Public Service of SecureTheVillage

  • Home
  • Return to SecureTheVillage

Incident Response Plan Components

The plan should contain the following information necessary to maintain or resume operations and respond to an information security incident:

  1. Names, roles and contact information for the Incident Response Team (IRT), staff, vendors (including vendors needed to respond to an incident), and key clients
  2. Regulatory, contractual and compliance requirements
  3. An overview of critical business functions, criticality of those functions, and resources needed to maintain or resume operations
  4. Recovery procedures for various scenarios
  5. An inventory of all hardware needed for the Organization business operations, including servers, workstations, laptops, printers, faxes, cell phones, firewalls, routers, switches, wireless access points, etc.
  6. An inventory of all software needed for the Organization business operations, including workstation software and on-line software (SaaS)
  7. An inventory of all connectivity required, including Internet, telecommunications and wide area networks (WANs)
  8. An inventory of critical IT documents
  9. Location of all critical business information, including back-ups and shared folders
  10. Location of passwords and encryption keys
  11. An inventory of vital business records

The consolidated plan documents high-level procedures to follow in the event of a suspected security incident.

The plan also documents operational workarounds in the event of an information continuity disruption to the Organization’s business operations.

The plan documents how employees will communicate, from where they will work, and how they will keep working in the event of:

  1. Physical disruptions
  2. Telecommunications disruptions
  3. Disruptions to hardware / software
  4. Unavailability of key personnel

 

Contributed by Citadel Information Group.
© Copyright 2017. Citadel Information Group. All Rights Reserved.

 

Filed Under: Getting Cyber-Prepared

Primary Sidebar

Resources Areas

  • Cyber Threats
    • Ransomware
    • Online Bank Fraud
  • Information Security Management / Leadership
  • Information Security Policies and Standards
  • Information Security Risk Assessment
  • Information Classification and Control
  • Securing the Human
  • Third-Party Security Management
  • Managing Security of the IT Infrastructure
  • Legal & Related
    • Basic Cyber Laws
    • Payment Card Industry Data Security Standard (PCI DSS)
    • General Data Protection Regulation (GDPR)
    • California Consumer Privacy Act (CCPA)
    • Cybersecurity Maturity Model Certification (CMMC)
  • Getting Cyber-Prepared: Incident Response & Business Continuity
  • Managing Cyber-Risk and Insurance
  • Personal Cybersecurity
  • Cyber Freedom

Copyright © 2023 · SecureTheVillage