Last modified: March 14, 2025
Policy No. 4204 Security Response Plan Procedure
Overview
A Security Response Plan (SRP) provides the impetus for security and operational groups to integrate their efforts from the perspective of awareness and communication, as well as coordinated response in times of crisis (security vulnerability identified or exploited). Specifically, an SRP defines a product description, contact information, escalation paths, expected service level agreements (SLA), severity and impact classification, and mitigation/remediation timelines.
By requiring operational groups to incorporate an SRP as part of their business continuity operations and as new products or services are developed and prepared for release to consumers, this ensures that when an incident occurs, swift mitigation and remediation ensues.
Purpose
The purpose of this procedure is to establish the requirement that all operational groups supported by the InfoSec team develop and maintain a Security Response Plan. This ensures that the security incident response team has all the necessary information to formulate a successful response should a specific security incident occur.
Scope
This procedure applies to any established and defined operational group or entity within the PCSD.
Procedure
The development, implementation, and execution of a Security Response Plan (SRP) are the primary responsibility of the specific operational group for whom the SRP is being developed, in cooperation with the InfoSec team.
Operational groups are expected to properly facilitate the SRP applicable to the service or products they are held accountable for. The operational group security coordinator or champion is further expected to work with the network security engineer in the development and maintenance of a Security Response Plan.
Service or Product Description
- The product description in an SRP must clearly define the service or application to be deployed, with additional attention to data flows and logical diagrams. A clearly defined architecture is highly useful.
Contact Information
- The SRP must include contact information for dedicated team members who are available during non-business hours should an incident occur and escalation be required.
- This may be a 24/7 requirement depending on the defined business value of the service or product, coupled with the impact to the customer.
- The SRP document must include all phone numbers and email addresses for the dedicated team member(s).
Triage
- The SRP must define triage steps to be coordinated with the security incident response team in a cooperative manner with the intended goal of swift security vulnerability mitigation.
- This step typically includes validating the reported vulnerability or compromise.
Identified Mitigations and Testing
- The SRP must include a defined process for identifying and testing mitigations prior to deployment.
- These details should include both short-term mitigations as well as the remediation process.
Mitigation and Remediation Timelines
- The SRP must include levels of response to identified vulnerabilities that define the expected timelines for repair based on severity and impact to consumers, brand, and company.
- These response guidelines should be carefully mapped to the level of severity determined for the reported vulnerability.
Last Update Status:
Updated January 2015
Related Policies and Procedures
- 4204 Acceptable Use
- 4204 Audit
- 4204 Clean Desk
- 4204 Disaster Recovery Plan
- 4204 Email
- 4204 Employee Security Awareness Training
- 4204 Encryption
- 4204 Password
- 4204 Remote Access
- 4204 Router and Switch Security
- 4204 Security for Sensitive Workstations
- 4204 Security Response Plan
- 4204 Server Security
- 4204 Software Installation
- 4204 Website Services Security
- 4204 Wireless Device Communication
- 4204 Wireless Infrastructure Communication