Remediation: Remediation is then followed to fix the issue. The best way to resolve the issue is then determined and followed.
Incident recovery: Established policies are followed and during this phase, monitoring and reporting on the incident is continuous and ongoing.
Reporting and communication: The incident manager communicates with the stakeholders, end-users and the public to report on the progress of the incident while providing transparency.
Why It Is Important For Any Law & Enforcement Agencies?
The occurrence of any incident is a security violation. A single attack or a group of attacks can be distinguished from other attacks by traits such as attack method, attackers’ identity, victims, sites, objectives and timing. Information security personnel then balance the issues and deal with the concerns of the stakeholders and law enforcement agencies as a part of due diligence and legal obligations.
Privacy is the first level when it comes to security incident handling, which forms a consistent and strong philosophy for information security. It is difficult to achieve privacy without security, but security without any privacy concerns results in ignoring the human angle of the intellectual legacy that the current world represents. Some privacy breaches are lethal and they are one too many, meaning that once there is a breach the information which is captured can be used in a number of times and anytime and anywhere.
Understanding the magnitude and complexity of the problem helps develop a solid working relationship with the law enforcement agencies. Establishing a set of policies and procedures for security incident handling can help:
- Ensure that you meet the due diligence and legal obligations when it comes to security incident handling.
- Ensure minimum interaction and requests from in law enforcement agencies.
- Protect the privacy of the individual when an incident occurs.
As an organization, it’s your responsibility to meet a valid legal request made by a law enforcement agency. This means that you have to find all the relevant information as it exists and within the parameters of your organization’s environment and compliance policy. There is no need to recreate the incident.
Security Incident Handling Team
In case of law enforcement agencies, information required needs to comply with the court order or the search warrant for legal documents. To handle such requests, your team needs to consist of a security professional, legal representative and in-house compliance officer.
Your incident handling team needs to answer the following questions:
- How long do you retain logs?
- How long are the backups of the services kept?
- How would you create a snapshot of a specific user’s network profile?
Law enforcement agency’s investigation could be daunting if you do not have all the documents and processes in place. Planning and preparation, response to incidents and after-effects analysis are a very important part of getting it right.