Trinity Operating Procedures - TOPs

TOP-CYBER: Cyber-security Incident Response

Rev: 04/05/2018

Scope:

This policy describes the process for responding to a cyber-security incident.

Procedure:

Cyber-security incident definition

A cyber-security incident is an incident in which someone illegally accesses computers in our network by connecting to them without permission or by installing a virus or malware on one or more computers in the network.

Incident Identification

Cyber-security incident notification can originate from IT personnel, end users, vendors, or customers. The IT Manager should be immediately notified of a cyber-security incident via telephone or in person. In the event the IT Manager cannot be contacted, notify the people in the contact list below via telephone or in person.

DO NOT use email to provide initial notification of a cyber-security incident!

Contact List:

    Gerry Spearman      IT Manager    
    John Fairbanks        General Manager    
    Todd Omer               Controller
 

Containing Damage

 Specific to virus or malware infection;

The IT Manager  will:
Eradicate Damage

The IT department should follow these steps to eradicate the damage caused by a cyber-security incident:

Recovery


Review

A report should be written detailing the cyber-security incident, the response to that incident, and recommendations for minimizing the chance of recurrence.


The Department of Defense must be notified within 72 hours of the discovery of a cyber-security incident.*

DOD cyber-security incident link  

Revision history
:

Release Date

Description of Change

Owner

Approver

04/05/2018

 Created to comply with the DoD cyber-security incident policy.

Tim Ellis

Todd Sheppard


















Documents are controlled only when viewed on-line at trinityforge.com in the original English -- printed copies or translations are not controlled documents.
?
Trinity Forge & Machine