IT0122 – Security Incident Reporting and Response

Effective: October 1, 2014
Revision No: 2.1
Objective:

To establish policy for computer Security Incident identification, reporting, and response.

Scope:

This policy applies to all users of and information technology (IT) resources owned, operated, or provided by the University of Tennessee including its campuses, institutes, and administration (University and/or Campuses).

“Users” includes but is not limited to students, faculty, staff, contractors, agents, representatives, and visitors accessing, using, or handling the University’s information technology resources.

Information transmitted or stored on University IT resources is the property of the University unless it is specifically identified as the property of other parties.

Principles:

The University has chosen to adopt the policy principles established in the National Institute of Standards (NIST) 800 series of publications, and this policy is based on those guidelines.

The Chancellor or equivalent at each Campus must designate an individual or functional position responsible for information security at their Campus (Position of Authority and/or Campus Authority). The Position of Authority should be at a high enough organizational level to allow him/her to speak with authority on and for the Campus.

Each Campus must develop or adopt and adhere to a program that demonstrates compliance with this policy and related standards. This program is the responsibility of the Position of Authority.

Each User of University resources is required to be familiar and comply with University policies. Acceptance of this policy is assumed if a User accesses, uses, or handles University IT resources.

Policy:
  1. Each campus must develop or adopt and maintain:
    1. A security incident response plan (IRP) identifying Security Incident response (IR) objectives and prioritization.
    2. Procedures for technical staff and users that detail detecting, communicating, responding to, and reporting Security Incidents.
    3. A data breach notification procedure which complies with applicable state and federal laws and regulations such as HIPAA, as well as industry security standards such as Payment Card Industry Data Security Standard (PCI-DSS) and similar privacy standards.
  2. Each campus must  periodically review, test, and approve  their security incident response plans and procedures and document the results.
  3. Campuses must report, on a periodic basis, all Security Incidents to the UTSA CISO. The CISO will provide instructions for reporting and make the accumulated information available to appropriate parties.
  4. Campus plans and procedures must require:
    1. Collection, distribution, and response to relevant information system alerts and advisories on a regular basis.
    2. A responsibilities document detailing the employee position and role responsible for specific activities.
    3. Monitoring and tracking of Security Incidents through resolution.
    4. Protecting potential forensic evidence from corruption.
    5. Perform capture of security event reports and review suspected Security Incidents.
    6. Response to suspected Security Incidents including analysis, containment, Eradication, recovery, and follow-up reporting.
    7. Providing assistance to users during recovery from Security Incidents.
    8. Appropriate response by administration to reported security violations and incidents.
    9. Sharing information on Security Incidents and common vulnerabilities or threats with owners of connected information systems.
    10. Compliance with related university policies.
    11. Process for communicating with other University officials and outside parties when appropriate (e.g. university legal, public relations, law enforcement, ISP’s, external expertise, etc.)
    12. Prioritization or severity ratings of Security Incidents
    13. Senior management approval

Definitions

  1. A Security Event is any observable occurrence in a system or network. Examples of an event are:
    • A user connecting to a file share,
    • A server receiving a request for a web page,
    • A user sending email, and
    • A firewall blocking a connection attempt.
    • System crashes,
    • Packet floods,
    • Unauthorized use of system privileges,
    • Unauthorized access to sensitive data, and
    • Execution of malware that destroys data.
  2. Computer Security Incident is a violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices. Examples of security incidents that may require action are:
    • An attacker commands a botnet to send high volumes of connection requests to a web server, causing it to crash.
    • Users are tricked into opening a “quarterly report” sent via email that is actually malware; running the tool has infected their computers and established connections with an external host.
    • An attacker obtains sensitive data and threatens that the details will be released publicly if the organization does not pay a designated sum of money.
    • A user provides or exposes sensitive information to others through peer-to-peer file sharing services.
    • A system alarm or similar indication from an intrusion detection tool;
    • Suspicious entries in system or network accounting (e.g., a UNIX user obtains privileged access without using authorized methods);
    • A compromised account or system covered by one or more compliance areas;
    • Accounting discrepancies(e.g.,someone notices an 18-minute gap in the accounting log in which there is no correlation);
    • New user accounts of unknown origin;
    • New files of unknown origin and function;
    • Unexplained changes or attempt to change file sizes, check sums,date/time stamps, especially those related to system binaries or configuration files;
    • Unexplained addition,deletion,or modification of data;
    • Denial of service activity or inability of one or more users to login to an account (including admin/root logins to the console);
    • Unauthorized operation of a program or the addition of a sniffer application to capture network traffic or usernames/passwords; and,
    • Unusual usage patterns(e.g.,programs are being compiled in the account of a user who does not know how to program).
  3. Incident Confirmation – A combination of the following activities can represent a security incident and thus require action.Although observing one of these symptoms is generally inconclusive,observing one or more of these symptoms in conjunction is motivation for further scrutiny:
    • Unsuccessful logon attempts;
    • Unexplained system crashes;
    • Unexplained poor system performance;
    • Port scanning (use of exploit and vulnerability scanners,remote requests for information about systems and/or users,or social engineering attempts);
    • Unusual usage times(statistically,more security incidents occur during non-working hours than any other time); and
    • An indicated last time of usage of an account that does not correspond to the actual last time of usage for that account

    Review Date

    January 13th, 2016

    References

    NISTIR 7358, “Program Review for Information Security Management Assistance (PRISMA)”

    NIST 800-53 “Recommended Security Controls for Federal Information Systems and Organizations”

    NIST 800-61 “Computer Security Incident Handling Guide”

↑ Back to Top