Cyber Security Policy Manual
h. Collect forensics evidence including logs, screenshots and images of systems if needed. Ensure that chain of custody is maintained in the event that evidence need to be presented in a court of law i. Formulate an action plan to mitigate the incident j. Communicate the incident and mitigation plan to management team
3) Contain, Eradicate and Recover Incident type
Actions
Malware infection, Ransomware, brute force or denial of service attack
- Block the attacker IP address or ports being used - Shutdown the system or disconnect from the network - Disable certain system functions - Block websites that may be used to deliver malware - Apply security patches - Replace infected files or restore system from backup - Rebuild system if infection cannot be removed - Apply rules to the firewall - Monitor network traffic - Block the phishing email from being received by more users - Block access to the website/IP address - Remotely remove the phishing email from users mailboxes - Notify users through email/IM
Phishing Attack
Social Engineering Attack Theft or loss of laptop and mobile devices
Notify users through email/IM Remotely wipe the device
- - -
Change user’s password
- Notify appropriate government agencies to assist with the investigation if needed –
Communications Management team is responsible for engaging appropriate government agencies
Theft or disclosure of confidential information
- Notify the City Manage r’s Office (CMO) - Notify appropriate government agencies to assist with the investigation –
Cyber Security Policy Manual
38
Made with FlippingBook Annual report