Security Incident Procedure

C4F will manage any security incidents. This procedure details the 

actions and roles required when a security incident occurs. It is provided as guidance to staff. All security incidents are recorded. Security incidents are issues that potentially impact on the confidentiality, integrity or availability of the centre's systems or services. 

 

Procedure 

Security incidents will be reported to insert who will be responsible eg. Manager or Co- ordinators On receipt of the security incident report insert who will be responsible eg. Manager or Co-ordinators will take the following actions: 

Receive notification that an incident has occurred from a member of staff, volunteer 

or service user e.g. stolen laptop, or complaint. 

Confirm the type of incident and gather any additional information required by the 

ICO. 

Log the incident including a brief description, time and date of the incident, who 

notified the incident and assign a priority High, Medium or Low Investigate the incident. 

Diagnose the incident and identify any actions required to resolve the incident see 

Incident Types and Responses. Where necessary escalate to ICO as soon as possible and within 72hrs. Notify any affected individuals. 

Incident Resolved -update incident record with details of actions taken and results 

of any investigation regarding the cause whether this was human error or a systemic issue. 

Record any details of how recurrence can be prevented – whether this is through better processes, further training or other corrective steps. 

Close incident. 

 

Responses 

The standard responses are: 

  • Personal Data Leakage Response 

  • If the incident results in the loss of personal data as defined in the DPS (2018) / GDPR then it must be reported to the ICO. 

Examples of a data breach personal data breaches can include: 

• access by an unauthorised third party; 

• deliberate or accidental action (or inaction) by a controller or processor; 

• sending personal data to an incorrect recipient; 

• computing devices containing personal data being lost or stolen; 

• alteration of personal data without permission; and 

• loss of availability of personal data. 

Under the GDPR there is a requirement for organisations to report a personal data breach 

that affects people’s rights and freedoms, without undue delay and, where feasible, not later than 72 hours after having become aware of it. Organisations should be aware that the ICO will have the ability to issue fines for failing to notify and failing to notify in time. 

Fines can be avoided if organisations are open and honest and report without undue delay, which works alongside the basic transparency principles of the GDPR. 

Serious breaches should be reported to the ICO using our DPA security breach helpline on 

0303 123 1113 (open Monday to Friday, 9am to 5pm). Select option 3 to speak to staff who 

will record the breach and give you advice about what to do next. 

Further information can be found at; 

https://ico.org.uk/media/for-organisations/documents/1536/breach_reporting.pdf 

Criminal Attack Response 

If the incident is a potential attack incident, the incident will be reviewed and if an attack is 

confirmed it should be reported as such to the customer who will report it to the relevant 

law enforcement body. C4F will zip and sign the relevant evidence, 

collected from logs etc. earlier. This evidence will be made available to the customer as 

required, subject to confidentiality undertakings (it will contain non-customer specific 

sensitive information). The complete pack will be preserved for subsequent law 

enforcement action. 

Denial of Service (DoS) Response 

This has become an increasing threat recently, often manifested as a distributed denial of 

service (DDoS) attack, which is more difficult to combat. Access to bot-nets is becoming 

increasingly widespread so that individuals with grievances have access to facilities 

hitherto only available to criminal organisations. The attack could be directed at C4F 

or C4F could be subject to collateral damage due to attacks on adjacent services. DoS and particularly DDoS attacks can result in: 

 

• The C4F web site being unable to respond to legitimate 

transactions as they are swamped by a flood attack. This would be a direct attack 

from a low capacity resource. 

• The hosting site being forced to suspend the service to enable other services on 

their site to continue. If this is a direct attack, C4F would be suspended, if C4F was suffering collateral damage this would re- open C4F. 

 

• The ISP switched off access to the C4F in order to prevent their service from being overwhelmed. Again, if this is a direct attack, C4F would be suspended, if C4F was suffering collateral damage this would re-open C4F. 

For a DoS attack or low capacity1 DDoS, action from the hosting provider to block traffic from specific incoming IP addresses should be taken. Arrangements for this action will be made with each hosting site. 

For DDoS, the customer should be contacted and, subject to their agreement Emergency 

DDoS protection should be put in place. As this is chargeable, the customer's agreement 

and order must be obtained before invoking the service. 

The c4F will maintain a list of suitable service providers, contact details and costs. 

Malware Discovery- Where malware is discovered by routine application of anti-malware measures, this should be logged. 

Web Exploit - In most cases, this will be a new exploit. We need to cover, routinely, the OWASP exploits (see http://www.ibm.com/developerworks/library/se-owasptop10/index.html) , although 

some variants may need modified responses. On discovery of a web exploit we will devise and put into place an emergency fix / procedure to block the exploit. We will check against the OWASP list if the exploit is known. If it is not, we will inform OWASP of the exploit, providing details as required. If it is a deliberate act, we will invoke our Criminal Attack Response, including the session logs in our evidence pack. 

 

Definitions 

Incidents will be classified according to their impact on the C4F systems or services. 

Level  

Impact  

High 

Actual breach affecting the availability, integrity or confidentiality of the C4F critical information assets. 

Medium 

Vulnerability discovered which, if exploited could give rise to a data breach 

Low 

Other types of security incident 

 

Where the number of attacking IP addresses are such that all the attacking addresses could be 

filtered. 

 

ICO data required 

A description of the nature of the personal data breach including, where possible: 

◦ the categories and approximate number of individuals concerned; and 

◦ the categories and approximate number of personal data records concerned; 

• the name and contact details of the data protection officer (if your organisation has one) or other contact point where more information can be obtained; 

• a description of the likely consequences of the personal data breach; and 

• a description of the measures taken, or proposed to be taken, to deal with the personal data breach, including, where appropriate, the measures taken to mitigate any possible adverse effects. 

 

Previous
Previous

Recruitment For Staff Policy

Next
Next

Parental Involvement & Consultation