Risk Management Handbook Chapter 8: Incident Response (IR)
This chapter (RMH Chapter 8) identifies the policies and standards for the Incident Response family of controls
Last reviewed: 3/23/2021
Related Resources
Introduction
RMH Chapter 8 Incident Response documents the controls that focus on how the organization must: establish an operational incident handling capability for organizational information systems that includes adequate preparation, detection, analysis, containment, recovery, and user response activities; and track, document, and report incidents to appropriate organizational officials and/or authorities. Procedures addressed include incident response training, incident response testing, incident handling, monitoring and reporting, and information spillage response. Within this chapter, readers will find the CMS Cybersecurity Integration Center (CCIC) Functional Area Overview figure and how the Incident Management Team (IMT) within the CCIC works with systems to mitigate information security and privacy incidents.
Looking for templates and forms about Incident Response? Within this page you can find:
- CMS Security and Privacy Incident Report form (for reporting an incident)
- Incident Response Plan Template (for creating your Incident Response plan)
- Tabletop Exercise Test Template (for creating your Tabletop Exercise that you will use to test your Incident Response Plan)
- Tabletop Exercise Participant Guide Template (for creating Participant Guides that you can give to people who will be participating in your Tabletop Exercise)
- After-Action Report Template (for summarizing the outcomes / finding of the Tabletop Exercise, along with any necessary next steps)
Common Control Inheritance
The inherited controls list can be used to identify common controls offered by system alternatives. The use of inherited controls is optional, the objective of this process is to identify opportunities to extract benefits (and reduce costs) by maximizing the use of already existing solutions, and minimizing duplication of efforts across the enterprise.
Below is a listing of controls that can be inherited, where they can be inherited from and if they are a hybrid control for this control family.
Incident Response Control | Inheritable From | Hybrid Control |
---|---|---|
IR-01 | OCISO Inheritable Controls | Yes |
IR-02 | CMS Baltimore Data Center - EDC4 |
No |
IR-02(01) | CMS Baltimore Data Center - EDC4 |
No |
IR-02(02) | CMS Baltimore Data Center - EDC4 |
No |
IR-03 | CMS Baltimore Data Center - EDC4 | No |
IR-03(01) | CMS Baltimore Data Center - EDC4 | No |
IR-03(02) | CMS Baltimore Data Center - EDC4 | No |
IR-04 | CMS Baltimore Data Center - EDC4 | No |
IR-04(01) | CMS Baltimore Data Center - EDC4 | No |
IR-04(04) | CMS Baltimore Data Center - EDC4 | No |
IR-05 | CMS Baltimore Data Center - EDC4 | No |
IR-05(01) | CMS Baltimore Data Center - EDC4 | No |
IR-06 | CMS Baltimore Data Center - EDC4 | No |
IR-06(01) | CMS Baltimore Data Center - EDC4 | No |
IR-07 | CMS Baltimore Data Center - EDC4 | No |
IR-07(01) | CMS Baltimore Data Center - EDC4 | No |
IR-08 | CMS Baltimore Data Center - EDC4 |
No |
IR-09 | CMS Baltimore Data Center - EDC4 |
No |
IR-09(01) | CMS Baltimore Data Center - EDC4 |
No |
IR-09(02) | CMS Baltimore Data Center - EDC4 |
No |
IR-09(03) | CMS Baltimore Data Center - EDC4 |
No |
IR-09(04) | CMS Baltimore Data Center - EDC4 |
No |
Procedures
Procedures assist in the implementation of the required security and privacy controls.
In this section, the IR family procedures are outlined. To increase traceability, each procedure maps to the associated National Institute of Standards and Technology (NIST) controls using the control number from the CMS Acceptable Risk Safeguards (ARS).
Incident Response Training (IR-02)
The purpose of Incident Response Training is to prepare individuals to prevent, detect, and respond to security and privacy incidents, and ensure that CMS fulfills Federal Information Security Modernization Act (FISMA) requirements. Incident response training should be consistent with the roles and responsibilities assigned in the incident response plan. For example, incident response training is applicable to Information System Owners (SO), Business Owners (BO), and Information System Security Officers (ISSO). CMS personnel (i.e., employees and contractors) who routinely access sensitive data, such as names, Social Security numbers, and health records to carry out the CMS mission receive incident response training annually as part of the general information security awareness training.
The CMS Chief Information Officer (CIO), CMS Chief Information Security Officer (CISO), and the CMS Senior Official for Privacy (SOP) shall endorse and promote an organizational- wide information systems security and privacy awareness training. According to CMS Information Systems Security and Privacy Policy (IS2P2) the CIO, shall establish, implement, and enforce a CMS-wide framework to facilitate an incident response program including Personal Identifiable Information (PII), Protected Health Information (PHI), and Federal Tax Information (FTI) breaches that ensures proper and timely reporting to HHS. In the CMS IS2P2, the CISO and the SOP shall ensure the CMS-wide implementation of Department and CMS policies and procedures that relate to information security and privacy incident response.
Users must be aware that the Internal Revenue Code (IRC), Section 6103(p) (4) (D) requires that agencies receiving FTI provide appropriate safeguard measures to ensure the confidentiality of the FTI. Incident response training is one of the safeguards for implementing this requirement.
The CMS Information Security and Privacy Group (ISPG) will provide incident response training to information system users that is consistent with assigned roles and responsibilities when assuming an incident response role or responsibility and annually thereafter. For example, general users may only need to know who to call or how to recognize an incident on the information system; system administrators may require additional training on how to handle/remediate incidents; and incident responders may receive more specific training on forensics, reporting, system recovery, and restoration. In addition, those responsible for identifying and responding to a security incident must understand how to recognize when PII or PHI are involved so that they can coordinate with the SOP.
The table below outlines the CMS organizationally-defined parameters (ODPs) for IR-2.
Table 1: CMS Defined Parameters – Control IR-2
Control | Control Requirement | CMS Parameter |
---|---|---|
IR-2 | The organization provides incident response training to information system users consistent with assigned roles and responsibilities: a. Within [Assignment: organization- defined time period] of assuming an incident response role or responsibility; b. When required by information system changes; and c. [Assignment: organization-defined frequency] thereafter | The organization provides incident response training to information system users consistent with assigned roles and responsibilities: a. Within one (1) month of assuming an incident response role or responsibility; c. [Assignment: organization-defined frequency] thereafter |
Training for General Users
For all Enterprise User Administration (EUA) users the following steps outline the process for completing the CMS Computer-based Training (CBT), which includes IR training.
- Step 1: The incident response training is incorporated into the annual Information Systems Security and Privacy Awareness Training. All EUA users must take the CBT Training located at CMS Information Technology Security and Privacy web page The training will be delivered to all EUA users initially prior to account issuance and annually thereafter. It is the responsibility of users to take this training within three (3) days.
- Step 2: Each year based on the date of account issuance each user receives an email that requires a review and completion of the annual CBT.
- Step 3: Training records are maintained using the CBT database and include the User ID (UID) and the date the individual last completed the training
Role-Based Training
For individuals with incident response roles and responsibilities, role-based training is satisfied through the execution of a tabletop exercise as long as all personnel with incident response roles and responsibilities participate in the exercise. Review Section 3.2 Incident Response Testing for procedures to conduct a tabletop exercise.
Simulated Events (IR-02(01))
The purpose of this control is to facilitate the effective response by personnel who handle crisis situations by incorporating simulated events into incident response training. Exercises involving simulated incidents can also be very useful for preparing staff for incident handling.1
The selection of the scenarios should occur as a part of the test plan development; see Section 3.2 Incident Response Testing for developing the test plan. The following details the CMS specific process for incorporating simulated events/scenarios into incident response training, through the execution of a tabletop exercise.
- Step 1: Select two scenarios from the list below that will form the foundation of the tabletop exercise. Document the scenarios and a description of each in the Tabletop Exercise Test Plan. It is important to select your scenarios based upon an assessment of risk (i.e., the greatest current threats). Weaknesses identified during prior incidents might identify good candidate scenarios for future incident response tests. In addition, results from prior security control assessments (SCAs), Cybersecurity and Risk Assessment Program (CSRAP) or existing Plan of Action and Milestones (POA&Ms) might assist in selecting scenarios for incident response testing. For example, if access control was identified as a weakness during a prior SCA, a good scenario to select for incident response testing would be scenario 6 (Unauthorized Access to Payroll Records). Detailed descriptions of each of these scenarios can be found in the ISPL (Information Security and Privacy Library) and the scenarios are listed below:
- Scenario 1: Domain Name System (DNS) Server Denial of Service (DoS)
- Scenario 2: Worm and Distributed Denial of Service (DDoS) Agent Infestation
- Scenario 3: Stolen Documents
- Scenario 4: Compromised Database Server
- Scenario 5: Unknown Exfiltration
- Scenario 6: Unauthorized Access to Payroll Records
- Scenario 7: Disappearing Host
- Scenario 8: Telecommuting Compromise
- Scenario 9: Anonymous Threat
- Scenario 10: Peer-to-Peer File Sharing
- Scenario 11: Unknown Wireless Access Point
- Step 2: Ensure that the material developed for the tabletop exercise supports the scenarios selected. Review Section 3.2 Incident Response Testing for more information for developing the exercise material.
- Step 3: Execute the tabletop test using the procedures outlined below in Section 3.2 Incident Response Testing Automated Training Environments (IR-02(02)).
Automated Training Environments (IR-02(02))
The purpose of Incident Response Training/Automated Training Environments is to ensure that CMS employs automated mechanisms to provide a more thorough and realistic incident training environment. At CMS, incident training and incident response testing are both satisfied through the execution of a tabletop exercise. These tabletop exercises are designed to incorporate automated mechanisms for incident response, review Section 3.2.1 Automated Testing for detailed procedure which ensure automated mechanisms are incorporated into incident response training.
Incident Response Testing (IR-03)
The purpose of the Incident Response Testing is to ensure that CMS tests the incident response capability for the information system using testing principles to determine the incident response effectiveness and document the results.
The table below outlines the CMS organizationally defined parameters (ODPs) for IR testing.
Table 2: CMS Defined Parameters – Control IR-03
Control | Control Requirement | CMS Parameter |
---|---|---|
IR-03 | The organization tests the incident response capability for the information system: [Assignment: organization- defined frequency] using [Assignment: organization- defined tests] to determine the incident response effectiveness and documents the results | The organization tests the incident response capability for the information system within every three hundred sixty- five (365) days using NIST SP 800-61, reviews, analyses, and simulations to determine the organization’s incident response effectiveness, and documents its findings. |
CMS incident response testing is accomplished through the execution of tabletop exercises. Tabletop exercises are discussion-based exercises where personnel meet in a classroom setting or in breakout groups to discuss roles during an emergency and the responses to a particular emergency situation. A facilitator presents a scenario and asks the exercise participants questions related to the scenario, which initiates a discussion among the participants of roles, responsibilities, coordination, and decision-making. A tabletop exercise is discussion-based only and does not involve deploying equipment or other resources.
The following steps detail the CMS specific process for conducting a tabletop exercise:
- Step 1: Complete the Test Plan utilizing the Tabletop Exercise Test Plan Template located in the ISPL. Testing must include two scenario-based exercises to determine the ability of the CMS to respond to information security and privacy incidents. Scenarios should be selected which integrate the use of automated mechanisms for incident response.
- Step 2: Acquire approval of the Test Plan from the Business Owner and/or ISSO. The approval is granted by signing the final row of the Test Plan.
- Step 3: Develop the exercise materials (e.g., briefings, Participant Guide). A sample Tabletop Exercise Participant Guide Template is located in the ISPL. For more information on functional exercise material please refer to Section 5.3 of NIST SP 800- 84, Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities.
- Step 4: Conduct the tabletop exercise according to the approved Test Plan. The agenda contained within the Test Plan serves as a guide for executing the exercise. Prior to releasing the exercise participants, the Exercise Facilitator and Data Collector conduct a debrief/hotwash.
- Step 5: Evaluate the tabletop exercise by completing the After-Action Report located in the ISPL. This step is completed by the Exercise Facilitator and Data Collector.
Coordination with Related Plans (IR-03(02))
The purpose of the Incident Response Testing/Coordination with Related Plans is to ensure that CMS coordinates incident response testing with organizational elements responsible for related plans. Related plans can include but are not limited to the following:
- Configuration Management Plan
- Information System Contingency Plan
- Patch and Vulnerability Management Plan
- Information System Continuous Monitoring Strategy/Plan
The following steps detail the CMS specific process to ensure Coordination with Related Plans:
- Step 1: Identify the related plans and the stakeholders associated with each.
- Step 2: Establish a primary method of communication. Possible methods of communication include emails, face-to-face meetings, and teleconferences.
- Step 3: Using the primary method of communication identified above, request copies of related plans. Review the related plans identifying dependencies for the IR test.
- Step 4: Identify stakeholders from related plans that will be required to participate in the incident response exercise. Coordinate with the stakeholders through the establishment, review, and execution of a test plan.
- Step 5: Conduct follow up communications as necessary. Specifically, a copy of the After-Action Report should be provided to stakeholders associated with related plans so that those plans may be updated as needed.
Incident Handling (IR-04)
The purpose of this control is to ensure that CMS implements an incident handling capability for security and privacy incidents that includes 1) preparation, 2) detection and analysis, 3) containment, eradication, and recovery, and 4) post incident activity.
All distributed Incident Response Teams (IRT) fall under the authority of the CCIC IMT, the single information security and privacy incident coordination entity. Each individual system is responsible for identifying incident responders as part of the system’s Incident Response Plan (IRP). The incident responders serve as the frontline of the incident handling capability with oversight and incident response assistance provided by the IMT. This section of the document establishes the specific requirements and processes for maintaining a unified, cohesive incident handling capability across the CMS enterprise and describes the relationship between the IMT and the frontline incident responders.
In the event of a suspected or confirmed privacy (PII) data breach, CCIC IMT will notify ISPG that a Breach Analysis Team (BAT) should be convened, including representatives from ISPG, IMT, and system stakeholders such as the system Business Owner. The BAT will conduct and document a formal Risk Assessment to assess the risk of harm to individuals potentially affected by the breach. The following factors are used:
- Nature and sensitivity of PII
- Likelihood of access and use of PII and
- Type of breach
If the Risk Assessment concludes that there is a moderate or high risk that PII has been compromised, the CMS Senior Official for Pivacy will work with IMT and system stakeholders to develop a notification plan to notify affected individuals and mitigate their risk.
Affected individuals should be notified of a breach via first-class mail where possible, though depending on the nature and scale of the breach, additional methods such as email, telephone, and local media outreach may be used. The breach notification should include the following information:
- Source of the breach
- Brief description
- Date of discovery and breach occurrence
- Type of PII involved
- A statement whether or not the information was encrypted
- What steps individuals should take to protect themselves from potential harm and services being provided to potentially affected individuals
- What the agency is doing to investigate and resolve the breach
- Who affected individuals should contact for information
In addition to breach notification, CMS must also consider how best to mitigate the risk of harm to affected individuals. CMS may need to provide:
- Countermeasures against misuse of lost PII/PHI, such as notifying a bank if credit card numbers are lost
- Guidance on how affected individuals can protect themselves against identity theft, such as education on credit freezes and other defensive measures
- Services, such as credit monitoring
The Breach Analysis Team may determine that some, all, or none of these mitigation techniques are appropriate for a given breach. Some breaches may require notification, but not mitigation.
The SOP coordinates with HHS Privacy Incident Response Team (PIRT) for review and approval of CMS response plan, breach notification, and breach mitigation. Incident handling activities should be coordinated with contingency planning activities; and the lessons learned from ongoing incident handling activities should be incorporated into incident response procedures, training and testing. The procedure below provides an inclusive set of specific steps and requirements for handling information security and privacy incidents using the four-phase lifecycle. This lifecycle must be used by the IMT and the frontline incident responders to properly handle information security and privacy incidents.
Preparation
Incident response methodologies typically emphasize preparation, not only establishing an incident response capability so that the organization is ready to respond to incidents, but also preventing incidents by ensuring that systems, networks, and applications are sufficiently secure. Although the incident response team is not typically responsible for incident prevention, it is fundamental to the success of incident response programs.
The following steps detail the CMS specific process for phase one (preparation) of the incident handling lifecycle:
Steps | Activity |
---|---|
Step 1: | Ensure the proper preparations have been made to respond to information security and privacy incidents by completing the Incident Preparation Checklist located in the ISPL. This checklist should be reviewed annually in coordination with the update to the incident response plan. |
Step 2: | Ensure regular practices have been implemented to prevent information security and privacy incidents. The list below taken from NIST SP 800-61 Rev. 2 provides a brief overview of some of the main recommended practices for securing networks, systems and applications.
The CMS standard for risk assessment requires that the results of the risk assessment are reviewed at least annually and that the risk assessment is updated at least every three years or when a significant change occurs.
standard configurations. In addition to keeping each host properly patched, hosts should be configured to follow the principle of least privilege, granting users only the privileges necessary for performing authorized tasks. Hosts should have auditing enabled and should log significant security-related events. The security of hosts and configurations should be continuously monitored. Many organizations use Security Content Automation Protocol (SCAP) configuration checklists to assist in securing hosts consistently and effectively. The CMS standard requires the implementation of the latest security configuration baselines established by the HHS, U.S. Government Configuration Baselines (USGCB), and the National Checklist Program (NCP).
The CMS standard requires that the information system at managed interfaces denies network communications traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception).
In addition, malicious code protection mechanisms should be updated whenever new releases are available in accordance with CMS configuration management policy and procedures. Antivirus definitions should be updated in near-real-time. Malicious code protection mechanisms should be configured to lock and quarantine malicious code and send alerts to administrators in response to malicious code detection.
The CMS standard requires all general users receive security and privacy awareness training annually. The incident response training is incorporated into the annual Information Systems Security and Privacy Awareness Training. All EUA users must take the CBT Training located at CMS Information Technology Security and Privacy web page. The training must be delivered to all EUA users initially prior to account issuance and annually thereafter.
|
Step 3: | Ensure that the preparation and prevention techniques listed in Steps 1 and 2 above have been incorporated into the incident response plan for the information system and exercised at least annually. Review Incident Response Plan or details on developing the incident response plan and Incident Response Testing for details on incident response testing. |
Detection and Analysis
Steps | Activity | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Step 1: | Prepare for Common Attack Vectors. The attack vectors listed below are not intended to provide definitive classification for incidents; but rather, to simply list common methods of attack, which can be used as a basis for detection:
| ||||||||||||||||||||||||||||||
Step 2: | Recognize the Signs of an Incident. Signs of an incident fall into one of two categories: precursors and indicators. A precursor is a sign that an incident may occur in the future. An indicator is a sign that an incident may have occurred or may be occurring now. Precursors and indicators are identified using many different sources, with the most common being computer security software alerts, logs, publicly available information, and people. The table below, taken from NIST SP 800-61 Rev. 2, lists common sources of precursors and indicators for each category. Table 3: Common Sources of Precursors and Indicators Alerts
Logs
Publicly Available Information
People
| ||||||||||||||||||||||||||||||
Step 3: | Report and Analyze the Incident. Report the incident using the procedures outlined in Section 3.5 Incident Reporting. Once reported the IMT and frontline IR responders analyze the incident. The following are recommendations taken from NIST-SP 800-61 Rev. 4 Computer Security Incident Handling Guide for making incident analysis easier and more effective:
Correlating events among multiple indicator sources can be invaluable in validating whether a particular incident occurred.
| ||||||||||||||||||||||||||||||
Step 4 | Continue to document updates to the incident in the Incident Response Reporting Template form. | ||||||||||||||||||||||||||||||
Step 5 | Prioritize the incident using the criteria found in the “Impact Category, Attack Vector Descriptions, & Attribute Category” document of the Incident Response Reporting document which is located in the ISPL | ||||||||||||||||||||||||||||||
Establish communication method and notify the appropriate CMS personnel. The Incident Notification Table located in the Incident Response Steps for CISO (Appendix A) is a guide on notification steps per incident type. The list below provides examples of individuals that may require notification in the event of an incident:
|
The below table documents the responsibilities that should be fulfilled by employees in certain roles during an incident response event:
Role | Responsibility |
---|---|
CISO |
|
IMT Lead |
|
Senior Official for Privacy (SOP) |
|
Business Owner |
|
CMS IT Service Desk |
|
Designated Appointee |
|
Containment, Eradication and Recovery
Step 1: Choose a containment strategy. The containment strategy is determined based on the type of the incident (e.g., disconnect system from the network, or disable certain functions). Frontline incident responders should work with the IMT to select an appropriate containment strategy.
Step 2: Gather and handle evidence. The CCIC Forensic, Malware and Analysis Team (FMAT) maintain the criteria for evidence collection and a procedure to ensure a chain of custody. The IMT will coordinate with the FMAT to provide incident responders with assistance to collect and handle evidence.
Step 3: Identify the attacking host. The following items taken from NIST-SP 800-61 Rev. 2 Computer Security Incident Handling Guide describe the most commonly performed activities for attacking host identification:
- Validating the Attacking Host’s IP Address: New incident handlers often focus on the attacking host’s IP address. The handler may attempt to validate that the address was not spoofed by verifying connectivity to it; however, this simply indicates that a host at that address does or does not respond to the requests. A failure to respond does not mean the address is not real, for example, a host may be configured to ignore pings and traceroutes. Also, the attacker may have received a dynamic address that has already been reassigned to someone else.
- Researching the Attacking Host through Search Engines: Performing an Internet search using the apparent source IP address of an attack may lead to more information on the attack, for example, a mailing list message regarding a similar attack.
- Using Incident Databases: Several groups collect and consolidate incident data from various organizations into incident databases. This information sharing may take place in many forms, such as trackers and real-time deny lists. The organization can also check its own knowledge base or issue tracking system for related activity.
- Monitoring Possible Attacker Communication Channels: Incident handlers can monitor communication channels that may be used by an attacking host. For example, many bots use IRC as the primary means of communication. Also, attackers may congregate on certain IRC channels to brag about compromises and share information. However, incident handlers should treat any such information acquired only as a potential lead, not as fact.
Step 4: Eradicate the incident and recover. Eliminate components of the incident (e.g. delete malware, disable breached accounts, identify and mitigate vulnerabilities that were exploited). Incident responders should coordinate with the IMT to identify and execute a strategy for eradication of the incident. Once eradication has been completed restore systems to normal operation, confirm that systems are functioning normally, and remediate vulnerabilities to prevent similar incidents.
Post-Incident Activity
Step 1: Conduct a lessons learned meeting. Learning and improving, one of the most important parts of incident response is also the most often omitted. Each incident response team should evolve to reflect new threats, improved technology, and lessons learned. Holding a “lessons learned” meeting with all involved parties after a major incident, and optionally periodically after lesser incidents as resources permit, can be extremely helpful in improving security measures and the incident handling process itself. Multiple incidents can be covered in a single lessons learned meeting. This meeting provides a chance to achieve closure with respect to an incident by reviewing what occurred, what was done to intervene, and how well intervention worked. The meeting should be held within several days of the end of the incident. Questions to be answered in the meeting include:
- Exactly what happened, and at what times?
- How well did staff and management perform in dealing with the incident? Were the documented procedures followed and adequate?
- What information was needed sooner?
- Were any steps or actions taken that might have inhibited the recovery?
- What would the staff and management do differently the next time a similar incident occurs?
- How could information sharing with other organizations have been improved?
- What corrective actions can prevent similar incidents in the future?
- What precursors or indicators should be watched for in the future to detect similar incidents?
- What additional tools or resources are needed to detect, analyze, and mitigate future incidents?
Step 2: Document the lessons learned and update IRP and associated procedures as necessary.
Step 3: Ensure evidence is retained and archived. The criteria for evidence collection, a procedure to ensure a chain of custody, and archival instructions are maintained by the CCIC Forensic, Malware and Analysis Team (FMAT). The IMT will coordinate with the FMAT to provide incident responders with assistance to collect and handle evidence.
Automated Incident Handling Processes (IR-04(01))
The purpose of this control is to ensure that CMS employs automated mechanisms to support the incident handling process. CMS employs automated mechanism (e.g., online incident management systems) to support the organization’s incident handling process. The following table provides examples of tools used for automated incident handling processes at CMS.
Table 4: Automated Tools
Tools | Description | Users |
---|---|---|
HHS RSA Archer | The HHS tool used for all incident/tracking and reporting. Users do not access HHS Archer directly. | CCIC IMT and CCIC SOC Analysts |
ServiceNow | The CMS ServiceNow ticket is used by the CMS IT Service Desk to track changes and problems within the CMS environment. | CMS IT Service Desk CCIC IMT and CCIC SOC Analysts CMS Users |
Splunk | Is a logging solution for security (CMS Enterprise Security) and Operations and Maintenance (O&M) log management OCISO Systems Security Management (OSSM). It used as an audit reduction tool by the agency to review audit logs. | CCIC |
Information Correlation (IR-04(04))
The purpose of Information Correlation is to ensure that CMS correlates incident information and individual incident responses to achieve an organization-wide perspective on incident awareness and response. To achieve this,
- All tickets submitted in ServiceNow are thoroughly worked through to determine the validity of being classified as an incident. The submitted tickets are correlated and analyzed for trends.
- CCIC uses the SIEM tool, Splunk, to correlate data from various sources to receive alerts associated with incident breaches.
Incident Monitoring (IR-05)
The purpose of Incident Monitoring is to ensure that CMS documents information system security incidents and maintains records about each incident such as the status of the incident, and pertinent information necessary for forensics (evaluating incident details, trends, and handling). At CMS, the CCIC delivers a number of important, agency-wide security services. One of such services is Continuous Diagnostics and Mitigation (CDM), which is still in development and not all data centers have been transitioned. Other services include vulnerability management, security engineering, incident management, forensics and malware analysis, information sharing, cyber-threat intelligence, penetration testing, and software assurance.
The IMT is the group responsible for tracking and documenting security and privacy incidents. Stakeholders outside of the IMT (e.g., incident responders, ISSO, system owners, etc.) are responsible for providing the information necessary to track and monitor information security and privacy incidents.
Automated Tracking/Data Collection/Analysis (IR-05(01))
The purpose of Automated Tracking/Data Collection/Analysis is to ensure that CMS employs automated mechanism to assist in the tracking of security incidents and in the collection and analysis of incident information. At CMS, the RSA Archer/CFACTS SecOps Module is utilized for tracking potential incidents under investigation by the CCIC SOC. The IMT is responsible for maintaining the data in RSA Archer/CFACTS along with reviewing, updating, and analyzing the data and producing the trends analysis.
The following list details automated tools utilized at CMS to assist in the tracking of security incidents and in the collection and analysis of incident information. Once an incident has been reported, the external stakeholders will be able to leverage the benefits of these tools via the support provided by the IMT.
- CMS uses a ServiceNow ticketing system for all privacy and security incidents for incident/tracking and reporting.
- The CMS ServiceNow ticket is used by the CMS IT Service Desk to track changes and problems within the CMS environment.
- The HHS Archer is the incident response tool used to notifiy HHS of an incident. A shell ticket is automatically created in HHS Archer when CMS IMT is assigned a ticket in ServiceNow.
- The CCIC IMT updates the incident information in ServiceNow which will post automatically to HHS Archer. This will occur till the incident has been resolved.
- CMS RSA Archer/CFACTS SecOps Module is used for investigating potential incidents discovered by the CCIC SOC.
Incident Reporting (IR-06)
The intent of this control is to ensure that CMS requires employees and contractors to report suspected or confirmed information security and privacy incidents to appropriate authorities and to ensure that a formal incident reporting process exists.
As part of a robust, enterprise security operations program designed to reduce the risks of malicious activity, CMS established the CCIC to provide enterprise-wide situational awareness and near real-time risk management. The CCIC also provides information security and aggregated monitoring of security events across all CMS information systems. Finally, the CCIC notifies appropriate security operations staff of detected configuration weaknesses, vulnerabilities open to exploitation, relevant threat intelligence, including indicators of compromise (IOCs) and security patches. For purposes of incident response, the IMT as a sub- component of the CCIC provides incident response assistance and support. All information security and privacy incidents are to be reported to CMS IT Service Helpdesk. The CMS IT Service Helpdesk will notify the IMT as appropriate.
The table below outlines the CMS organizationally defined parameters for IR reporting.
Table 5: CMS Defined Parameters – Control IR-6
Control | Control Requirement | CMS Parameter |
---|---|---|
IR-6 |
| The organization:
|
The following process details the CMS procedure for reporting suspected security and privacy incidents:
Step 1: Report the suspected information security and privacy incident to the CMS IT Service Desk at (410) 786-2580 (internal only) or (800) 562-1963 (internal and external) and/or email CMS_IT_Service@cms.hhs.gov. Additionally, contact your ISSO as soon as possible and apprise them of the situation. All suspected information security and privacy incidents must be reported to the CMS IT Service Desk within one hour of discovery.
Step 2: After notifiying the CMS IT Service Desk, collect as much supporting information as possible on the suspected security and privacy incident using the Incident Response Reporting Template located in the ISPL. Provide the information contained on the completed incident reporting form to the CMS IT Service Desk.
Note: This template replaces the previous HHS CMS Computer Security Incident Report form that was published separately to the information security library.
Step 3:The CMS IT Service Desk creates a ServiceNow ticket and enters the details on the suspected security and privacy incident. This ServiceNow ticket creates a shell ticket in HHS Archer, which is the HHS incident response tool.
Step 4:The IMT will update the ServiceNow ticket, as necessary, which will automatically populate in HHS Archer until the incident has been resolved.
Step 5: The IMT analyzes the suspected incident, working with the SOC analyst as necessary, and if confirmed as an actual incident executes the incident handling procedures located in Section 3.5 Incident Handling.
Automated Reporting (IR-06(01))
The purpose of Automated Reporting is to ensure that CMS employs automated mechanisms to assist in the reporting of security and privacy incidents. The following steps detail the CMS specific process for Automated Reporting:
- Step 1: User will contact the CMS IT Service Helpdesk and report the information security incident.
- Step 2: The CMS IT Service Helpdesk will open a ServiceNow ticket and record the incident. This ServiceNow ticket automatically generates an Archer ticket notifying HHS CSIRC.
- Step 3: The CMS IT Service Helpdesk will then assign the ticket to the IMT and they will evaluate the incident report while providing updates to CMS CISO and HHS CSIRC.
- Step 4: The user (reporter) will continue to update the incident report in ServiceNow or contact the CMS IT Service Helpdesk.
- Step 5: If the IMT finds that the event is valid, the user will be contacted and the mitigation process will start.
- Step 6: If the IMT finds that the event is not valid, the IMT will close out the ticket and contact the user.
- Step 7: The user (reporter) will work with the IMT until remediation of the security incident.
Incident Response Assistance (IR-07)
The purpose of Incident Response Assistance is to ensure that CMS provides an incident response support resource, integral to the CMS’ incident capability that offers advice and assistance to users of the information system for handling and reporting of security and privacy incidents. The following steps detail the CMS specific process for Incident Response assistance:
- Step 1: User will contact the CMS IT Service Helpdesk for incident response assistance. The CMS IT Service Desk notifies the IMT as appropriate.
- Step 2: The IMT will evaluate, validate the incident and assist with the mitigation.
Automation Support for Availability of Information/Support (IR-07(01))
The purpose of Automation Support for Availability of Information Support is to ensure that CMS employs automated mechanisms to increase the availability of incident response-related information and support.
CMS uses multiple resources to provide the user community information/support. These include but are not limited to intranets, mailboxes, and online libraries.
Users may use the following resources for Automation Support for Availability of Information/Support:
- The CMS website
- The CMS CISO mailbox at CISO@cms.hhs.gov
- CMS IT Service Desk at CMS_IT_Service@cms.hhs.gov
- CMS Incident Management Team (IMT) at IncidentManagement@cms.hhs.gov
- The CMS Intranet (this service is available ONLY to personnel who have access to a GFE issued device, (i.e., laptop, desktop))
- The HHS.gov
- The HHS Intranet (this service is available ONLY to personnel who have access to a GFE issued device, (i.e., laptop, desktop))
Incident Response Plan (IR-08)
The purpose of the Incident Response Plan (IRP) is to provide a roadmap for implementing the incident response capability. Each organization needs a plan that meets its unique requirements, which relates to the organization’s mission, size, structure, and functions. The plan should lay out the necessary resources and management support. The incident response plan should include the following elements:
- Purpose
- Scope
- Definitions
- Roles and Responsibilities
- Understanding an Incident
- Incident Life Cycle
- Preparation
- Detection and Analysis
- Containment, Eradication and Recovery
- Post-Incident Activity
- Reporting Requirements
- Points of Contact
The incident response policy is established in the CMS IS2P2 and has been included in this handbook. The Incident Response Plan template is attached to this document as Appendix B. This document provides incident response procedure to facilitate the implementation of incident response controls. Incident response plan, policy, and procedure creation are an important part of establishing a team and permits incident response to be performed effectively, efficiently, and consistently; and so that the team is empowered to do what needs to be done.
The table below outlines the CMS organizationally defined parameters for IR planning.
Table 6: CMS Defined Parameters - Control IR-8
Control | Control Requirement | CMS Parameter |
---|---|---|
IR-8 | a. Incident Response Plan is reviewed and approved by [Assignment: organization- defined personnel or role]; b. Distributes copies of the incident response plan to [Assignment organization- defined incident response personnel (identified by name and/or role) and organizational elements] c. Updates the incident response plan to address system/organizational changes or problems encountered during plan implementation, execution, or testing; d. Communicates incident response plan changes to [Assignment: organization- defined incident response personnel (identified by name and/or by role) and organizational elements]; and Protects the incident response plan from unauthorized disclosure and modification | a. Incident Response Plan is reviewed and approved by the applicable Business Owner at least annually. b. Distributes copies of the incident response plan to CMS CIO, CMS CISO, ISSO, CMS OIG Computer Crime Unit (CCU), All personnel within the CMS Incident Response Team, PII Breach Response Team and Operations Centers. c. Reviewed annually updated as required d. Communicates incident response plan changes to all stakeholders. |
The CCIC IMT created an IRP that provides the CMS with a roadmap for implementing its incident response capability and outlines the incident response process for the IMT. In addition, each information system is responsible for maintaining a separate IRP that describes the systems internal processes for incident response and leverages the capability of the IMT. The following steps details the process for creating an IRP using the template located in the ISPL:
- Step 1: Complete a draft IRP by leveraging the template and instructions located in Appendix B.
- Step 2: Submit the draft IRP to the information system’s assigned CRA for ISPG approval. Update that plan as necessary based on the feedback received from ISPG.
- Step 3: Document the plan approval by having the Business Owner and ISSO sign the plan.
- Step 4: Disseminate the plan to all appropriate stakeholders to include: the CRA, ISSO, BO, Incident Responders, System Developers, and System Administrators.
CMS Security & Privacy Incident Report Form
The CMS Security and Privacy Incident Report is a form to be filled out when someone has an incident to report. You can access the form and instructions here.
Incident Response Steps for CISO
1 | Significant Event/Potential Incident Reported | CONTACTS |
Responsibilities |
| IMT SOP ISPG Directors |
Considerations |
---|
|
2 | Obtain situational awareness of the potential incident and the likely impact(s) on CMS data and /or CMS FISMA systems. | CONTACTS |
Responsibilities |
| IMT SOP ISPG Directors System Owner Data Guardian, ISSO, CRA |
Considerations |
---|
When engaging an external partner, consider including or informing HHS Office of the Secretary (OS), Office of the Assistant Secretary for Preparedness and Response (ASPR), which executes the Federal coordination responsibilities on behalf of HHS regarding the critical infrastructure public-private partnership for the Healthcare and Public Healthcare Sector (identified in PPD-21 and the National Infrastructure Protection Plan (NIPP)). |
3 | Conduct security bridge with stakeholders to review incident to obtain a greater understanding of the incident’s impacts and implications. Also, discuss potential response needs, such as deployment of response capabilities. | CONTACTS |
Responsibilities |
| IMT SOP OC OL OA ISPG Directors System Owner Data Guardian, ISSO, CRA |
Considerations |
---|
|
4 | Triage and determine if risk analysis should be performed | CONTACTS |
Responsibilities |
| IMT SOP OC OL OA ISPG Directors System Owner Data Guardian, ISSO, CRA |
Considerations |
---|
Are there any event/incident facts or findings discovered to date that can or should be shared with ISAOs or interagency partners? |
5 | Determine specific CMS impacts (e.g., PII, PHI, FTI, contracts, & other business partners) and Determine specific impacts to CMS data (e.g., PII, PHI, FTI) | CONTACTS |
Responsibilities |
| IMT SOP OC OL OA HHS ISPG Directors System Owner Data Guardian, ISSO, CRA |
Considerations |
---|
|
6 | Conduct security bridge with stakeholders to review incident to obtain a greater understanding of the incident’s impacts and implications. Also, discuss potential response needs, such as deployment of response capabilities. | CONTACTS |
Responsibilities |
| IMT SOP OC OL OA HHS ISPG Directors System Owner Data Guardian, ISSO, CRA |
Considerations |
---|
Are there any event/incident facts or findings discovered to date that can or should be shared with ISAOs or interagency partners? |
7 | Execute SOPs to contain and eradicate cause of the event/incident | CONTACTS |
Responsibilities |
| IMT SOP OC OL OA HHS ISPG Directors System Owner Data Guardian, ISSO, CRA |
Considerations |
---|
Does CMS have relevant experience or capabilities that it could deploy or offer to assist the external partner(s)? |
8 | Monitor event/incident to assess changes in risk to CMS systems and/or data
| CONTACTS |
Responsibilities |
| IMT SOP OC OL OA HHS ISPG Directors System Owner Data Guardian, ISSO, CRA |
9 | Develop lessons learned and recommend program enhancements | CONTACTS |
Responsibilities |
| IMT SOP ISPG Directors System Owner Data Guardian, ISSO, CRA |
Considerations |
---|
Determine if policy changes need to occur in order to further safeguard CMS data. |
10 | Conclude incident and complete external communications activities | CONTACTS |
Responsibilities |
| IMT SOP ISPG Directors System Owner Data Guardian, ISSO, CRA |
Considerations |
---|
Are there any event/incident facts or findings discovered to date that can or should be shared with ISAOs or interagency partners? |
Contacts
Contact | Number |
---|---|
Incident Management Team (IMT) | 443-316-5005 |
Senior Official for Privacy (SOP) | 410-786-5759 |
DCTSO Director | 410-786-5956 |
DSPC Director | 410-786-6918 |
DSPPG Director | 410-786-5759 |
Office of Communications (OC) | 410-786-8126 |
Office of Legislation (OL) | 202-619-0630 |
Office of the Administrator (OA) | 410-786-3000 |
HHS Office of the Secretary (OS), Office of the Assistant Secretary for Preparedness and Response (ASPR) | 202-205-8114 |
HHS Office of Inspector General (OIG) | 800-447-8477 |
Bridge | 877-267-1577 (meeting ID will be shared by IMT upon notification) |
Incident Notification Template
Incident | Notification | Who Notifies? |
All incidents |
|
|
Incidents involving a CMS System |
|
|
Incidents involving suspected criminal activity | HHS OIG | IMT |
Incidents involving employees | CMS Office of Human Capital | IMT |
Incidents involving legal ramifications | CMS Office of Legislation | IMT |
Breaches |
|
|
Breaches affecting 500 or more people |
| CMS SOP |
Breaches requiring Media Outreach | CMS Office of Communications | CMS SOP |
Incident Response Plan Template
Purpose |
---|
The objective of this Incident Response Plan (IRP) is to outline the incident handling and response process for the <system name> in accordance with the requirements outlined in the CMS Acceptable Risk Safeguards (ARS) and CMS Risk Management Handbook (RMH) Chapter 8, Incident Response. This plan covers all assets within the information system boundary, transmitting, storing, or processing CMS information. Furthermore, this plan describes how to manage incident response according to all Federal, Departmental and Agency requirements, policies, directives, and guidelines. |
Scope |
---|
This IRP is written for the <system name> stakeholders with incident response roles and responsibilities and describes those responsibilities for each phase of the incident life cycle. This plan establishes a quick reference for security and privacy incident handling and response. |
Definitions |
---|
The following key terms and definitions relate to incident response: Administrative Vulnerability: An administrative vulnerability is a security weakness caused by incorrect or inadequate implementation of a system’s existing security features by the system administrator, security officer, or users. An administrative vulnerability is not the result of a design deficiency. It is characterized by the fact that the full correction of the vulnerability is possible through a change in the implementation of the system or the establishment of a special administrative or security procedure for the system administrators and users. Poor passwords and inadequately maintained systems are the leading causes of this type of vulnerability. Breach: A breach is an incident that poses a reasonable risk of harm to the applicable individuals. For the purposes of Office of Management and Budget (OMB) OMB M-17-12 (for PII incidents) and Health Information Technology for Economic and Clinical Health (HITECH) Act (for PHI incidents) reporting requirements, a privacy incident does not rise to the level of a breach until it has been determined that the use or disclosure of the protected information compromises the security or privacy of the protected individual(s) and poses a reasonable risk of harm to the applicable individuals. For any CMS privacy incident, the determination of whether it may rise to the level of a breach is made (exclusively) by the CMS Breach Analysis Team (BAT), which determines whether the privacy incident poses a significant risk of financial, reputational, or other harm to the individual(s). Event: An event is any observable occurrence in a system or network. Events include a user connecting to a file share, a server receiving a request for a web page, a user sending email, and a firewall blocking a connection attempt. Adverse events are events with a negative consequence, such as system crashes, packet floods, unauthorized use of system privileges, unauthorized access to sensitive data, and execution of malware that destroys data. Federal Tax Information (FTI): Generally, Federal Tax Returns and return information are confidential, as required by Internal Revenue Code (IRC) Section 6103. The information is used by the Internal Revenue Service (IRS) is considered FTI and ensure that agencies, bodies, and commissions are |
Definitions |
---|
maintaining appropriate safeguards to protect the information confidentiality. [IRS 1075] Tax return information that is not provided by the IRS falls under PII. Incident Response: Incident response outlines steps for reporting incidents and lists actions to be taken to resolve information systems security and privacy related incidents. Handling an incident entails forming a team with the necessary technical capabilities to resolve an incident, engaging the appropriate personnel to aid in the resolution and reporting of such incidents to the proper authorities as required, and report closeout after an incident has been resolved. Privacy Incident: A Privacy Incident is a Security Incident that involves Personally Identifiable Information (PII) or Protected Health Information (PHI), or Federal Tax Information (FTI) where there is a loss of control, compromise, unauthorized disclosure, unauthorized acquisition, unauthorized access, or any similar term referring to situations where persons other than authorized users or any other than authorized purposes. Users must have access or potential access to PII, PHI and/or FTI in usable form whether physical or electronic. Privacy incident scenarios include, but are not limited to:
Security Incident: In accordance with NIST SP 800-61 Revision 2, Computer Security Incident Handling Guide, a Security Incident is defined as an event that meets one or more of the following criteria:
Technical Vulnerability: A technical vulnerability is a hardware, firmware, or software weakness or design deficiency that leaves a system open to potential exploitation, either externally or internally, thus increasing the risk of compromise, alteration of information, or denial of service. |
Roles and Responsibilities |
---|
<Insert the roles and responsibilities associated with this plan. Possible roles include:
For a detailed description of the responsibilities associated with these role please refer to the CMS IS2P2 located at: https://security.cms.gov/policy-guidance/cms-information-systems-security-privacy-policy-is2p2 |
Understanding an Incident |
---|
The following lists a small subset of common well known incidents: |
Types of Incidents |
---|
|
Types of Incidents |
---|
Note: These categories of incidents are not necessarily mutually exclusive. |
Causes of Incidents |
---|
|
Avenues of Attack |
---|
As with any information system, attacks can originate through certain avenues or routes. An attack avenue is a path or means by which an attacker can gain access to a computer or network server in order to deliver a payload or malicious outcome. Attack avenues enable attackers to exploit system vulnerabilities, including the human element. If a system were locked in a vault with security personnel surrounding it, and if the system were not connected to any other system or network, there would be virtually no avenue of attack. However, there are numerous avenues of attack.
|
Possible Impacts of an Attack |
---|
One of the major concerns of a verifiable computer security attack is that sensitive PII is compromised. The release of sensitive information to people without the proper need-to-know or formal authorization jeopardizes the tenant of Confidentiality, Integrity and Availability (CIA). In addition, users may lose trust in computing systems and become hesitant to use one that has a high frequency of incidents or even a high frequency of events that cause the user to distrust the integrity of the federal system. Moreover, users become disenfranchised with any action that causes all or part of the network’s service to be stopped entirely, interrupted, or degraded sufficiently to impact operations; as with a DoS attack. The list of impacts from attacks that compromise computer security include:
|
Incident Life Cycles |
---|
The incident response process has four phases. Review the NIST SP 800-61 Incident Lifecycle. |
Preparation |
---|
Preparation ensures that the organization is ready to respond to incidents, but can also prevent incidents by ensuring that systems, networks, and applications are sufficiently secure. The following describes the techniques utilized by the <system name> and to prepare for security and privacy incidents. <Describe the activities and methods in place for the information system to prepare for information security incidents. Examples of preparation methods are, implementing incident response tools, establishing security baselines, and running periodic announced training and/or unannounced drills. For additional information on preparation activities please review Section 3.3.1 Preparation of the CMS RMH Chapter 8 Incident Response.> <Describe how incidents involving PII are to be handled, including the policies and procedures that have been developed and how those policies and procedures are communicated to the staff. Staff should be informed of the consequences of their actions for inappropriate use and handling of PII. Describe how it is determined that the existing processes are adequate and that staff understand their responsibilities. Describe how suspected or known incidents involving PII are reported to the business owner, information system owner, CRA, ISSO, and CCIC IMT. Describe what information needs to be reported, and to whom.> |
Detection and Analysis |
---|
Incidents can occur in countless ways, so it is infeasible to develop step-by-step instructions for handling every incident. Organizations should be generally prepared to handle any incident but should focus on being prepared to handle incidents that use common attack vectors. Different types of incidents merit different response strategies. The following section describes the techniques utilized by the <system name> to detect and analyze security incidents <Describe the activities and methods in place for the information system to detect and analyze for information security incidents. Examples of detection and analysis methods are, prepare for common attack vectors, recognize the signs of an incident, and document and prioritize the incident. For additional information on preparation, activities please review Section 3.3.2 Detection and Analysis of the CMS RMH Chapter 8 Incident Response.> <Describe the activities and methods in place to detect and analyze incidents involving PII that are the responsibility of the information staff. Describe how it is ensured that the analysis process includes an evaluation of whether an incident involved PII, focusing on both known and suspected breaches of PII. Detection of an incident involving PII also requires reporting internally, to US-CERT, and externally, as appropriate; this is a CCIC IMT responsibility.> |
Containment, Eradication & Recovery |
---|
Containment Containment is important before an incident overwhelms resources or increases damage. Most incidents require containment, so that is an important consideration early in the course of handling each incident. Containment provides time for developing a tailored remediation strategy. An essential part of containment is decision-making. Such decisions are much easier to make if there are predetermined strategies and procedures for containing the incident. The following section describes the containment strategies and procedures for the <system name>: <Describe the strategies and procedures in place for the information system to contain information security incidents. Examples of containment strategies are, shut down a system, disconnect it from a network, and/or disable certain functions. For additional information on Containment activities, review Section 3.3.3 Containment, Eradication and Recovery of the CMS RMH Chapter 8 Incident Response.> <Describe the strategies and procedures in place for containing incidents involving PII.> |
Containment, Eradication & Recovery |
---|
After an incident has been contained, eradication may be necessary to eliminate components of the incident, such as deleting malware and disabling breached user accounts, as well as identifying and mitigating all vulnerabilities that were exploited. During eradication, it is important to identify all affected hosts within the organization so that the hosts can be remediated. For some incidents, eradication is either not necessary or is performed during recovery. <Describe the activities and methods in place for the information system to eradicate and recover from information security incidents. Examples methods for eradication are delete malware, disable breached accounts, identify and mitigate vulnerabilities that were exploited. Examples activities associated with recovering from information security incidents are restore systems to normal operation, confirm that systems are functioning normally, and remediate vulnerabilities to prevent similar incidents. For additional information on Eradication and Recovery activities review Section 3.3.3 Containment, Eradication and Recovery of the CMS RMH Chapter 8 Incident Response.> <Describe if media sanitization steps are performed when PII needs to be deleted from media during recovery. PII should not be sanitized until a determination has been made about whether the PII must be preserved as evidence. Describe if forensics techniques are needed to ensure preservation of evidence. If PII was accessed, how is it determined how many records or individuals were affected. These activities should be coordinated with the CCIC IMT.> |
Post-Incident Activity |
---|
After an incident has been eradicated and recovery completed, each incident response team should evolve to reflect upon new threats, improve technology, and document lessons learned. Holding a lessons learned meeting with all involved parties after a major incident, and optionally after lesser incidents, can be extremely helpful in improving information security measures and the incident handling process. <Describe the activities and methods in place for the information system to conduct post-incident activity after information security incidents. Examples methods for post-incident activity are: to conduct a lesson learned meeting, document the lessons learned, update the IRP and associated procedures as necessary, and ensure evidence is retained and archived. For additional information on post-incident activity review Post-Incident Activity of the CMS RMH Chapter 8 Incident Response.> <Describe the activities and methods in place to conduct post-incident activity after incidents involving PII. This should include how the IRP is continually updated and improved based on the lessons learned during each incident. Sharing information within CMS and US-CERT to help protect against future incidents is a CCIC responsibility.> |
Reporting Requirements |
---|
<Describe the information system process for reporting information security incidents. Incident should be reported to the CMS IT Service Desk within one hour, by calling at (410) 786-2580 (i.e., internal) or (1- 800) 562-1963 (internal and external) or email CMS_IT_Service@cms.hhs.gov. For information on reporting requirements for information security and privacy incidents, review Section 3.5 Incident Reporting and for the Incident Response Reporting Template in The CMS RMH Chapter 8 Incident Response.> |
Points of Contact |
---|
Business Owner <insert name> <insert email> <insert phone>
CMS IT Service Desk <insert name> <insert email> <insert phone>
Cybersecurity Risk Advisor (CRA) <insert name> <insert email> <insert phone>
Data Guardian <insert name> <insert email> <insert phone> Incident Management Team <insert name> <insert email> <insert phone>
Incident Responders <insert name> <insert email> <insert phone>
Information System Security Officer (ISSO) <insert name> <insert email> <insert phone>
System Administrators <insert name> <insert email> <insert phone>
System Developers <insert name> <insert email> <insert phone> |
Plan Approval |
---|
Business Owner (BO) <insert name> <insert title> <insert email> <insert phone>
Information System Security Officer (ISSO) <insert signature> <insert name> <insert title> <insert email> <insert phone> |
Tabletop Exercise Test Plan Template
Test Topic | <Insert Topic> |
Test Scope | <Describe the scope of the incident response test to include who will participate in the exercise, the purpose of the test, and the expected outcome. All personnel with responsibilities under the incident response plan should participate in the exercise. The exercise should apply to the roles and responsibilities. This includes personnel within the incident response plan being exercised and focus on validating that the documented roles, responsibilities, and interdependencies are accurate and current. To ensure that the knowledge of the roles and responsibilities identified in the plan being exercised is current, it is often effective to conduct a training session in conjunction with any tabletop exercise.> |
Test Objectives | The objectives of this test is as follows: |
1 | To validate the content of the incident response plan and the related policies and procedures. |
2 | Validate participants’ roles and responsibilities as documented in the incident response plan and validate the interdependencies documented in the incident response plan. |
3 | To meet regulatory requirements specifically the NIST SP 800-53 Rev. 4 requirements for incident response testing and incident response training. |
4 | To document lessons learned that may be utilized to update the incident response plan and related policies and procedures. |
Participants | <Insert participants, the participants should be comprised of personnel with roles and responsibilities identified in the incident response plan. For example, training staff, validation staff, and evaluation staff.> |
Exercise Facilitator | <Insert the name of the individual who will lead the discussion among the exercise participants.> |
Data Collector | <Insert the name of the individual who records information about the actions that occur during the exercise.> |
Date of Testing | <Insert date and time of testing> |
Location | <Insert Location> |
Equipment Required | <Insert required equipment, for example, audio visual equipment, whiteboard, flipchart> |
Material Required | <Insert required material, for example, participant guides, PowerPoint presentations, handouts> |
Test Scenarios | <Insert a sequential, narrative account of a hypothetical incident that provides the catalyst for the exercise and is intended to introduce situations that will inspire responses and thus allow demonstration of the exercise objectives.> |
Test Questions | <Insert a list of questions regarding the scenario that address the exercise objective. Below are sample questions taken from NIST Special Publication 800-61 Computer Security Incident Handling Guide> Preparation:
Detection and Analysis:
Containment, Eradication, and Recovery:
Post-Incident Activity:
General Questions:
|
Plan Being Exercise | <Insert the name and location of the incident response plan being exercised> |
Exercise Agenda |
|
Test Plan Approval | <Insert signature by approval authority (e.g., Business Owner or ISSO)> |
Tabletop Exercise Participant Guide Template
<INSERT ORGANIZATION NAME>
<INSERT TABLETOP EXERCISE TITLE>
Participant Guide
<Insert Tabletop Location>
<Insert Tabletop Date>
Introduction
In an effort to validate <insert organization name> <insert name of plan being exercised>, <insert organization name> will conduct a tabletop exercise to examine processes and procedures associated with the implementation of the <insert plan name>. This discussion-based exercise will be a <insert number of hours>-hour event that will begin at <insert start time> and will last until <insert end time>
The exercise is designed to facilitate communication among personnel with incident response roles and responsibilities. The following scenarios have been chosen for this exercise:
- <Insert scenarios from approved test plan>
This exercise is designed to improve the readiness of the [insert organization name] and help validate existing <insert plan name> procedures.
Participants should come to the exercise prepared to discuss high-level issues related to the incident handling based on the scenarios above. To achieve the exercise’s stated objectives, discussion will focus on the following questions related to the scenarios and the incident response plan:
- <Insert questions from approved test plan>
Participants may choose to bring incident response narrative or reference material that will aid in answering the above questions.
Concept of Operations
A tabletop exercise is a discussion-based event in which participants meet in a “classroom” setting to address the actions participants would take in response to an emergency. Tabletops are an effective initial step for personnel to discuss the full range of issues related to a crisis scenario. These exercises provide an excellent forum to examine roles and responsibilities, unearth interdependencies, and evaluate plans. A tabletop exercise also satisfies the training requirement for personnel with incident response roles and responsibilities.
Participants will be presented with a incident response. A facilitator will help guide discussion by asking questions designed to address the exercise’s objectives.
Objectives
The exercise objectives are as follows:
- <Insert questions from approved test plan>
Agenda
Date: | <Insert date> |
9:00 a.m. – 9:15 a.m. | Introductions |
9:15 a.m. – 9:30 a.m. | Review Exercise Scope and Logistics |
9:30 a.m. – 11:30 a.m. | Scenario Walk-Through & review of test questions (Exercise Facilitator) |
9:30 a.m. – 11:30 a.m. | Data Collector records observations (on-going) |
11:30 a.m. – 12:00 p.m. | Conduct exercise debrief/hotwash |
Milestone | Exercise Participants released |
1:00 p.m. - completion | Complete After-Action Report (Exercise Facilitator & Data Collector only) |
Debriefing/Hotwash Questions
An after action report identifying strengths and areas where improvements might be made will be provided after the exercise. The following questions are designed to obtain input into the after action report from participants:
- Are there any other issues you would like to discuss that were not raised?
- What are the strengths of the incident response plan? What areas require closer examination?
- Was the exercise beneficial? Did it help prepare you to execute on your incident response roles and responsibilities?
- What did you gain from the exercise?
- How can we improve future exercises and tests?
After Action Report Template
<INSERT ORGANIZATION NAME>
<INSERT TABLETOP EXERCISE TITLE>
After Action Report
<Insert Tabletop Location>
<Insert Tabletop Date>
Introduction
On <insert date>, <insert organization name> participated in <insert duration of exercise> - hour tabletop exercise designed to validate the organization’s understanding of the <insert plan name.>
Objectives
The exercise objectives are as follows:
- <Copy objectives from approved Test Plan>
Agenda
Date: | <Insert date> |
9:00 a.m. – 9:15 a.m. | Introductions |
9:15 a.m. – 9:30 a.m. | Review Exercise Scope and Logistics |
9:30 a.m. – 11:30 a.m. | Scenario Walk-Through & review of test questions (Exercise Facilitator) |
9:30 a.m. – 11:30 a.m. | Data Collector records observations (on-going) |
11:30 a.m. – 12:00 p.m. | Conduct exercise debrief/hotwash |
Milestone | Exercise Participants released |
1:00 p.m. - completion | Complete After-Action Report (Exercise Facilitator & Data Collector only) |
Discussion Findings
The <insert exercise name> provided information on <insert relevant information>. An important benefit of the exercise was the opportunity for participants to raise important questions, concerns, and issues.
The discussion findings from the exercise along with any necessary recommended actions are as follows:
General Findings
The exercise provided an excellent opportunity for participants to <insert relevant information>. As a result of the exercise, participants left with a heightened awareness of <insert relevant information>.
Specific Findings
Specific observations made during the exercise, and recommendations for enhancement of the plan, are as follows:
Observation 1. <Insert general topic area>
<Insert observation>
Recommendation
<Insert recommendations>
Observation 2. <Insert general topic area>
<Insert observation>
Recommendation
<Insert recommendations>
Below is an example of a completed observation and recommendations, all text in blue should be deleted upon the completion of the After-Action Report.
Example Observations and Recommendations: | |
Observation 1. | Communication |
A plan identifying the process for communicating with incident response team members do not exist. | |
Recommendations: | |
| |
Observation 2. | Incident Breach Handling Protocol |
Essential personnel have not been aware of the organization impact of stolen documents, and the incident breach handling protocol to investigation and recovery. | |
|
Sample Incident Scenarios
Scenario 1: Domain Name System (DNS) Server Denial of Service (DOS) |
On a Saturday afternoon, external users start having problems accessing the organization’s public websites. Over the next hour, the problem worsens to the point where nearly every access attempt fails. Meanwhile, a member of the organization’s networking staff responds to alerts from an Internet border router and determines that the organization’s Internet bandwidth is being consumed by an unusually large volume of User Datagram Protocol (UDP) packets to and from both the organization’s public DNS servers. Analysis of the traffic shows that the DNS servers are receiving high volumes of requests from a single external IP address. Also, all the DNS requests from that address come from the same source port. The following are additional questions for this scenario:
|
Scenario 2: Worm and Distributed Denial of Service (DDoS) Agent Infestation |
On a Tuesday morning, a new worm is released; it spreads itself through removable media, and it can copy itself to open Windows shares. When the worm infects a host, it installs a DDoS agent. The organization has already incurred widespread infections before antivirus signatures become available several hours after the worm started to spread. The following are additional questions for this scenario:
|
Scenario 3: Stolen Documents |
On a Monday morning, the organization’s legal department receives a call from the Federal Bureau of Investigation (FBI) regarding some suspicious activity involving the organization’s systems. Later that day, an FBI agent meets with members of management and the legal department to discuss the activity. The FBI has been investigating activity involving public posting of sensitive government documents, and some of the documents reportedly belong to the organization. The agent asks for the organization’s assistance, and management asks for the incident response team’s assistance in acquiring the necessary evidence to determine if these documents are legitimate or not and how they might have been leaked. The following are additional questions for this scenario:
|
Scenario 4: Compromised Database Server |
On a Tuesday night, a database administrator performs some off-hours maintenance on several production database servers. The administrator notices some unfamiliar and unusual directory names on one of the servers. After reviewing the directory listings and viewing some of the files, the administrator concludes that the server has been attacked and calls the incident response team for assistance. The team’s investigation determines that the attacker successfully gained root access to the server six weeks ago. The following are additional questions for this scenario:
|
Scenario 5: Unknown Exfiltration |
On a Sunday night, one of the organization’s network intrusion detection sensors alerts on anomalous outbound network activity involving large file transfers. The intrusion analyst reviews the alerts; it appears that thousands of .RAR files are being copied from an internal host to an external host, and the external host is located in another country. The analyst contacts the incident response team so that it can investigate the activity further. The team is unable to see what the .RAR files hold because their contents are encrypted. Analysis of the internal host containing the .RAR files shows signs of a bot installation. The following are additional questions for this scenario:
|
Scenario 6: Unauthorized Access to Payroll Records |
On a Wednesday evening, the organization’s physical security team receives a call from a payroll administrator who saw an unknown person leave her office, run down the hallway, and exit the building. The administrator had left her workstation unlocked and unattended for only a few minutes. The payroll program is still logged in and on the main menu, as it was when she left it, but the administrator notices that the mouse appears to have been moved. The incident response team has been asked to acquire evidence related to the incident and to determine what actions were performed. The following are additional questions for this scenario:
|
Scenario 7: Disappearing Host |
On a Thursday afternoon, a network intrusion detection sensor records vulnerability scanning activity directed at internal hosts that is being generated by an internal IP address. Because the intrusion detection analyst is unaware of any authorized, scheduled vulnerability scanning activity, she reports the activity to the incident response team. When the team begins the analysis, it discovers that the activity has stopped and that there is no longer a host using the IP address. The following are additional questions for this scenario:
|
Scenario 8: Telecommuting Compromise |
On a Saturday night, network intrusion detection software records an inbound connection originating from a watchlist IP address. The intrusion detection analyst determines that the connection is being made to the organization’s VPN server and contacts the incident response team. The team reviews the intrusion detection, firewall, and VPN server logs and identifies the user ID that was authenticated for the session and the name of the user associated with the user ID. The following are additional questions for this scenario:
|
Scenario 9: Anonymous Threat |
On a Thursday afternoon, the organization’s physical security team receives a call from an IT manager, reporting that two of her employees just received anonymous threats against the organization’s systems. Based on an investigation, the physical security team believes that the threats should be taken seriously and notifies the appropriate internal teams, including the incident response team, of the threats. The following are additional questions for this scenario:
|
Scenario 10: Peer-to-Peer File Sharing |
The organization prohibits the use of peer-to-peer file sharing services. The organization’s network intrusion detection sensors have signatures enabled that can detect the usage of several popular peer-to-peer file sharing services. On a Monday evening, an intrusion detection analyst notices that several file sharing alerts have occurred during the past three hours, all involving the same internal IP address.
|
Scenario 11: Unknown Wireless Access Point |
On a Monday morning, the organization’s help desk receives calls from three users on the same floor of a building who state that they are having problems with their wireless access. A network administrator who is asked to assist in resolving the problem brings a laptop with wireless access to the users’ floor. As he views his wireless networking configuration, he notices that there is a new access point listed as being available. He checks with his teammates and determines that this access point was not deployed by his team, so that it is most likely a rogue access point that was established without permission.
|