+ All Categories
Home > Documents > North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the...

North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the...

Date post: 28-May-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
24
North Dallas Community Bible Fellowship Payment Card Industry Data Security Standard (PCI DSS) Computer Security Incident Response Plan (CSIRP) Overview Data breaches, cyber security threats, and many other malicious exploits are challenging organizations like never before, ultimately requiring comprehensive security measures to ensure the confidentiality, integrity, and availability of one’s entire information systems landscape. Unfortunately, security breaches do happen - even with the best controls in place - thus the ability to respond swiftly and effectively is a must for mitigating any further damages. For that reason and as required by the Payment Card Industry Data Security Standard (PCI DSS) Version 3.2, April 2016 Requirement 12.10, North Dallas Community Bible Fellowship (NDCBF) has developed and implemented this Computer Security Incident Response Plan (CSIRP) along with the supporting policies and procedures. Additionally, this plan is to be evaluated on an annual basis for ensuring its adequacy and relevancy regarding NDCBF's needs and goals. There are four components to NDCBF’s computer security management program: The NDCBF Computer Security Incident Response Plan – this document The NDCBF Computer Security Incident Response Process Resource Center The NDCBF Information Security Plan The NDCBF PCI DSS Compliance Process Resource Center Key Definitions: Event: Any observable occurrence in a network or system. Incident: A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices. Incident Handling: The mitigation of violations of security policies and recommended practices. Note: This document, though focused on cyber incident management, will refer to both cyber event and incident management. Event can be escalated to the incident level. Also, incidents may be reverted to the event level. This occurs when the proper response is to treat an event in which there are unknown factors and to delay action could cause serious harm if the event is indeed an incident. The NDCBF CSIRP is based on the following references: Payment Card Industry Data Security Standard (PCI DSS) o Requirements and Security Assessment Procedures, Version 3.2, April 2016 o Self-Assessment Questionnaire (SAQ) D and Attestation of Compliance for Merchants – For use with PCI DSS version 3.2 April 2016
Transcript
Page 1: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

North Dallas Community Bible Fellowship Payment Card Industry Data Security Standard (PCI DSS)

Computer Security Incident Response Plan (CSIRP)

Overview

Data breaches, cyber security threats, and many other malicious exploits are challenging organizations like never before, ultimately requiring comprehensive security measures to ensure the confidentiality, integrity, and availability of one’s entire information systems landscape. Unfortunately, security breaches do happen - even with the best controls in place - thus the ability to respond swiftly and effectively is a must for mitigating any further damages.

For that reason and as required by the Payment Card Industry Data Security Standard (PCI DSS) Version 3.2, April 2016 Requirement 12.10, North Dallas Community Bible Fellowship (NDCBF) has developed and implemented this Computer Security Incident Response Plan (CSIRP) along with the supporting policies and procedures. Additionally, this plan is to be evaluated on an annual basis for ensuring its adequacy and relevancy regarding NDCBF's needs and goals.

There are four components to NDCBF’s computer security management program:

• The NDCBF Computer Security Incident Response Plan – this document • The NDCBF Computer Security Incident Response Process Resource Center • The NDCBF Information Security Plan • The NDCBF PCI DSS Compliance Process Resource Center

Key Definitions:

• Event: Any observable occurrence in a network or system. • Incident: A violation or imminent threat of violation of computer security policies, acceptable use

policies, or standard security practices. • Incident Handling: The mitigation of violations of security policies and recommended practices. • Note: This document, though focused on cyber incident management, will refer to both cyber

event and incident management. Event can be escalated to the incident level. Also, incidents may be reverted to the event level. This occurs when the proper response is to treat an event in which there are unknown factors and to delay action could cause serious harm if the event is indeed an incident.

The NDCBF CSIRP is based on the following references:

• Payment Card Industry Data Security Standard (PCI DSS) o Requirements and Security Assessment Procedures, Version 3.2, April 2016 o Self-Assessment Questionnaire (SAQ) D and Attestation of Compliance for Merchants –

For use with PCI DSS version 3.2 April 2016

Page 2: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor audit – June, 2016

• U.S. Department of Commerce, National Institute of Standards and Technology (NIST) o Computer Security Incident Handling Guide - Special Publication 800-61 Revision 2 o Guide to Malware Incident Prevention and Handling for Desktops and Laptops – Special

Publication 800-83 Revision 1. This document provide the foundational model for the NDCBD CSIRP

o Security and Privacy Controls for Federal Information Systems and Organizations - Special Publication 800-53 Revision 4

o Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities – Special Publication 800-84

o Guide for Cybersecurity Event Recovery – Special Publication 800-184 • SANS Institute

o InfoSec Reading Room – PCI DSS and Incident Handling: What is expected before, during, and after an incident

o Enterprise Survival Guide for Ransomware Attacks • Homeland Security

o Developing an Industrial Control Systems Cybersecurity Incident Response Capability – October 2009 – This document was used for its Post Incident Analysis and Forensics model

• Visa o Responding to a Data Breach – Communications Guidelines for Merchants o What To Do If Compromised - Visa Supplemental Requirements – Version 5 Effective

August, 2016 • MasterCard

o Account Data Compromise User Guide – February 4, 2016 • Various IT security organization and vendor guides and expertise

Purpose The CSIRP and its associated policies and supporting procedures are designed to provide NDCBF with a documented and formalized Incident Response plan that is to be adhered to and utilized throughout the organization at all times. Compliance helps ensure the safety and security of NDCBF system resources. Today’s growing list of hardware and software solutions are highly effective at thwarting cyber security threats and other malicious attacks - however, security breaches do occur - regardless of one’s readiness and preparedness. Responding immediately and comprehensively to security incidents requires well-documented protocols and practices, such as those outlined herein. The subsequent policies and procedures relating to incident response initiatives for NDCBF strive to ensure the overall confidentiality, integrity, and availability (CIA) of the organization’s network.

Scope This policy and supporting procedures encompasses all system resources that are owned, operated, maintained, and controlled by NDCBF and all other system resources, both internally and externally, that interact with these systems.

Page 3: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

• Internal system resources are those owned, operated, maintained, and controlled by NDCBF and

include all network devices (firewalls, routers, switches, load balancers, other network devices), servers (both physical and virtual servers, along with the operating systems and applications that reside on them) and any other system resources deemed in scope.

• External system resources are those owned, operated, maintained, and controlled by any entity other than NDCBF, but for which these very resources may impact the confidentiality, integrity, and availability (CIA) and overall security of the aforementioned description of "Internal system resources".

• When referencing the term “users”, this includes any individual that has been granted access rights by NDCBF. Users typically include, but may not be limited to, the following: staff, consultants, vendors, contractors, and guests.

Referenceable Authoritative Baseline The NDCBF CSIRP policy document and Process Resource Center is designed with the NIST SP 800-61 R2 Incident Response Lifecycle Model as its basis. The NIST SP 800-61 R2 Incident Response Lifecycle is the most widely supported incident management model. It has an extensive publicly available library of authoritative sources that provide comprehensive domain expertise to improve its effectiveness.

The NIST SP 800-61 R2 Incident Response Lifecycle Model contains four (4) main categories of incident response plan. They are:

• Preparation • Monitoring, Detection & Analysis • Containment, Eradication, and Recovery • Post Incident Activities

Page 4: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

The NDCBF CSIRP Policy and its associated Process Resource Center are designed to be as non-overwhelming as practical, yet comprehensive. It is centralized for ease of accessibility and maintenance. It’s visual design makes it very intuitive and easy to understand and navigate for all stakeholders.

Centralized Access to Supporting Resources

Additional resources and references from NIST SP 800-53, 83, 83r2, 84, 184, 86, SANS, CERT, US & ICS-CERT, ISAC, MITRE, Specific Vendor Best Practices and more

Each phase contains relevant intuitive workflows, supporting reference material where they apply within the process, and end-to-end accountability

Reference center provides additional resources like threat playbooks and links to sites that provide malware remediation assistance

An overview of the Process Resource Center, including screen shots is included in the appendix of this document

PREPARATION

All NDCBF employees and other applicable third-party entities should be aware of common security threats and computer incidents that may potentially compromise the organization’s network infrastructure, cause harm to other related systems or pose a significant financial, operational or business threat to the organization as a whole. The focus of the CSIRP is on the preparedness of the activities associated with handling an event in which malicious or unintentional activity has created a severe negative impact on any combination of the confidentiality, integrity, and availability (CIA) of financial, sensitive, or personally identifiable information. The CSIRP should be viewed as a set of procedures for examining a computer security incident, which includes preparing for, detecting, responding to, containing, recovery and any other necessary post-incident activities. The Preparation phase is about:

Establishing the incident response team Providing the necessary training and skills development Acquiring the necessary incident response tools and

resources Proactively planning responses for the likely attacks the

organization may face Preparing the team to effectively react within minutes of

unfamiliar attacks Testing plans and preparedness Continuously improving the incident response posture with

lessons learned and industry updates and reconnaissance

Page 5: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

Establishing the Computer Security Incident Response Team – The Team Charter

The first order of business is to establish the team that will be responsible for the development, administration, and effective execution of the CSIRP. The Computer

Security Incident Response Team (CSIRT) Charter is the vehicle by which the team is established. The CSIRT Charter formally establishes the purpose, scope,

goals, authority, membership, roles and responsibilities.

NDCBF has a small staff. It is not uncommon for a staff member to be responsible for multiple jobs. The church has not historically, nor should it be expected in the future to invest solely

in highly-trained security personnel. Yet the size and nature of its congregation combined with the intensity of today’s cybersecurity requirements, along with the grave and possibly legal implications of a severe malware attack bring forth the need for a knowledgeable, current, and sound approach to cyber incident response management. Thus, the effectiveness of NDCBF’s CSIRT will depend on a combination of internal and external resources. The CSIRT membership illustrated below will meet the requirements if personnel, roles and responsibilities, and resources are allocated and adequately prepared before an incident occurs.

Page 6: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

The NDCBF CSIRT will consist of a board member, a qualified IT Advisory Team, and staff members. The NDCBF Executive Director is the CSIRT sponsor with the responsibility of ensuring the team’s activities are consistent with NDCBF policies, empowering the team to make the necessary decisions require in a crisis situation, and providing guidance and, where required, liaison with external entities.

The NDCBF IT Advisory Team will consist of lay-volunteers with knowledgeable and current experience and skills in Information Technology (IT) management, current IT Security landscape, and, specifically, PCI DSS incident response requirements.

NDCBF’s CSIRT is to consist of the following assigned titles and respective roles and responsibilities for effectively preparing, detecting, responding, containing and recovering from an incident, while undertaking post incident activities and awareness:

• NDCBF Board Member: Understand the NDCBF IT security posture, the risk factors, and implications of cyber events on NDCBF. Provide input into the decision made concerning cyber events and, should they occur, incidents.

• IT Advisory Team: Consists of lay-volunteers with knowledgeable and current experience and skills in Information Technology (IT) management, risk management, the current IT Security landscape, and, specifically, PCI DSS incident response requirements.

• Executive Director: Fulfills the role of Chief Technology Officer (CTO) and Chief Information Officer (CIO). Responsibilities include providing overall direction, guidance, leadership and support for NDCBF’s cyber event and incident response plan. The Executive Director is to report to other members of senior management on a regular basis regarding important aspects of NDCBF’s cyber event and incident response posture.

• Computer Security Incident Response Team Leader: Fulfills the role of IT director and information security officer: Responsibilities include researching and developing incident response measures for all IT system resources. This will require extensive identification of industry benchmarks, standards, and frameworks that can be effectively utilized by NDCBF for effectively preparing, detecting, responding, containing and recovering from an incident. This includes daily operational oversight of the overall cyber event and incident response initiative, such as the following:

o Ensuring policies and procedures are kept current and being adhered to as stated. o Ensuring that cyber events and incidents are reported and documented accordingly. o Aiding and facilitating all necessary response, mitigation, and resolution matters with

NDCBF IRT network engineers and systems administrators. o Effectively communicating upstream to senior management regarding cyber events and

incidents. o Tracking and monitoring all activities relating to cyber events and incidents, from initial

reporting to final resolution and post-incident activities. o Adequately identifying ongoing training needs of the organization.

• Internal CSIRT Staff Members: Responsibilities for these individuals includes implementing many of the operational, technical, and security procedures and related practices for cyber event and incident response. Because these individuals often serve as the “front line” of defense, their actions are critical for helping ensure the safety and security of NDCBF-wide system resources,

Page 7: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

should a cyber security event or incident occur. Their roles and responsibilities include the following:

o Receiving cyber security event and incident alerts o Providing assistance in preparing the Computer Security Incident Response Plan

(CSIRP). o Responding to threats, such as undertaking all necessary measures for ensuring the

confidentiality, integrity, and availability (CIA) of critical NDCBF system resources. This generally includes provisions for isolating and quarantining affected or suspected systems.

o Assessing the severity of cyber events and incidents. o Providing assistance in making necessary technical changes to critical system resources

to protect NDCBF assets. o Providing assistance in the restoration of systems as needed, along with providing

feedback for final "lessons learned" analysis. o Providing liaison with assigned external CSIRT members

• External Members: External members will have an appropriate internal member assigned. NDCBF’s objective with respect to external members is to leverage their skills and resources to enhance internal cyber event and incident management.

o Managed Services Firm – 5K Technical Services NDCBF does not have the internal resources to provide the appropriate level of

services to support its computer requirements. This includes IT security management. 5K Technical Services has NDCBF’s long-term IT managed services provider. 5K Technical Services has the resources to meet the requirements of NDCBF’s CSIRP as an outsourced services provider. By PCI DSS requirements, 5K Technical Services is considered an external vendor and does not assume the responsibilities of ownership and execution of the NDCBF cyber security policy and procedures.

o Process Delivery Systems (PDS) PDS has been NDCBF’s consulting firm for both the Arena Church Management

System implementation and the design and implementation of the PCI DSS compliance program. By PCI DSS requirements, PDS is considered an external vendor. PDS has designed and developed the PCI DSS framework and submitted to NDCBF. PDS does not assume the responsibilities of ownership and execution of the NDCBF cyber security policy and procedures.

o Other external team members will be addressed specifically in the CSIRT Charter

CSIRT Core Members: This team provides the first response to interesting and suspicious activity that may be noticed or reported. The CSIRT Core Members are the CSIRT Leader, the CSIRT Executive Director, and 5K Technical Services.

Page 8: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

INTERNAL NDCBF COMPUTER SECURITY INCIDENT RESPONSE TEAM

Name Title Contact Information Role and Responsibility of

the Incident Response Team

NDCBF Board Member

NDCBF Executive Director

NDCBF IT Advisory Team Member 1

NDCBF IT Advisory Team Member 2

NDCBF IT Advisory Team Member 3

Computer Security

Incident Response Team Lead

Arena/Shelby v.5 Administrator

Book Store Manager

Physical Security

AVL

Financial Services

Human Resources

Communications

Congregation Services

Legal and Compliance Liaison

Page 9: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

1.2

Build & Maintain

Malware-Related Skills

EXTERNAL NDCBF COMPUTER SECURITY INCIDENT RESPONSE TEAM

Name Title Contact Information Role and Responsibility of

the Incident Response Team

Managed Services Provider

Information Services Consulting (IT Security)

Cyber Law Firm

Cyber Insurance Broker

Law Enforcement

Breach Notification and Call Center Services

Forensics Investigation Services

Credit Monitoring Services

Building and Maintaining Malware-Related Skills and Acquiring Tools and Resources

As stated earlier, NDCBF has a small staff and it is not uncommon for staff members to assume multiple roles. The

technical skills required to effectively manage a cyber security incident and the associated technical toolsets are

beyond the capabilities of NDCBF. Both functions will be discussed at this point in this document. The managerial skills for managing a

cyber security incident are not beyond NDCBF’s capabilities and are, in fact, a requirement of the PCI DSS standard. The managerial skills include pre-incident planning, incident management oversight – ensuring the CSIRP is executed as planned, communications management, and coordination with external team members.

The technical skill sets are provided by 5K Technical Services. They include:

• Malware Infection Methods. All malware incident handlers should have a solid understanding of how each major category of malware infects systems and spreads.

• Malware Detection Tools. As NDCBF’s cyber security services provider, 5K Technical Services should have the tools in place that enable detection of malware by antivirus software, network-based and host-based intrusion prevention software, spyware detection and removal utilities, and other tools. 5K Technical Services should provide incident handlers who are familiar with the NDCBF’s implementations and configurations of malware detection tools and should be able to analyze supporting data and identify the characteristics of threats.

Page 10: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

• 5K Technical Services provides NDCBF’s antivirus software and should be intimately familiar with it.

• Computer Forensics. The CSIRT Charter states that an external computer forensics firm other than 5K Technical Services will be engaged to provide this function. This is desirable also to meet the requirements of the credit card companies requirements that the forensics firm be independent to preserve objectivity with their analysis of an incident.

Creating the NDCBF Threat Playbook

The NDCBF CSIRP Threat Playbook will be created with the likely malware attacks that the organization might encounter as well as more generally catagorized areas. The

highest impact area for NDCBF credit cards. NDCBF processes online credit card transactions through its church management system, Arena. NDCBF also processes

credit card transaction through its Bookstore Manager product. Therefore, the threat playbook will include responses for credit card incidents. The credit card that NDCBF will

most likely provide transaction on are Master Card, Visa, American Express, and Discover. Each card provider has unique response credit card incident requirements. The threat playbook will reflect the requirements of each credit card provider. Among the incident response requirements of the credit card providers is that the NDCBF online merchant bank be notified of a suspected or actual credit card incident. The Gateway for NDCBF Arena online credit card transactions is MinistryLINQ. The merchant bank for the MinistryLINQ Gateway is ???? NDCBF also has a sizable children and youth function and maintains sensitive but necessary information in support of this effort. This will require the threat playbook to include responses for the inadvertent release or malicious attack on personnaly identifiable information (PII). Ransomware is another threat to NDCBF. Ransomware is destructive in that is encrypts the victim’s information until a specified ransom is paid. If the ransom is paid, there is no guarantee that the victim will receive the keys to unencrypt their data. The threat playbook will include a plan to respond to a Ransomware incident. Each play within the playbook will include the appropriate communciations and escalation plans, internal and external team involvement, and execution procedures through the Detection and Analysis, Containment, Eradication, and Recovery, and Post-Incident phases of the CSIRP. DDoS Attacks

MONITOR, DETECTION, & ANALYSIS:

• The Monitor function was added to Detection and Analysis

• Monitor, Detection, & Analysis is about recognizing receiving, analyzing and classifying all cybersecurity events and determining which are actual incidents vs. security or maintenance events

• Prioritizing the handling of incidents

Page 11: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

2.1

Monitor & Detection

• Monitor, Detection, & Analysis is about receiving, analyzing and classifying all cybersecurity events and determining which are actual incidents vs. security events

• Only the Executive Director or a board member can declare an event an incident

Detecting an incident requires a true commitment by all employees to be constantly aware of their surroundings for any type of social engineering, physical or environmental threat. Additionally, detection also requires due diligence and consistency by authorized employees regarding the secure configuration and review of network and system logs, being aware of network traffic anomalies and any suspicious or disruptive network patterns or incidents. 5K Technical Services is responsible for reviewing network and system logs (firewalls, routers, switches, IDS/IPS, operating systems, applications, databases, etc.) are, as a result of these reviews, to report any malicious, suspicious or disruptive event immediately to the CSIRT. The Arena and Shelby v.5 administrator should also be vigilant in monitoring for unusual activity of unauthorized access attempts. This type of activity should also be reported to the CSIRT for investigation. Physical security needs to be addressed IRT can only respond to a given incident if they are made aware of the issue and what systems could be affected. Detection, therefore, is a vital component of the Incident Response plan, along with having a current asset inventory list of all critical system resources as IRT personnel will need to be aware of what systems may be affected. As such, NDCBF is to identify all applicable unique identifiers and necessary data element for successfully tracking and managing such inventory. At a minimum, the following elements are to be used for asset inventory, when applicable:

• Type of system resource – Network devices (firewalls, routers, switches, load balancers, etc.) • Type of system resource – Servers (physical and or/logical, and the underlying operating systems

and applications residing on such servers). • Version number or application type • Primary function • Physical element: A stand-alone product, or a virtual element, such as an instance, etc. • Internal hostname • Name of product or solution (such as the vendor purchased from) • Serial number some other type of non-hostname identification element • Relevant IP or routing information (if applicable) • Physical location • Logical location • Party or parties responsible for system administration • End users of system (if applicable)

Monitor and Detection

Any incident deemed to be a threat to the organization requires a rapid response from authorized personnel, such as the IRT personnel. This rapid response will follow a

standard course of action designed to minimize the impact of the incident to the organization’s critical network and system infrastructure. The following

Page 12: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

documented response mechanisms serve as best practices for incident response and containment within the organization:

Initial Response • For any incident that has been detected, IRT personnel are to be immediately notified.

• IRT personnel are to formally assume control and to identify the threat and its severity to the

organization’s information systems. Specifically, the following levels are to be used for determining severity and the appropriate response mechanisms:

o LOW: There is a MINIMAL impact on the organization from this incident. Examples include, but are not limited to, the following: email spam, [please provide other examples specific to your organization].

o MEDIUM: There is a SIGNIFICANT impact on the organization from this incident. Examples include, but are not limited to, the following: short-term system downtime, [please provide other examples specific to your organization].

o HIGH: There is a SERIOUS impact on the organization from this incident. Examples include, but are not limited to, the following: distributed denial of service (DDoS), breach of customer specific Personally Identifiable Information (PII), [please provide other examples specific to your organization].

Documentation • Note: Documentation is imperative for incident response practices, thus authorized IRT personnel

are to officially open an incident response ticket via completion of a comprehensive form provided for such measures. Because the severity of incidents vary, it is understandable that many times the first and most important task will be to immediately contain the incident, and then subsequently complete the applicable form.

Identification • In identifying the threat, IRT personnel are to specifically identify which resources, both internal

and external, are at risk and which harmful processes are currently running on resources that have been identified as at risk.

Page 13: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

CONTAINMENT, ERADICATION, & RECOVERY IS ABOUT:

• Isolating the attacked system(s) • Quickly and effectively determining the appropriate

containment method • Stopping the damage to the infected host(s) • Tracking down other system infections and remedying

them • Ensuring the attack is fully remedied • Bringing functionality back to normal • Monitoring to ensure there are no lingering components of

the attack

Containment and Isolation • IRT personnel are to determine whether the resources at risk (hardware, software, etc.) require

physical or logical removal. Resources posing a significant threat to the continuity of the business are to be immediately removed or isolated, either physically or logically. Resources that may require physical or logical removal or isolation may include any NDCBF owned, operated or maintained system resources.

• When permissible, backups are to be conducted for the affected systems onto new media as this provides a critical snapshot of the system during its compromised state. This backup, though not advisable for any production restores, can be used for forensic analysis for learning more about how the incident came about.

Begin putting together a list of items considered as evidence, which may be any number of electronic resources, interviews taken from various individuals, etc. Additionally, avoid tactics that may alert the suspected

person or persons responsible for such acts as it may allow them to begin concealing evidence, covering their digital trail - or worse - moving onto other

areas within the network. Additional evidence collection and investigative procedures also include the following:

o Understanding how the incident occurred and what led to the compromise. o Reviewing all necessary documentation. o Interviewing personnel as needed. o Examining any third-party providers and their respective products and services that are

utilized within NDCBF’s network architecture. o If warranted, a third-party resource for assisting in the investigation of the incident may be

utilized (this will be done at the management’s discretion).

Page 14: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

SECURITY ANALYSIS | RECOVERY AND REPAIR With the affected system resources now logically and/or physically removed from the NDCBF network and/or isolated, forensic analysis is to be undertaken for thoroughly examining all applicable data as necessary. This included conducting the following activities:

• Review of system settings, such as configuration files, and all changes made to such settings. • Review of all output data, such as logs (i.e., log files, history file, trace files, error files, etc.) and

other relevant audit trails. • Review of all data files, and all changes made to such data. • Utilizing any pre-installed security tools, such as File Integrity Monitoring, logging tools

Intrusion Detection | Prevention Tools (IDS | IPS), etc. • Actively search for malicious code, scripts, and other files left behind, such as trojan horses, logic

bombs, sniffing tools, etc. Depending on organizational workload demands, IRT personnel and other authorized I.T. personnel are to work in a diligent manner in repairing and/or replacing the affected system. Because the device in question can vary, it's important to configure and build the specified system resource in accordance with industry leading provisioning and hardening guidelines, such as removing unnecessary services, ports, and protocols, removing default usernames and passwords, while also employing current vendor security patches, along with anti-malware solutions as necessary. Additional restore, recovery, and repair procedures also include the following:

• Restoring systems from clean backups (a trusted source only). • Completely rebuilding systems as needed and warranted. • Replacing systems as needed (this includes all system resources and any other IT resources

deemed critical by NDCBF) • Reconfiguring network security (stronger, more adaptive configuration and hardening rules) for

all system resources and any other IT resources deemed critical by NDCBF.

In summary, the recovery procedures will be commensurate with the incident that has occurred. This will be conducted on a case-by-case basis with all aspects of the recovery process fully documented.

COMMUNICATION IRT personnel are to keep senior management and other parties abreast of the overall status of the incident, such as response and resolution initiatives, etc. This is especially true for incidents deemed severe.

If the incident has affected the confidentiality and integrity of credit cards (i.e., cardholder data) in any way, [company name] must immediately report the incident, its severity and other essential information to all applicable parties, such as local, state, and federal authorities (i.e., FBI, United States Secret Service), major payment brands, and other applicable parities.

Listed in the following table are the links to the major payment brands, which also supply information on how to handle an incident that has resulted from a breach of the cardholder data environment. It is the policy of [company name] to formally acknowledge and adhere to these guidelines as set forth by the major payment brands.

Page 15: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

Payment Brand

Information on Incident Handling and Reporting

VISA http://usa.visa.com/merchants/risk_management/cisp_if_compromised.html

MasterCard http://www.mastercard.com/us/merchant/security/fraud_prevention.html

American Express

https://www212.americanexpress.com/dsmlive/dsm/dom/us/merchants/shared/supportandservices/fraudprevention/learnmoreabout/howtoreducerisk.do?vgn

extoid=e43653e0d7a22210VgnVCM200000d0faad94RCRD

Discover Card http://www.discovernetwork.com/fraudsecurity/databreach.html

JCB (don’t think NDCBF needs this one)

http://www.jcb-global.com/english/jdsp/index.html

POST INCIDENT ACTIVITIES AND AWARENESS A formal and documented Incident Response Report (IRR) is to be compiled and given to management of NDCBF within an acceptable timeframe following the incident. The IRR must contain the following elements:

• Detailed description of the incident • Response mechanisms undertaken • Reporting activities to all relevant third parties as needed • Recovery activities undertaken for restoring affected systems • A list of Lessons Learned from the incident and which initiative NDCBF can take to mitigate and

hopefully eliminate the likelihood of future incidents

TRAINING and TESTING A vitally important component of NDCBF's incident response measures is ensuring that all employees and other in-scope personnel are aware of response mechanisms and other protocols regarding such issues. As such, the NDCBF security awareness training program is to include mandated provisions regarding the aforementioned incident response practices. Additionally, for further helping ensure the safety and security of NDCBF critical systems resources, the incident response plan is to be tested on an annual basis, with results provided to senior management as necessary.

1.0 Responsibility for Policy Maintenance

Page 16: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

The [title of responsible party] is responsible for ensuring that the aforementioned policy is kept current as needed for purposes of compliance with mandated organizational security requirements set forth and approved by management.

Incident Response Plan Form

Incident Response Form Date and Time of

Notification:

Date and Time of Detection: Name: Title:

Phone: Email:

Signature: Summary of Incident

Type of Incident:

Description of Incident:

Names and Contact Information of Other Parties Involved:

Incident Notification Names of Personnel Contacted:

1. 6. 2. 7. 3. 8. 4. 9. 5. 10.

Response and Resolution Measures Initial Response: Evidence Collection and Investigation: Security Analysis | Recovery and Repair

Page 17: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

Communication Lessons Learned Requirement 12.10 Incident Response Plan 12.10 Overview In accordance with Payment Card Industry Data Security Standards (PCI DSS) requirements, [company name] has established a formal policy and supporting procedures concerning an Incident Response plan. This policy is to be implemented immediately. It will be evaluated on a(n) [annual, semi-annual, quarterly] basis for ensuring its adequacy and relevancy regarding [company name]’s needs and goals.

12.10 Policy [Company name] will ensure that the Incident Response plan adheres to the following conditions for purposes of complying with the Payment Card Industry Data Security Standards (PCI DSS) initiatives (PCI DSS Requirements and Security Assessment Procedures, Version 3.1):

• The Incident Response plan includes, at a minimum, roles, responsibilities and communication strategies in the event of a compromise, including, also at a minimum, notification of the payment brands.

• The Incident Response plan includes specific incident response, business recovery and continuity procedures and data backup processes.

• The Incident Response plan includes legal requirements for reporting any compromises to the cardholder data environment.

• The Incident Response plan includes coverage and response mechanisms for all critical system components and all other IT resources deemed critical by [company name].

• The Incident Response plan also includes reference or inclusion of incident response procedures from the payment brands.

• The Incident Response Plan is to be tested annually. • Designated personnel are available for 24/7 incident response and monitoring coverage for any

evidence of unauthorized activity, detection of unauthorized wireless access points, critical Intrusion Detection Systems (IDS) alerts and/or reports of unauthorized critical system or content file changes.

Page 18: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

• Staff with responsibilities for security breach responses is periodically trained. • Monitoring and responding to alerts from security systems including detection of unauthorized

wireless access points constitute an important component of the Incident Response plan. • Processes are in place to modify and evolve the incident response plan according to lessons

learned and to incorporate industry developments as needed.

12.10 Procedure [Company name] has developed and implemented a comprehensive Incident Response plan, which encompasses the categories and supporting activities listed below. These policy directives will be fully enforced by [company name] for ensuring the Incident Response plan initiatives are executed in a formal manner and on a consistent basis for all system components within the cardholder data environment and all other IT resources deemed critical by [company name].

The five (5) main categories of the Incident Response plan include the following (NIST, n.d.):

• Preparing for an incident • Detecting an incident • Responding to and containing an incident • Recovery from an incident • Post-incident activities and awareness

Please note that all requirements for Payment Card Industry Data Security Standards (PCI DSS) compliance for an Incident Response plan are included in the five (5) previously listed categories, which have been identified as a best-of-breed framework for developing and implementing an effective Incident Response plan.

PREPARING FOR AN INCIDENT All [company name] employees should be aware of common security threats and computer incidents that may potentially compromise the organization’s network infrastructure, cause harm to other related systems or pose a significant financial, operational or business threat to the organization as a whole. The Incident Response plan should be viewed as a set of procedures for examining a computer security incident, which includes preparing for, detecting, responding to, containing, recovery and any other necessary post-incident activities. There are numerous security threats and computer incidents that are potentially detrimental to any organization, such as the following:

• Malicious or careless employees • Malware (computer viruses, worms, trojan horses, most rootkits, spyware and other malicious

and unwanted software) • Social engineering • Spam • Spoofing and phishing • Denial of service • Distributed denial of service

Page 19: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

• Man-in-the-middle attacks • Additional network attacks, including hacking and other common attack vectors • Physical and environmental conditions resulting in threats to the organization’s system

resources

Adequately preparing for an incident requires security personnel to be aware of common threats to systems and to implement safeguards and control mechanisms that protect system resources within [company name].

A vital component of preparing for an incident is ensuring that all personnel have relevant security training. Additionally, all system components and other IT resources deemed critical by [company name] must be securely hardened with best-of-breed hardening and configurations standards at all times. Sources used may include, but are not limited to, the following:

• NIST (http://www.nist.gov/index.html) • SANS (http://www.sans.org/) • CERT (http://www.cisecurity.org/) • ISACA (http://www.isaca.org/) • BITS & Shared Assessments (http://www.sharedassessments.org/)

The numerous policy and procedure guidelines outlined within this document serve as an excellent resource for ensuring adequate safeguards are in place for these very systems and critical IT resources. Specifically, the [company name] security awareness training initiatives provide excellent resources that allow employees to keep abreast of significant threats to company assets.

Moreover, a documented Information Response Team is to have clear roles and responsibilities for properly responding to any incident. Preparation is just as important as the response to the incident. Other aspects of preparing for an incident include the necessary steps, processes and procedures to take once an incident has occurred. This also includes an understanding of what actions are to be taken with respective third parties, if necessary, such as clients, law enforcement agencies, local/federal/state agencies, the media and any other third parties considered to be within our scope.

TABLE 12.10.A

DESCRIPTION OF INCIDENT RESPONSE TEAM

Name Title Contact Information Role and Responsibility of

the Incident Response Team

? ? ? ?

? ? ? ?

? ? ? ?

Page 20: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

? ? ? ?

? ? ? ?

? ? ? ?

DETECTING AN INCIDENT Detecting an incident requires a true commitment by all employees to be constantly aware of their surroundings for any type of social engineering, physical or environmental threat. Additionally, detection also requires due diligence and consistency by authorized employees regarding the secure configuration and review of network and system logs, being aware of network traffic anomalies and any suspicious or disruptive network patterns or incidents. Employees responsible for reviewing network and system logs (firewalls, routers, switches, IDS/IPS, operating systems, applications, databases, etc.) are, as a result of these reviews, to report any malicious, suspicious or disruptive event immediately to the Incident Response Team. The Incident Response Team can only respond to a given incident if they are made aware of the issue. Detection, therefore, is a vital component of the Incident Response plan.

Accordingly, all system components and additional IT resources deemed critical by [company name] are to be inventoried in a manner that describes the naming convention of the device, the use of the device, who has system administrative rights of these devices, which logging and audit trail mechanisms are in place and who reviews these logging and audit trails on a consistent basis.

TABLE 12.10.B Name of Systems

Components and other IT Resources (Devices)

Response Mechanisms in Place for All System Components and other IT Resources

CISCO ASA 5520 Firewall Appliance

(1) Contact the Incident Response Team (IRT). (2) IRT will immediately enact response mechanisms commensurate with the incident.

(3) IRT will develop plan for containing an incident along with recovery procedure.

? ?

? ?

? ?

? ?

? ?

? ?

? ?

Page 21: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

RESPONDING TO AND CONTAINING AN INCIDENT Any incident deemed to be a threat to the organization requires a rapid response from authorized personnel, such as the Incident Response Team. This rapid response will follow a standard course of action designed to minimize the impact of the incident to the organization’s critical network and system infrastructure.

TABLE 12.10.C

RESPONSE MECHANISMS FOR ALL CRITICAL SYSTEM COMPONENTS AND ALL OTHER IT RESOURCES

DEEMED CRITICAL BY [COMPANY NAME] Name (Naming Convention of

Systems Components and

other IT Resources [Devices])

Use of the Device

System Administrative Rights for the

Device

Logging and Audit Trail

Mechanisms in Place

Name of Reviewer of Logging and Audit Trails

Frequency of Review for

Logging and Audit Trails

? ? ? ? ? ?

? ? ? ? ? ?

? ? ? ? ? ?

? ? ? ? ? ?

? ? ? ? ? ?

The following documented response mechanisms serve as the Standard Operating Procedures (SOP) for responding to any incident within the organization:

1. For any incident that has been detected, the Incident Response Team is to be immediately notified.

2. The Incident Response Team is to formally assume control and to identify the threat and its severity to the organization’s information systems.

3. In identifying the threat, the Incident Response Team is to specifically identify which resources, both internal and external, are at risk and which harmful processes are currently running on resources that have been identified as at risk.

4. The Incident Response Team is to determine whether the resources at risk (hardware, software, etc.) require physical or logical removal. Resources posing a significant threat to the continuity of the business are to be immediately removed or isolated, either physically or logically. Resources that may require physical or logical removal or isolation may include, but are not limited to, the following:

Page 22: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

• All IP addresses in use • Firewalls • Routers and switches • Intrusion Detection Systems (IDS)/Intrusion Prevention Systems (IPS) • Any enterprise-wide applications (CRM systems, etc.) • Remote access • Point-to-point secure data transmission methods used for data traversing back and forth

on the network • Wireless networking or networks • Authentication servers (RADIUS) • Web servers • Proxy servers • File servers • Email servers • DNS servers • Operating systems • Databases • Applications

5. If the incident has affected the cardholder data environment in any way, and has impacted the

system components within this environment, [company name] must immediately report the incident, its severity and other essential information to the major payment brands. Listed in the following table are the links to the major payment brands, which also supply information on how to handle an incident that has resulted from a breach of the cardholder data environment. It is the policy of [company name] to formally acknowledge and adhere to these guidelines as set forth by the major payment brands.

TABLE 12.10.D

Payment Brand Information on Incident Handling and Reporting

VISA

http://usa.visa.com/merchants/risk_management/cisp_if_compromised.html

MasterCard http://www.mastercard.com/us/merchant/security/fraud_preventi

on.html

American Express https://www212.americanexpress.com/dsmlive/dsm/dom/us/merc

Page 23: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

hants/shared/supportandservices/fraudprevention/learnmoreabout/howtoreducerisk.do?vgnextoid=e43653e0d7a22210VgnVCM20000

0d0faad94RCRD

Discover Card http://www.discovernetwork.com/fraudsecurity/databreach.html

JCB http://www.jcb-global.com/english/jdsp/index.html

6. If the incident has in any way resulted in a criminal matter that may be readily identified, [company name] must immediately report it to law enforcement officials, such as the following:

• Local law enforcement • The United States Secret Service (for credit card fraud) • The Federal Bureau of Investigation (FBI)

7. Investigating the incident is also a critical process within the Incident Response plan. Proper

investigative techniques are to include, but are not limited to, the following:

• Understanding how the incident occurred and what led to the compromise • Reviewing all necessary system documentation such as logs, audit trails, rule sets,

configuration and hardening standards and all other supporting documentation • Interviewing personnel as needed • Examining any third-party providers and their respective products and services that are

utilized within [company name]‘s network architecture • If warranted, a third-party resource for assisting in the investigation of the incident may

be utilized (this will be done at the management’s discretion)

RECOVERY FROM AN INCIDENT Recovery procedures will include but are not limited to the following:

• Restoring systems from clean backups (a trusted source only) • Completely rebuilding systems as needed and warranted • Replacing systems as needed (this includes all system components within the cardholder data

environment and any other IT resources deemed critical by [company name]) • Reconfiguring network security (stronger, more adaptive configuration and hardening rules) for

all system components within the cardholder data environment and any other IT resources deemed critical by [company name]

Page 24: North Dallas Community Bible Fellowship Payment Card Industry … · 2019-10-31 · Note - the determination to use SAQ D was as a result of the ControlScan Authorized Security Assessor

The recovery procedures will be commensurate with the incident that has occurred. This will be conducted on a case-by-case basis with all aspects of the recovery process fully documented.

POST-INCIDENT ACTIVITIES AND AWARENESS A formal and documented Incident Response Report (IRR) is to be compiled and given to management of [company name] within an acceptable timeframe following the incident. The IRR must contain the following elements (NIST, n.d.):

• Detailed description of the incident • Response mechanisms undertaken • Reporting activities to all relevant third parties as needed • Recovery activities undertaken for restoring affected systems • A list of Lessons Learned from the incident and which initiative [company name] can take to

mitigate and hopefully eliminate the likelihood of future incidents

12.10 Responsibility for Policy Maintenance The [title of responsible party] is responsible for ensuring that the aforementioned policy is kept current as needed for purposes of compliance with the Payment Card Industry Data Security Standards (PCI DSS) initiatives.


Recommended