<section title="7.3. Managing Information Security Incidents"><subsection title="Objective"><paragraph
    title="7.3.1."


><![CDATA[<p>Organisations have processes implemented for incident identification, management and analysis of information security incidents, including selection of appropriate remedies which will assist in preventing or reducing the impact of future information security incidents.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="7.3.2."


><![CDATA[<p>This section covers information relating primarily to managing information security incidents. The management of physical and personnel security incidents is considered to be out of scope unless it directly impacts on the protection of systems (e.g. the breaching of physical protection for a server room).</p>]]></paragraph>
<paragraph
    title="7.3.3."


><![CDATA[<p class="NormS7C3">It is important to note that, in most cases, information systems are likely to be affected.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="7.3.4."


><![CDATA[<p>Additional information relating to the management of ICT evidence is contained in:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td style="text-align: center;"><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>ISO/IEC 27037:2012</strong></p>
</td>
<td>
<p><strong>Information Technology – Security Techniques – Guidelines for identification, collection, acquisition and preservation of digital evidence.</strong></p>
</td>
<td style="text-align: center;">
<p>ISO</p>
</td>
<td>
<p><a title="ISO/IEC 27037" rel="noopener noreferrer" href="https://www.iso.org/standard/44381.html" target="_blank">https://www.iso.org/standard/44381.html</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>HB 171:2003</strong></p>
</td>
<td>
<p><strong>Guidelines for the Management of Information Technology Evidence</strong></p>
</td>
<td style="text-align: center;">Standards Australia&nbsp;</td>
<td><a href="https://www.saiglobal.com/PDFTemp/Previews/OSH/as/misc/handbook/HB171.PDF">https://www.saiglobal.com/PDFTemp/Previews/OSH/as/misc/handbook/HB171.PDF [PDF, 350 KB]</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>&nbsp;Incident Response&nbsp;</strong></p>
</td>
<td style="text-align: center;">NCSC&nbsp;</td>
<td><a href="https://www.ncsc.govt.nz/incidents/">Incidents | National Cyber Security Centre (ncsc.govt.nz)</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Information security incident management documentation"><paragraph
    title="7.3.5.R.01."

    tags="Governance,Information Security Documentation,Incident Management,Information Security Incidents"


><![CDATA[<p>Ensuring responsibilities and procedures for information security incidents are documented in relevant Information Security Documentation will ensure that when an information security incident does occur, agency personnel can respond in an appropriate manner. In addition, ensuring that system users are aware of reporting procedures will assist in identifying any information security incidents that an ITSM, or system owner fail to notice.</p>]]></paragraph>
<paragraph
    title="7.3.5.C.01."

    tags="Governance,Information Security Documentation,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1260"
><![CDATA[<p>Agencies MUST detail information security incident responsibilities and procedures for each system in the relevant Information Security Documents.</p>]]></paragraph>
<paragraph
    title="7.3.5.R.02."

    tags="Incident Management,Information Security Incidents"


><![CDATA[<p>Alternative communications efforts should be established to avoid using potentially compromised infrastructure to communicate during an incident.</p>]]></paragraph>
</block>
<block title="Recording information security incidents"><paragraph
    title="7.3.6.R.01."

    tags="Governance,Information Security Documentation,Incident Management,Information Security Incidents"


><![CDATA[<p>The purpose of recording information security incidents is to highlight the nature and frequency of information security incidents so that corrective action can be taken. This information can subsequently be used as an input to security risk assessments of systems.</p>]]></paragraph>
<paragraph
    title="7.3.6.C.01."

    tags="Governance,Information Security Documentation,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1264"
><![CDATA[<p>Agencies SHOULD ensure that <strong>all</strong> information security incidents are recorded in a register.</p>]]></paragraph>
<paragraph
    title="7.3.6.C.02."

    tags="Governance,Information Security Documentation,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1266"
><![CDATA[<p>Agencies SHOULD use their incidents register as a reference for future security risk assessments.</p>]]></paragraph>
</block>
<block title="Handling data spills or data breach"><paragraph
    title="7.3.7.R.01."

    tags="Data Management,Governance,Incident Management,Information Security Incidents"


><![CDATA[<p>A data spill or data breach is defined as the unauthorised or unintentional release, transmission or transfer of data. If there is a possibility that sensitive or classified information may be compromised as a result of an information security incident, agencies need to be able to respond in a timely fashion to limit damage and contain the incident.</p>
<p>For example, Data Loss Prevention (DLP) techniques and tools such as network activity monitoring, endpoint DLP tools, data classification can aid in detecting and preventing data spills or data breaches.</p>]]></paragraph>
<paragraph
    title="7.3.7.C.01."

    tags="Data Management,Governance,Information Security Documentation,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1271"
><![CDATA[<p>Agencies MUST implement procedures and processes to detect data spills or data breach.</p>]]></paragraph>
<paragraph
    title="7.3.7.C.02."

    tags="Data Management,Governance,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1273"
><![CDATA[<p>When a data spill occurs agencies MUST assume that data at the highest classification held on or processed by the system, has been compromised.</p>]]></paragraph>
<paragraph
    title="7.3.7.C.03."

    tags="Data Management,Governance,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1274"
><![CDATA[<p>Agency SOPs MUST include procedure for:</p>
<ul>
<li>all personnel with access to systems;&nbsp;</li>
<li>notification to the ITSM of any data spillage&nbsp;or breaches;&nbsp;and</li>
<li>notification to the ITSM of access to any data which they are not authorised to access.</li>
</ul>]]></paragraph>
<paragraph
    title="7.3.7.C.04."

    tags="Data Management,Governance,Information Security Documentation,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1275"
><![CDATA[<p>Agencies MUST document procedures for dealing with data spills&nbsp;or data breaches in their IRP.</p>]]></paragraph>
<paragraph
    title="7.3.7.C.05."

    tags="Data Management,Governance,Information Security Documentation,IRP,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1276"
><![CDATA[<p>Agencies MUST treat any data spill&nbsp;or data breach as an information security incident and follow the IRP to deal with it.</p>]]></paragraph>
<paragraph
    title="7.3.7.C.06."

    tags="Data Management,Governance,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1277"
><![CDATA[<p>When a data spill or data breach occurs agencies MUST report the details to the Privacy Commissioner and information owner in accordance with the <a rel="noopener noreferrer" href="https://www.legislation.govt.nz/act/public/2020/0031/latest/LMS23223.html" target="_blank">Privacy Act 2020</a>.</p>]]></paragraph>
</block>
<block title="Containing data spills"><paragraph
    title="7.3.8.R.01."

    tags="Data Management,Technical,Incident Management,Information Security Incidents"


><![CDATA[<p class="Normal-nonumbering">The spillage of classified information onto a system not accredited to handle the information is considered a <span style="text-decoration: underline;">serious</span> information security incident.&nbsp; It may be a <span style="text-decoration: underline;">critical</span> information security incident if personal information or particularly sensitive information is spilled.&nbsp; Refer to <a title="Reporting information security incidents" href="http://nzism.gcsb.govt.nz/ism-document#Section-13120">Section 7.2 – Reporting Information Security Incidents</a>.</p>]]></paragraph>
<paragraph
    title="7.3.8.R.02."

    tags="Data Management,Technical,Incident Management,Information Security Incidents"


><![CDATA[<p><strong><em>Isolation</em></strong> may include disconnection from other systems and any external connections. In some cases system isolation may not be possible for architectural or operational reasons.</p>]]></paragraph>
<paragraph
    title="7.3.8.R.03."

    tags="Data Management,Technical,Incident Management,Information Security Incidents"


><![CDATA[<p><strong><em>Segregation</em></strong> may be achieved by isolation, enforcing separation of key elements of a virtual system, removing network connectivity to the relevant device or applying access controls to prevent or limit access.</p>]]></paragraph>
<paragraph
    title="7.3.8.R.04."

    tags="Data Management,Technical,Incident Management,Information Security Incidents"


><![CDATA[<p>It is important to note that powering off a system can destroy information that may be useful in forensics analysis or other investigative work. In large, inter-connected systems, powering off a system may not be feasible.</p>]]></paragraph>
<paragraph
    title="7.3.8.C.01."

    tags="Data Management,Technical,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1283"
><![CDATA[<p>When classified information is introduced onto a system not accredited to handle the information, the following actions MUST be followed:</p><ol>
<li>Immediately seek the advice of an ITSM;</li>
<li>Segregate or isolate the affected system and/or data spill;</li>
<li>Personnel MUST NOT delete the higher classified information unless specifically authorised by an ITSM.</li>
</ol>]]></paragraph>
<paragraph
    title="7.3.8.C.02."

    tags="Data Management,Technical,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must Not"
    cid="1284"
><![CDATA[<p>When classified information is introduced onto a system not accredited to handle the information, personnel MUST NOT copy, view, print or email the information.</p>]]></paragraph>
<paragraph
    title="7.3.8.C.03."

    tags="Data Management,Governance,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1285"
><![CDATA[<p>When a data spill or data breach involving classified or sensitive information or contamination<span style="font-size: 10.5pt; line-height: 127%; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: Calibri; color: #212529; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;"> </span>of classified systems occurs and systems cannot be segregated, or isolated agencies SHOULD immediately contact the&nbsp;<a href="https://ncsc.govt.nz">NCSC</a> for further advice.</p>]]></paragraph>
</block>
<block title="Handling malicious code infection"><paragraph
    title="7.3.9.R.01."

    tags="Technical,Incident Management,Information Security Incidents"


><![CDATA[<p class="Normal-nonumbering">Malicious code or malware is defined as software that attempts to compromise the confidentiality, integrity or availability of a system. This guidance for handling malicious code infections assists organisations have the procedures and processes in place to manage potential infections, further spread and similar future infections. Important details include:</p>
<ul>
<li>the infection date/time of the machine;</li>
<li>any observed effects and source details;</li>
<li>the possibility that system records and logs could be compromised; and</li>
<li>the period of infection.</li>
</ul>]]></paragraph>
<paragraph
    title="7.3.9.R.02."

    tags="Technical,Incident Management,Information Security Incidents"


><![CDATA[<p>Positive detection of malicious code will require the below steps to occur:</p>
<ul>
<li>Isolation of infected systems to prevent further spread. Check connected systems and media for infections and isolate as required;</li>
<li>Removal of the malicious code should be performed with appropriate malware removal tools;&nbsp;</li>
<li>Eradication and recovery in some cases would require restoring systems with original media.<span style="font-size: 10.5pt; line-height: 127%; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: Calibri; color: #212529; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;"> </span></li>
</ul>]]></paragraph>
<paragraph
    title="7.3.9.R.03."

    tags="Technical,Incident Management,Information Security Incidents"


><![CDATA[<p>Agencies should be aware that some malicious code infections such as rootkits, employ persistence mechanisms. This will require specialist assistance or advice to detect and eradicate .</p>]]></paragraph>
<paragraph
    title="7.3.9.C.01."

    tags="Technical,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1290"
><![CDATA[<p class="Normal-nonumbering">Agencies SHOULD follow the steps described below when malicious code is detected:</p>
<ul>
<li class="MsoNormal" style="text-indent: -21.25pt; line-height: normal;">&nbsp; &nbsp; &nbsp; isolate the infected system;</li>
<li>decide whether to request assistance from <a title="NCSC" rel="noopener noreferrer" href="https://ncsc.govt.nz/" target="_blank">NCSC</a>;</li>
<li>if such assistance is requested and agreed to, delay any further action until advised by <a title="NCSC" rel="noopener noreferrer" href="https://ncsc.govt.nz/" target="_blank">NCSC</a>;</li>
<li>check connected systems and media including backups for malicious code;&nbsp;</li>
<li>isolate all infected systems and media to prevent reinfection;</li>
<li>change all passwords and key material stored or potentially accessed from compromised systems, including any websites with password controlled access;</li>
<li>advise system users of any relevant aspects of the compromise, including a recommendation to change all passwords on compromised systems;</li>
<li>revoke all session tokens associated with user and/or device;</li>
<li>use up-to-date anti-malware software to remove the malware from the systems or media;</li>
<li>monitor network traffic for malicious activity;</li>
<li>record and report the information security incident and perform any other activities specified in the IRP; and</li>
<li>in certain scenarios rebuilding and reinitialising the system and/or user profile may be required.</li>
</ul>]]></paragraph>
</block>
<block title="Allowing continued attacks"><paragraph
    title="7.3.10.R.01."

    tags="Technical,Incident Management,Information Security Incidents"


><![CDATA[<p>Agencies allowing an attacker to continue an attack against a system in order to seek further information or evidence will need to establish with their business owner(s) and legal advisor(s) whether the actions are breaching any business service level agreements or contractual obligations.</p>]]></paragraph>
<paragraph
    title="7.3.10.C.01."

    tags="Technical,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Must"
    cid="1294"
><![CDATA[<p>Agencies considering allowing an attacker to continue some actions under controlled conditions for the purpose of seeking further information or evidence MUST<span style="font-size: 10.5pt; line-height: 127%; font-family: &#039;Open Sans&#039;,sans-serif; mso-fareast-font-family: Calibri; color: #212529; mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-bidi-language: AR-SA;">&nbsp;</span>seek legal advice.</p>]]></paragraph>
</block>
<block title="Integrity of evidence"><paragraph
    title="7.3.11.R.01."

    tags="Technical,Incident Management,Information Security Incidents"


><![CDATA[<p>While gathering evidence it is important to maintain the integrity of the information and the chain of evidence. Even though in most cases an investigation does not directly lead to a police prosecution, it is important that the integrity of evidence such as manual logs, automatic audit trails and intrusion detection tool outputs be protected. This may also include a record of activities taken by the agency to contain the incident.</p>]]></paragraph>
<paragraph
    title="7.3.11.C.01."

    tags="Technical,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1297"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>transfer a copy of raw audit trails and other relevant data onto media for secure archiving, as well as securing manual log records for retention; and</li>
<li>ensure that all personnel involved in the investigation maintain a record of actions undertaken to support the investigation.</li>
</ul>]]></paragraph>
</block>
<block title="Seeking assistance"><paragraph
    title="7.3.12.R.01."

    tags="Technical,Incident Management,Information Security Incidents"


><![CDATA[<p>After detecting an information security incident, organisations need to preserve the evidence prior to taking any remediation steps. For example, snapshots including memory of virtual machines. This greatly increases NCSC’s ability to provide assistance.</p>]]></paragraph>
<paragraph
    title="7.3.12.C.01."

    tags="Technical,Incident Management,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1300"
><![CDATA[<p class="Normal-nonumbering">Agencies SHOULD ensure that any requests for NCSC assistance are made as soon as possible after the information security incident is detected and that no actions which could affect the integrity of the evidence are carried out prior to NCSC’s involvement.</p>]]></paragraph>
</block>
</subsection>
</section>
