Alerts and End of Crisis
Concluding a Cyber Crisis: A Structured Approach
Successfully concluding a cyber crisis requires as much diligence as handling the incident itself. Following a structured post-crisis process ensures compliance, minimizes residual risks, and strengthens future readiness.
1. Alerting the Relevant Authorities
Why Alert Authorities?
Legal Compliance: Regulations like GDPR, CCPA, or industry-specific mandates may require incident reporting.
Assistance and Coordination: Law enforcement or cybersecurity agencies can provide support and help prevent broader impacts.
Key Considerations:
Who to Alert:
Regulatory bodies (e.g., ICO for GDPR, CISA for US government agencies).
Law enforcement (local police, federal cybersecurity units).
Industry-specific bodies (e.g., HIPAA regulators for healthcare).
When to Alert:
Ensure reporting is within the required timeframe (e.g., 72 hours under GDPR).
Who is Responsible:
Assign specific roles for notifications within your Crisis Management Team (CMT).
2. Alerting Your Partners
Why Alert Partners?
Containment: Partners may also be at risk if they are part of the compromised supply chain.
Shared Threat Intelligence: Enables partners to strengthen their defenses.
Incident Source Identification: Attackers may exploit vulnerabilities in a partner’s network.
Key Actions:
Communicate Early:
Notify partners as soon as you have actionable intelligence.
Share Critical Details:
Provide Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs).
Highlight potential attack vectors.
3. End of Crisis Procedures
A. Destruction or Preservation of Traces
Clean Desk Policy:
Securely destroy any physical notes or documents related to the crisis.
Prevent unauthorized access to sensitive information.
Preserve Evidence:
Retain logs, forensic images, and encrypted files for further analysis or regulatory compliance.
B. Oversight
Monitoring:
Maintain heightened monitoring for any residual threats or follow-up attacks.
Use SIEM tools to analyze post-crisis activity logs.
Staff Supervision:
Ensure continued adherence to security protocols as teams transition from crisis response.
C. Service Providers
Evaluate Vendor Offers:
Post-crisis, vendors may propose security solutions or upgrades.
Assess these offers critically, ensuring alignment with long-term security goals.
4. Post-Crisis Review
Conducting a Post-Incident Review is essential for improving future crisis management:
Key Questions to Address:
What worked well?
Identify effective procedures, tools, and team actions.
What could have been done better?
Pinpoint delays, miscommunications, or gaps in technical capabilities.
Are there gaps in the Crisis Management Plan?
Review the CMP to identify any areas for improvement.
Documentation:
Compile a detailed report outlining:
Incident timeline.
Response effectiveness.
Recommendations for improving processes, tools, and training.
Concluding a cyber crisis effectively requires a combination of communication, oversight, and reflection. By systematically notifying relevant authorities and partners, preserving critical evidence, and conducting a thorough post-crisis review, organizations can strengthen their resilience against future incidents.
Key Takeaways:
Ensure timely and accurate communication with authorities and partners.
Maintain post-crisis vigilance to prevent follow-up threats.
Use post-incident reviews to refine the Crisis Management Plan (CMP) and enhance long-term security.
Last updated