Writing an Incident Handling and Recovery Plan
  1. Definitions
    1. Incidents - What constitutes an incident?
      • Classification - What type of incident has occurred? Explain each category below.
        • Loss of confidentiality of information
        • Compromise of integrity of information
        • Denial of Service
        • Misuse of Service
        • Damage to Systems
      • Priority and Urgency - Identify the response level of effort (LoE) for a given type of incident. These may be reordered to suit the organizations needs.
        • Threats to the physical safety of human beings
        • Root or system level attacks to any host or system
        • Compromise of restricted confidential service accounts or software areas
        • Denial of service attacks to infrastructure, confidential service accounts or software areas
        • Any of the above at other sites which originate from the organization’s systems
        • Large scale attacks of any kind (worms, sniffing attacks, etc)
        • Threats, harassment, or criminal offenses involving individual user accounts
        • Compromise of individual user accounts
        • Compromise of desktop systems
        • Forgery, misrepresentation, or misuse of resources
    2. Incident Response Team (IRT) - Who will respond to the incident?
      • Mission Statement - Why does the team exist and what is its purpose?
      • Roles and Members - Who should be on the team?
        • Leader - Primary coordinator and point of contact
        • Management Sponsor - Lends authority to help minimize "red tape" barriers
        • Systems Engineer - Responsible for affected systems
        • Network Engineer - Responsible for affected networks
        • Public Relations Advisory - Interfaces with the public as necessary
        • Legal Advisory - Provides advice for differing legal courses of action
  2. Incident Handling Process
  3. Recovery Process and Follow-Up
  4. Incident Examples - Description of the plan in action will help all parties to fully understand the plan
  5. Appendix

Source: Help Net Security