Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page314/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   310   311   312   313   314   315   316   317   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 399 of 425

which to penetrate further into the system, and hamper the efficacy of the response.
1159. Even the process of formulating an incident response plan for IHiS staff could prove valuable. Leveraging the Cyber Attack, initial planning for the incident response plan will reveal gaps in communication, policy, technical capability, roles and responsibilities that require urgent attention at the organisational level.
49.1.2
Contents of an effective incident response plan
1160. Broadly, an effective incident response (“IR”) plan should provide a well- defined, organised approach to handling both suspected and confirmed security incidents. The IR plan must cover a) Processes for identifying whether an attack is in progress including common signs of an attack, and should specify that the signs must be considered cumulatively rather than in isolation b) How employees should respond to an attack c) Steps to betaken to mitigate the effect of the attack d) How and when employees should report an attack (or signs of an attack e) To whom the report should be made f) The means by which the report should be made and g) How employees should document their observations and actions.



COI Report – Part VII
Page 400 of 425

1161. In drafting the IR plan, guidance can besought from relevant documents produced by standards bodies, such as, the NIST Computer Security Incident Handling Guide 1162. In essence, the IR plan must address the immediate questions that would come to an employee during the course of an attack. It must make clear a) Who is in charge of the response process b) Who should be alerted and c) Who can be approached for help.
1163. The IR plan must have a special focus on the reporting responsibilities of line staff. As emphasised by Dr Lim, cybersecurity involves all staff in an organisation, because the impact of a cyber attack affects the whole organisation. As demonstrated by the facts of the Cyber Attack, it is the line staff, like Sze
Chun, that will often be the first responders. Line staff must be encouraged to take the initiative and report proactively. As CE, CSA said Staff should have a clear and common understanding of the incident reporting framework, the relevant reporting structures and processes, and what measures must be immediately taken in the event of a cybersecurity incident. New staff should be on-boarded in a timely manner, and regular refresher training should be conducted to ensure compliance with these SOPs.”
1164. The IR plan for line staff should be augmented with playbooks (focusing on step-by-step directions) that act as helpful manuals for more specific threat situations. This is especially important for the line staff, whose normal functions do not involve security and incident reporting. As Vivek testified, effective
112
NIST.SP.800-61 Revision 2.



Download 5.91 Mb.

Share with your friends:
1   ...   310   311   312   313   314   315   316   317   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page