Data Centers

Create an incident response policy

Even the most secure networks need an incident response policy (IRP). Take a look at eight key areas that an effective IRP should address.

Does your organization have an incident response policy (IRP)? You may not think you need one. You've locked down your organization's network, and your disaster recovery plan effectively details how to respond to a security incident—so you feel relatively secure.

But even the most secure networks need an IRP. Regardless of the severity of the incident, it's essential that your company has a policy in place that outlines steps to take during potentially disastrous times.

Every organization should include an IRP as part of its overall business continuity plan (BCP). Knowing how to minimize security vulnerabilities and respond to security incidents in a well-organized and thorough manner should be a critical component of any company's BCP.

A security incident is any adverse event or threat that affects your organization's information systems or network. Incidents can include unauthorized access, malicious code (such as viruses), network probes, and denial-of-service attacks.


Get the TR Blog Roundup

Find out who's offering the best advice, the quirkiest comments, and the most compelling life stories every week with TechRepublic's Blog Roundup. Click here to automatically sign up to receive it every Wednesday.

Use tags to find blog posts about Windows and security.


An effective IRP should address eight key areas. Let's take a closer look.

Demonstrate management support
First and foremost, your policy should clearly outline management's support of the policy. A member of senior management—or anyone with the same authority to address the included provisions—should sign the policy. These provisions might include any financial resources, personnel, equipment, and training dedicated to implementing the policy as well as internal consequences of violation.

Decide an organizational approach
There are two common methods of dealing with an incident: Contain, clean, and deny, or monitor and record. The method your organization chooses should depend on whether the goal is to seek prosecution and/or compensation or to quickly restore services.

Determine outside notification procedures
Allowing your network to participate in a distributed attack and remaining silent is a legal landmine waiting to explode. In our collaborative world, it's important to determine procedures for notifying third parties if you're involved in a distributed event. Decide whom you'll inform as well as when and how.

Discuss remote connections
Your policy must address remote connections. This should encompass all remote employees or contractors, and it needs to outline your rights to disconnect and remove access during a security incident.

Define partner agreements
Describe downstream and upstream agreements with your service providers and customers that define your right to monitor and disconnect the network as required.

Develop an incident team
Identify by position (not name) the members of the team that will enforce the policy, and describe their roles, responsibilities, and functions. The team should encompass a variety of skills and areas of expertise, including security, administrators, human resources, and legal.

Design an internal communications plan
Develop an internal communications plan that identifies who you will notify and how you will contact them. In addition, decide on the person who's responsible for initiating this contact.

Demand a follow-up report
Define a method for reporting and historically archiving the incident. Use that information to tune your operations to prevent a similar incident from reoccurring.

Every network is unique, and the type of business your organization conducts on the Internet will influence the level of your response to a security incident. As your network changes, make sure you adjust your IRP accordingly and address newly discovered vulnerabilities as they occur.

Final thoughts

If your organization has no established, coherent plan of action, it can easily make the wrong decisions both during and after a security incident. An IRP policy can't solve your problems, but it can offer a cool-headed method for dealing with a hot issue.

For more in-depth information on incident response, check out SANS' Information Security Reading Room, which offers a wealth of available information that can help you create a comprehensive incident response policy.

Worried about security issues? Who isn't? Automatically sign up for our free Security Solutions newsletter, delivered each Friday, and get hands-on advice for locking down your systems.

Editor's Picks

Free Newsletters, In your Inbox