This security incident response policy is intended to establish controls to ensure detection of security vulnerabilities and incidents, as well as quick reaction and response to security breaches. This document also provides implementing instructions for security incident response, to include definitions, procedures, responsibilities, and performance measures (metrics and reporting mechanisms).
This policy applies to all users of information systems within Hamurlabs. This typically includes employees and contractors, as well as any external parties that come into contact with systems and information controlled by Hamurlabs (hereinafter referred to as “users”). This policy must be made readily available to all users.
A key objective of Hamurlabs’s Information Security Program is to focus on detecting information security weaknesses and vulnerabilities so that incidents and breaches can be prevented wherever possible. Hamurlabs is committed to protecting its employees, customers, and partners from illegal or damaging actions taken by others, either knowingly or unknowingly. Despite this, incidents and data breaches are likely to happen; when they do, Hamurlabs is committed to rapidly responding to them, which may include identifying, containing, investigating, resolving, and communicating information related to the breach.
This policy requires that all users report any perceived or actual information security vulnerability or incident as soon as possible using the contact mechanisms prescribed in this document. In addition, Hamurlabs must employ automated scanning and reporting mechanisms that can be used to identify possible information security vulnerabilities and incidents. If a vulnerability is identified, it must be resolved within a set period of time based on its severity. If an incident is identified, it must be investigated within a set period of time based on its severity. If an incident is confirmed as a breach, a set procedure must be followed to contain, investigate, resolve, and communicate information to employees, customers, partners, and other stakeholders.
Within this document, the following definitions apply:
The acting information security officer and team will facilitate and maintain this policy and ensure all employees have reviewed and read the policy.
It is important to note that the processes surrounding security incident response should be periodically reviewed and evaluated for effectiveness. This also involves appropriate training of resources expected to respond to security incidents, as well as the training of the general population regarding Hamurlabs’s expectation for them, relative to security responsibilities. The incident response plan is tested annually.
The following situations are to be considered for information security event reporting: