Home Features What do you need in your cyber incident checklist?

What do you need in your cyber incident checklist?

Cybersecurity Checklist

Contributed by Center for Internet Security

Establish Reliable Facts and a Way to Stay Informed

  • Who is reporting the problem? How did they become aware?
  • What do we know so far about what happened?
  1. What networks/systems are affected?
  2. What data/information was compromised (e.g., stolen, deleted, altered)?
  • When did the breach occur?
  1. When did we find out about it?
  2. When did we begin to do something about it?
  3. When will we know the full scope of the problem?
  4. When do we estimate that the problem will be remediated?
  5. Where did the breach occur (what office, activity, locale, etc.)?
  • How much do we know, with certainty, about how the breach occurred? The source of the attack?
  • How will we stay informed of efforts to remediate the breach and restore normal service?


Mobilize a Response

  • Who has the lead in directing operational response efforts?
  • What role will your office play? Has the EI-ISAC been notified (1.866.787- 4722)?
  • Who else should be notified at this point (e.g., citizens, business and industry, other state, local, federal officials, etc.)?
  • Has law enforcement been notified?
  • What expertise is on hand to work the problem? What additional help do you need? Who will provide it?
  • What measures are needed to secure the networks/systems from further exploitation?
  • What additional steps are needed to secure data holdings?
  • How will the remediation efforts to limit/ repair the damage and restore normal services be prioritized?
  • What special notifications should be prepared for victims?
  • What other actions do your breach notification laws require?
  • What are the legal implications of the incident?


Communicate What You Know

  • Here, as elsewhere, bad news does not get better with age, but remember the general rule that the first report is always wrong.
  • Release your initial public statement as soon as you have a reasonable command of the problem and can explain what you are doing about it.
  • Describe what you know so far about what happened and what is being done to correct it.
  • Be prepared to explain the preexisting cybersecurity posture and the measures that were in place to prevent events of this kind.
  • Be prepared to explain the steps you will take to prevent future unauthorized intrusions. Start with basic cyber hygiene and the CIS Controls.
  • Establish a regular cadence of updates for victims, media, and other stakeholders—including your own workforce.

This was published here with permission from Center for Internet Security

The opinions expressed within this article are the personal opinions of the author. The facts and opinions appearing in the article do not reflect the views of CISO MAG and CISO MAG does not assume any responsibility or liability for the same!