SOP Guide for Pharma

SOP for Containing and Reporting Cybersecurity Incidents

SOP for Containing and Reporting Cybersecurity Incidents

Standard Operating Procedure for Containing and Reporting Cybersecurity Incidents

1) Purpose

The purpose of this SOP is to outline the steps for identifying, containing, and reporting cybersecurity incidents to minimize impact on organizational operations, protect sensitive data, and ensure timely remediation.

2) Scope

This SOP applies to all employees, contractors, and IT personnel within the organization. It covers cybersecurity incidents such as data breaches, malware infections, unauthorized access, phishing attacks, and system vulnerabilities.

3) Responsibilities

  • IT Team: Monitor systems for suspicious activity, investigate incidents, and take containment measures.
  • Employees: Report any suspicious activity or potential cybersecurity threats to the IT team.
  • Supervisors: Ensure that employees comply with cybersecurity policies and protocols.
  • Cybersecurity Officer: Lead incident response efforts and ensure compliance with reporting requirements.

4) Procedure

4.1 Identifying Cybersecurity Incidents

  1. Monitor Systems:
    • Use security tools such as firewalls, intrusion detection systems (IDS), and antivirus software to detect anomalies.
  2. less
    Copy code

  3. Recognize Indicators:
    • Be alert to unusual system behavior, such as frequent crashes, slow performance, or unauthorized access attempts.
    • Identify signs of phishing, such as suspicious emails or links requesting sensitive information.
  4. Initial Reporting:
    • Employees must immediately report suspected incidents to the IT team using the Incident Reporting Form (Annexure 1).

4.2 Containing Cybersecurity Incidents

  1. Isolate Affected Systems:
    • Disconnect compromised devices or servers from the
network to prevent further spread of the threat.

less
Copy code

  • Identify Scope:
    • Determine the extent of the incident by analyzing logs, system activity, and affected devices.
  • Mitigate the Threat:
    • Deploy antivirus or antimalware tools to remove malicious software.
    • Reset passwords and revoke access for compromised accounts.
  • Secure Backup Data:
    • Ensure backup data remains unaffected and can be restored if needed.
  • 4.3 Investigating Cybersecurity Incidents

    1. Collect Evidence:
      • Preserve logs, files, and other relevant data for forensic analysis.
    2. less
      Copy code

    3. Analyze Root Cause:
      • Determine how the breach occurred, whether through phishing, software vulnerabilities, or insider threats.
    4. Document Findings:
      • Record all investigative findings in the Cybersecurity Incident Report (Annexure 2).

    4.4 Reporting Cybersecurity Incidents

    1. Notify Internal Stakeholders:
      • Inform relevant departments, including management and legal teams, about the incident and its impact.
    2. less
      Copy code

    3. Notify External Authorities:
      • If required, report the incident to regulatory bodies, law enforcement, or cybersecurity agencies.
    4. Communicate with Affected Parties:
      • Notify customers, partners, or employees whose data may have been compromised.

    4.5 Post-Incident Actions

    1. Implement Corrective Measures:
      • Patch software vulnerabilities and strengthen access controls to prevent recurrence.
    2. less
      Copy code

    3. Review Policies:
      • Update cybersecurity policies and training programs based on lessons learned.
    4. Monitor Systems:
      • Increase monitoring to ensure the threat has been neutralized and no further breaches occur.

    5) Abbreviations, if any

    • IDS: Intrusion Detection System
    • IT: Information Technology

    6) Documents, if any

    • Incident Reporting Form
    • Cybersecurity Incident Report
    • Post-Incident Review Records

    7) Reference, if any

    • ISO 27001 Information Security Management Standards
    • NIST Cybersecurity Framework
    • GDPR Data Breach Notification Guidelines

    8) SOP Version

    Version: 1.0

    Annexure

    Template 1: Incident Reporting Form

     
    Date Time Incident Description Reported By Immediate Action Taken
    DD/MM/YYYY 10:30 AM Phishing Email Detected John Doe Reported to IT

    Template 2: Cybersecurity Incident Report

     
    Incident Date Type of Incident Root Cause Impact Resolution
    DD/MM/YYYY Data Breach Compromised Login Credentials 500 Records Exposed Passwords Reset, Systems Secured
    Exit mobile version