Purpose
This playbook provides a standardised procedure for responding to security incidents reported to or detected by the Information Security team. It covers the four most common incident types at this institution:
- Phishing emails
- Credential compromise (account takeover)
- Malware / ransomware detection
- Suspected unauthorised access to systems
Severity Classification
| Severity | Criteria | Response Time |
|---|---|---|
| P1 — Critical | Active ransomware; confirmed data exfiltration; core system compromise | Immediate (24/7) |
| P2 — High | Credential compromise of privileged account; active phishing campaign | Within 1 hour |
| P3 — Medium | Single account compromise; isolated malware detection | Within 4 hours |
| P4 — Low | Reported phishing email (not clicked); policy violation | Next business day |
Incident Response Phases
Phase 1 — Detection & Reporting
Security incidents may be reported via:
- User-submitted ticket at it.example.edu/support
- Automated SIEM alert (Wazuh → PagerDuty)
- Email to
security@example.edu - Direct call to the SecOps on-call line: ext. 5557
All incidents must be logged in the incident tracking system within 30 minutes of detection.
Phase 2 — Triage (0–30 min)
- Assign a severity using the table above.
- For P1/P2: page the Security Manager immediately.
- Gather initial context:
- What was reported or alerted?
- Which user(s), system(s), or data are involved?
- Is the incident ongoing or historical?
Phase 3 — Containment
Phishing Email Campaign
- Quarantine all copies of the phishing email across all mailboxes:
# Exchange Online PowerShell Search-UnifiedAuditLog -StartDate ... -EndDate ... -FreeText "phishing subject" New-ComplianceSearchAction -Purge -PurgeType SoftDelete - Block the sender domain and malicious URLs in the email gateway.
- Post a user advisory on the Beacon portal if the campaign is widespread.
Credential Compromise / Account Takeover
- Immediately disable the affected account in Active Directory:
Disable-ADAccount -Identity <samAccountName> - Revoke all active sessions in Azure AD / Entra ID.
- Force a password reset.
- Review audit logs for the account for the past 30 days (logins, resource access, email forwarding rules).
- Check whether MFA was bypassed or not enrolled — escalate to P1 if MFA was bypassed.
Malware / Ransomware
- Isolate the affected system immediately:
- Disconnect from the network switch port (or shut down the port:
interface gi1/0/X→shutdown) - Or disable the NIC if the switch port is not accessible
- Disconnect from the network switch port (or shut down the port:
- Do not reboot — volatile memory may contain forensic evidence.
- Engage the vendor IR line if ransomware is confirmed (see Contacts).
- Identify the infection vector from SIEM logs.
- Scan all file shares reachable from the affected endpoint for encryption artefacts.
Phase 4 — Investigation & Evidence Collection
- Collect relevant logs and preserve them to the
\\secops-nas\incidents\<ticket-id>\share. - Capture disk images of affected systems before any remediation (use FTK Imager or
dd). - Document the attack chain: initial access → lateral movement → impact.
- Determine whether personal data (FERPA, HIPAA) was potentially exposed.
Phase 5 — Remediation
- Re-image or rebuild affected systems from known-good baselines.
- Apply all outstanding patches before bringing the system back online.
- Restore from clean backups if data was corrupted or encrypted.
- Confirm clean state with a full AV and IOC scan before reconnecting to the network.
Phase 6 — Post-Incident Actions
- Complete a Security Incident Report (SIR) within 5 business days.
- If personal data was exposed, notify the Privacy Officer within 24 hours — FERPA / HIPAA breach notification timelines apply.
- Conduct a lessons-learned review with the Security and IT Operations teams.
- Update detection rules and playbooks based on findings.
Contacts
| Role | Contact |
|---|---|
| SecOps on-call | ext. 5557 |
| Security Manager | keisha.thomas@example.edu |
| Privacy Officer | privacy@example.edu |
| Legal Counsel | legal@example.edu |
| FBI Cyber Division (if required) | 1-800-CALL-FBI |
| Cyber Insurance carrier | Policy #XXXX — 1-800-XXX-XXXX |
·