Cybersecurity Incident Response Documentation

banner-cirp-2018.1.jpg

Comprehensive Cybersecurity Incident Response Program 

Most companies have requirements to document its incident response processes, but they lack the knowledge and experience to undertake such documentation efforts. That means businesses are faced to either outsource the work to expensive consultants or they ignore the requirement and hope they do not get in trouble for being non-compliant with a compliance requirement. In either situation, it is not a good place to be. The good news is that ComplianceForge developed a viable incident response program that is based on NIST 800-61 guidance, which is the "gold standard" for incident response frameworks. This document is capable of scaling for any sized company. 

 product-selection-2018.1-cybersecurity-audit-preparation-incident-response-plan-program-template.jpg

     

 

The CIRP can serve as the cornerstone element in your organization's cybersecurity incident response program. It can stand alone or be paired with other specialized products we offer.

Can you honestly answer how incident response is documented at your organization? When you "peel back the onion" and prepare for an audit, there is a need to address "the how" for certain topics, such as incident response. While policies and standards are designed to describe why something is required and what needs to be done, many companies fail to create documentation to address how the policies and standards are actually implemented.

We did the heavy lifting and created several program-level documents to address this need and the Cybersecurity Incident Response Program (CIRP) is one of those products. This is specifically designed to provide you with the ability to hit the ground running with incident response. From laying the foundation of how to classify incidents, to responding to events, and providing tabletop exercise material, the CIRP can quickly mature your incident response capabilities.

software-2018.1-no-software-to-install-v2.jpg

What Is The Cybersecurity Incident Response Program (CIRP)?

The CIRP is an editable Microsoft Word document, but it also comes with Microsoft Excel, PowerPoint and Visio templates that contain the program-level documentation and process flows to establish a mature cybersecurity incident response program.

  •  This product addresses the “how?” questions for how your company manages cybersecurity incident response.
    • This product helps provide evidence of due care in how your company handles cybersecurity incidents.
    • The CIRP contains “tabletop exercise” scenarios, based on the categories of incidents, so that your company can train on likely scenarios and tailor plans specific to your needs.
  • The CIRP helps address the fundamental expectations when it comes to incident response requirements:
    • Defines the hierarchical approach to handling incidents.
    • Categorizes eleven different types of incidents and four different classifications of incident severity.
    • Defines the phases of incident response operations, including deliverables expected for each phase.
    • Defines the Integrated Security Incident Response Team (ISIRT) to enable a unified approach to incident response operations.
    • Defines the scientific method approach to incident response operations.
    • Provides guidance on how to write up incident reports (e.g., lessons learned).
    • Provides guidance on forensics evidence acquisition.
    • Identifies and defines Indicators of Compromise (IoC).
    • Identifies and defines sources of evidence.

 

   What Problem Does The CIRP Solve?  

  • Lack of In House Security Experience - Writing security documentation is a skill that many good cybersecurity professionals simple are not proficient at and avoid the task at all cost. Tasking your security analysts and engineers to write comprehensive documentation (e.g., cybersecurity incident response program documentation) means you are actively taking them away from protecting and defending your network, which is not a wise use of their time. The NIST 800-61-based CIRP is an efficient method to obtain a comprehensive incident response program for your organization!
  • Compliance Requirements - Nearly every organization, regardless of industry, is required to have formally-documented incident response program. Requirements range from PCI DSS to NIST 800-171 to EU GDPR. The CIRPis designed with compliance in mind, since it focuses on leading security frameworks to address reasonably-expected incident response activities. 
  • Audit Failures - Security documentation does not age gracefully like a fine wine. Outdated documentation leads to gaps that expose organizations to audit failures and system compromises. The CIRP is easy to maintain and customize for your organization, since it is Microsoft Office-based documentation that you can edit for your needs and keep current as things change in your environment.  
  • Vendor Requirements - It is very common for clients and partners to request evidence of an incident response program. The CIRP provides this evidence!

 How Does the CIRP Solve It?  

  • Clear Documentation - The CIRP provides comprehensive documentation to prove that your incident response program exists. This equates to a time saving of hundreds of hours and tens of thousands of dollars in staff and consultant expenses!
  • Time Savings - The CIRP can provide your organization with a semi-customized solution that requires minimal resources to fine tune for your organization's specific needs.  
  • Alignment With Leading Practices - The NIST-based CIRP is written to align your organization with leading practices for incident response.  

  

Product Example - Cybersecurity Incident Response Program (CIRP)

Our customers choose the Cybersecurity Incident Response Program (CIRP) because they:

  • Have a need for comprehensive incident response documentation built on an industry framework
  • Need to be able to edit the document to their specific needs
  • Have documentation that is directly linked to best practices 
  • Need an affordable solution

 

Don't take our word for it - take a look at the example below to see for yourself the level of professionalism and detail that went into it.

 

download-example-cirp-cybersecurity-incident-response-program.jpg

 

Cost Savings Estimate - Cybersecurity Incident Response Program (CIRP)

The process of writing cybersecurity policies and standards can take an internal team many months and it involves pulling your most senior and experienced cybersecurity experts away from operational duties to assist in the process, which is generally not the most efficient use of their time.This also requires involvement from your internal team for quality control and answering questions, so the impact is not limited to just the consultant's time being consumed. In addition to the immense cost of hiring a cybersecurity consultant at $300/hr+ to write this documentation for you, the time to schedule a consultant, provide guidance and get the deliverable product can take months.  

When you look at the costs associated with either hiring a consultant to write cybersecurity documentation for you or tasking your internal staff to write it, the cost comparisons paint a clear picture that buying from ComplianceForge is the logical option. Purchasing the CIRP offers these clear advantages:

  • Compared to hiring a consultant, you can save months of wait time and tens of thousands of dollars!
  • Compared to writing your own documentation, you can potentially save hundreds of man-hours and the associated cost of lost productivity. 
  • Orders are usually processed the same business day so you get your documentation quickly! 
2018.1-cost-comparison-cirp-hire-a-consultant.jpg

When you factor in approximately 120+ hours of a cybersecurity consultant and the internal staff time to perform reviews and refinements with key stakeholders, purchasing a CIRP from ComplianceForge is approximately 4% ($34,500+ savings) of the cost as compared to hiring a consultant to write it for you!

 

2018.1-cost-comparison-cirp-bar-chart.jpg 2018.1-cost-comparison-cirp-diy.jpg

When you factor in 200+ hours of internal staff time to research, write and peer review cybersecurity documentation, purchasing a CIRP from ComplianceForge is approximately 9% ($13,500+ savings) of the cost as compared to writing your own documentation!

 


Professionally-Written, Editable & Easily-Implemented NIST 800-61 Based Incident Response Program

The CIRP operates at the strategic level to provide guidance to your organization's incident responders. It provides the overall framework that governs incident response across the enterprise with a focus on repeatable processes and sustainable operations. The CIRP breaks down the management of incident response into phases:

  • Pre-Incident
    • Phase 1 - Prepare
  • Incident Response Operations
    • Phase 2 - Detect & Analyze
    • Phase 3 - Contain
    • Phase 4 - Eradicate
    • Phase 5 - Recovery
  • Post Incident
    • Phase 6 - Report
    • Phase 7 - Remediate

2017-cybersecurity-incident-response-program-incident-response-hierarchy.jpg

Which Product Is Right For You? 

Our documentation is meant to address your requirements from strategic concepts all the way down to day-to-day deliverables you need to demonstrate compliance with common statutory, regulatory and contractual obligations. We offer up to 40% discounts on our documentation bundles, so please be aware that you have benefit from significant savings by bundling the documentation you need. You can see the available bundles here.

 

product-selection-2018.1-cybersecurity-program-products.jpg

 

We are here to help make comprehensive cybersecurity documentation as easy and as affordable as possible. We serve businesses of all sizes, from the Fortune 500 all the way down to small businesses, since our cybersecurity documentation products are designed to scale for organizations of any size or level of complexity. Our affordable solutions range from cybersecurity policies & standards documentation, to NIST 800-171 compliance checklists, to program-level documentation, such as "turn key" incident responserisk management or vulnerability management program documents. Our focus is on helping you become audit ready!

 

product-selection-2018.2.jpg

 

 

Sort by:

Sign up for our Newsletter!

×
×