IllumiDesk Security Docs
  • IllumiDesk Team Handbook
  • People Group
    • Introduction
    • General Employment
    • Employment Status & Recordkeeping
    • Working Conditions & Hours
    • Employee Benefits
    • Employee Conduct
    • Timekeeping & Payroll
  • Security and Compliance
    • Security Controls
      • BC.1.01 - Business Continuity Plan
        • IllumiDesk Business Continuity Plan
        • IllumiDesk Disaster Recovery
        • IllumiDesk Reference Architectures
        • IllumiDesk Handbook listing of DR for Databases
      • BC.1.0.2 - Business Continuity Plan: Roles and Responsibilities
      • BC.1.03 - Continuity Testing
      • BC.1.04 - Business Impact Analysis
        • Business Impact Analysis in the handbook
        • Data Protection Impact Assessment (DPIA) Policy
        • Data Protection Impact Assessments or DPIAs
        • UX Department
        • Triage Operations - Communication about expected automation impact
        • NIST BCP with reference to BIA
      • CFG.1.01 - Baseline Configuration Standard
        • Laptop or Desktop System configuration
        • Configuring New Laptops
        • Security Best Practices
      • CFG.1.03 - Configuration Checks
        • Production Change Requests Policy
      • CM.1.01 - Change Management Workflow
      • CM.1.02 - Change Approval
      • CM.1.03 - Change Management Issue Tracker
      • CM.1.04 - Emergency Changes
      • DM.1.01 - Data Classification Criteria
        • Data Classification Policy
      • DM.2.01 - Terms of Service
        • Application Terms of Use
      • DM.4.01 - Encryption of Data in Transit
        • Deprecate support for TLS 1.0 and TLS 1.1
      • DM.7.03 - Data Retention and Disposal Policy
      • IAM.1.01 - Logical Access Provisioning
        • Access Requests
        • Access Management Process
      • IAM.1.02 - Logical Access De-Provisioning
        • Access Management Process
        • Logical Access Deprovisioning
        • Access Reviews
        • IllumiDesk Offboarding Guidelines
      • IAM.1.04 - Logical Access Review
        • Access Reviews
      • IAM.1.05 - Transfers: Access De-Provisioning
        • Access Control Policy and Procedures
        • Job Transfers
        • Access Change Request
      • IAM.1.06 - Shared Logical Accounts
        • Security Process and Procedures for Team Members
        • Access Management Process
      • IAM.1.08 - New Access Provisioning
        • Access Requests
        • Access Management Process
      • IAM.2.01 - Unique Identifiers
        • Unique Account Identifiers
        • Access Control Policy and Procedures
        • Section on shared accounts in Okta handbook page
        • Access Management Process
      • IAM.2.02 - Password Authentication
      • IAM.2.03 - Multi-factor Authentication
      • IAM.3.02 - Source Code Security
      • IAM.4.01 - Remote Connections
      • IAM.6.01 - Key Repository Access
      • IR.1.01 - Incident Response Plan
      • IR.1.03 - Incident response
      • IR.1.04 - Insurance Policy
      • IR.2.02 - Incident Reporting
      • NO.1.01 - Network Policy Enforcement Points
      • PR.1.01 - Background Checks
      • RM.1.01 - Risk Assessment
      • RM.1.02 - Continuous Monitoring
        • Security Compliance
      • RM.1.04 - Service Risk Rating Assignment
      • RM.1.05 - Risk Management Policy
      • RM.3.01 - Remediation Tracking
      • SDM.1.01 - System Documentation
      • SG.1.01 - Policy and Standard Review
      • SG.2.01 - Information Security Program Content
      • SG.5.03 - Security Roles and Responsibilities
        • Incident Management Roles and Responsibilities
      • SG.5.06 - Board of Director Bylaws
        • Governance Documents
      • SG.5.07 - Board of Directors Security Program Content
        • Audit Committee Agenda Planner
      • SLC.1.01 - Service Lifecycle Workflow
      • SLC.2.01 - Source Code Management
      • SYS.1.01 - Audit Logging
      • SYS.2.01 - Security Monitoring Alert Criteria
      • SYS.2.07 - System Security Monitoring
      • TPM.1.01 - Third Party Assurance Review
      • TPM.1.02 - Vendor Risk Management
      • TRN.1.01 - General Security Awareness Training
        • Security Awareness Training
      • TRN.1.02 - Code of Conduct Training
      • VUL.1.01 - Vulnerability Scans
      • VUL.1.03 - Approved Scanning Vendor
      • VUL.2.01 - Application & Infrastructure Penetration Testing
      • VUL.3.01 - Infrastructure Patch Management
      • VUL.3.02 - End of Life Software
      • VUL.4.01 - Enterprise Protection
      • VUL.5.01 - Code Security Check
      • VUL.6.01 - External Information Security Inquiries
  • VPAT Version 2.3
Powered by GitBook
On this page
  • Control Statement
  • Context
  • Scope
  • Ownership
  • Additional control information and project tracking
  • Policy Reference
  • Framework Mapping
  1. Security and Compliance
  2. Security Controls

IR.1.01 - Incident Response Plan

Control Statement

Incident Response Guidance is available in the Handbook that outlines IllumiDesk's security incident response process. It also provides information to internal and external users on how to report breaches, security and availability failures, incidents, concerns, identified vulnerabilities and other security complaints to appropriate personnel.

Context

The purpose of this control is to ensure IllumiDesk creates, implements, and maintains an effective plan to identify, resolve, and prevent security incidents within its application, systems, and services. By having an organized and continually evolving security incident response plan, IllumiDesk can maintain the availability, reliability, performance, and confidentiality offered to IllumiDesk customers, IllumiDesk team-members, and partners. This control can be tested by first proving that IllumiDesk has sufficient documentation in place for an efficient Incident Response plan. This can include documentation pertaining to the handbook pages, Merge requests, and issues opened in reference to and in adherence to the IR plan. It can then be confirmed that any security incident that was reported (if applicable) followed the IR plan documentation.

Scope

This control applies to all systems within our production environment. The production environment includes all endpoints and cloud assets used in hosting IllumiDesk.com and its subdomains. This may include third-party systems that support the business of IllumiDesk.com.

Ownership

  • Control Owner: Infrastructure

  • Process owner(s):

    • Security Operations

    • Infrastructure

Additional control information and project tracking

Non-public information relating to this security control as well as links to the work associated with various phases of project work can be found in the Incident Response Plan control issue.

Examples of evidence an auditor might request to satisfy this control:

  • Provide copies of the Incident Response pages, which are linked to and described below

  • Provide sample reports and other outputs of the various functions listed below, such as Infrastructure and/or Security incident issues

Policy Reference

Procedures for the identification and management of incidents:

  • Incident management documented in the IllumiDesk Handbook

  • Incident Management for Self-Managed Customers

Procedures for the resolution of confirmed incidents.

  • Security issue triage process

  • Security severity labelling

  • Major Incident Response Workflow

  • Additional documentation on using the panic email and a procedure for the security team's response to those alerts

Key incident response systems:

  • Incident management documented in the IllumiDesk Handbook

Incident coordination and communication strategy:

  • S1 and S2 Incidents. Information about our most critical incident severities.

  • Incident Steps. Defines the steps involved with handling an incident.

  • Communication. Describes communication procedures during an incident.

  • Source code, data, and infrastructure change management

Contact method for internal parties to report incidents

  • Process for engaging security on-call

  • Security operations on-call guide

Support team contact information

  • Incident Management Support

Notification to relevant management in the event of a security breach

  • Security Incident Communications Plan

Provisions to contact support team

  • Support Team function in the handbook

  • Support page contains information to contact the Support team

Production Infrastructure related IR Plan

  • Production infrastructure incidents are documented in the production project

  • The #incident-management Slack channel is used for synchronous incident communication via chat

    • In the channel, the Production-watch app monitors the aforementioned production project and notifies channel participants of the issue

  • The Situation Room permanent Zoom channel is used for synchronous communication via audio/video conference

    • A link to the channel is included in the description for the #incident-management Slack channel

Alert mechanisms:

  • Security Incident and Alert Lifecycle in IllumiDesk

Framework Mapping

  • SOC2 CC

    • CC4.2

    • CC7.3

PreviousIAM.6.01 - Key Repository AccessNextIR.1.03 - Incident response

Last updated 1 year ago