1906 Incident Response and Reporting
Department of Human Services |
Index: |
POL1906 |
|
Revised: |
06/02/2025 |
||
Next Review: |
06/02/2027 |
Subject: DHS Information Security Policies
Policy
To establish and implement policies and procedures to ensure proper incident response and reporting for DHS information systems. The objective of this policy is to address the considerations that will help to ensure that the DHS IT resources and information systems properly respond to and report incidents concerning DHS information systems and data. Critical to achieving this objective is the implementation of controls that address each of the requirements stated in this policy.
Authority
-
United States Department of Commerce National Institute for Standards and Technology (NIST)
-
United States Internal Revenue Service
-
United States Department of Health & Human Services – Administration of Children and Families (ACF), Office of Child Support Services (OCSS)
-
United States Department of Health & Human Services - Centers for Medicare & Medicaid Services (CMS)
-
Georgia Technology Authority
-
Social Security Administration
-
Federal Bureau Investigation (Criminal Justice Information Services)
References
-
Centers for Medicare & Medicaid Services, Volume II: Minimum Acceptable Risk Standards for Exchanges
-
Georgia Technology Authority Enterprise Information Security Policy
-
Social Security Administration (“SSA”) Electronic Information Exchange Security Requirements and Procedures for State and Local Agencies Exchanging Electronic Information with the Social Security Administration (“TSSR”)
-
ACF/OCSS - Security Agreement
Applicability
The scope of this policy is applicable to all Information Technology (IT) resources owned or operated by DHS. Any information, not specifically identified as the property of other parties, that is transmitted or stored on DHS IT resources (including email, messages, and files) is the property of DHS. All users (DHS employees, contractors, vendors, or others) of IT resources are responsible for adhering to this policy.
Definitions
- Controlled Unclassified Information (CUI)
-
Controlled Unclassified Information (CUI) is information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulations, and government-wide policies but is not classified under Executive Order 13526 or the Atomic Energy Act, as amended.
Responsibilities
DHS shall adopt the Incident Management principles established in the National Institute for Standards and Technology (NIST) Special Publication (SP) 800-61 “Computer Security Incident Handling Guide,” as the official policy for Incident Response. The following subsections outline the incident management standards that constitute DHS policy. Each DHS Business System is then bound to this policy, and shall develop or adhere to a program plan which demonstrates compliance with the policy related the standards documented.
IR-1 Incident Response Policies and Procedures
-
Develop, document, and disseminate to designated agency personnel:
-
All organizational level incident response and reporting policy that:
-
Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
-
Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and
-
-
Procedures to facilitate the implementation of the incident response and reporting policy and the associated controls.
-
-
Designate an agency official to manage the development, documentation, and dissemination of the incident response and reporting policy and procedures; and
-
Review and update the current incident response and reporting:
-
Policy every one (1) year (or if there is a significant change); and
-
Procedures every one (1) year, (or when there is a significant change).
-
IR-2 Incident Response Training
-
Provide incident response training to system users consistent with assigned roles and responsibilities:
-
Within 30 days of assuming an incident response role or responsibility or acquiring system access;
-
When required by system changes; and
-
Annually thereafter; and
-
-
Review and update incident response training content every one (1) year and following major business and system change impacting the CUI environment.
IR-3 Incident Response Testing and Exercise
Test the effectiveness of the incident response capability for the system annually using the following tests: tabletop exercises.
IR-3 (2) Coordination with Related Plans:
Coordinate incident response testing with organizational elements responsible for related plans.
IR-3 (3) Continuous Improvement:
Use qualitative and quantitative data from testing to:
-
Determine the effectiveness of incident response processes;
-
Continuously improve incident response processes; and
-
Provide incident response measures and metrics that are accurate, consistent, and in a reproducible format.
IR-4 Incident Handling
-
Implement an incident handling capability for incidents that is consistent with the incident response plan and includes preparation, detection and analysis, containment, eradication, and recovery; Coordinate incident handling activities with contingency planning activities;
-
Coordinate incident handling activities with contingency planning activities;
-
Incorporate lessons learned from ongoing incident handling activities into incident response procedures, training, and testing, and implement the resulting changes accordingly; and
-
Ensure the rigor, intensity, scope, and results of incident handling activities are comparable and predictable across the organization.
IR-4 (1) Automated Incident Handling Processes:
Support the incident handling process using automated mechanisms.
IR-4 (3) Continuity of Operations:
Identify classes of incidents and take the following actions in response to those incidents to ensure continuation of organizational missions and business function:
-
Graceful degradation;
-
Information system shutdown;
-
Fall back to manual mode/alternative technology whereby the system operates differently;
-
Employing deceptive measures;
-
Alternate information flows; or
-
Operating in a mode that is reserved solely for when systems are under attack."
IR-6 Incident Reporting
-
Require personnel to report suspected incidents to the organizational incident response capability immediately upon discovery; and
-
Report incident information immediately, but no later than 24 hours after identification of a possible issue involving FTI to the appropriate special agent-in-charge and the IRS Office of Safeguards.
IR-7 Incident Response Assistance
Provide an incident response support resource, integral to the organizational incident response capability, that offers advice and assistance to users of the system for the handling and reporting of incidents.
IR-8 Incident Response Plan
-
Develop an incident response plan that:
-
Provides the organization with a roadmap for implementing its incident response capability;
-
Describes the structure and organization of the incident response capability;
-
Provides a high-level approach for how the incident response capability fits into the overall organization;
-
Meets the unique requirements of the organization, which relate to mission, size, structure, and functions;
-
Defines reportable incidents;
-
Provides metrics for measuring the incident response capability within the organization;
-
Defines the resources and management support needed to effectively maintain and mature an incident response capability;
-
Addresses the sharing of incident information;
-
Is reviewed and approved by designated agency officials at a minimum on an annual basis; and
-
Explicitly designates responsibility for incident response to agency-defined personnel.
-
-
Distribute copies of the incident response plan to authorized incident response personnel and agency personnel with access to CUI;
-
Update the incident response plan to address system and organizational changes or problems encountered during plan implementation, execution, or testing;
-
Communicate incident response plan changes to authorized incident response personnel and agency personnel with access to CUI;
-
Protect the incident response plan from unauthorized disclosure and modification.
IR-8 (1) Breaches:
Include the following in the Incident Response Plan for breaches involving personally identifiable information:
-
A process to determine if notice to individuals or other organizations, including oversight organizations, is needed;
-
An assessment process to determine the extent of the harm, embarrassment, inconvenience, or unfairness to affected individuals and any mechanisms to mitigate such harms; and
-
Identification of applicable privacy requirements.
IR-9 Information Spillage Response
Respond to information spills by: a. Assigning designated incident response agency personnel with responsibility for responding to information spills; b. Identifying the specific information involved in the system contamination; c. Alerting designated agency officials of the information spill using a method of communication not associated with the spill; d. Isolating the contaminated system or system component; e. Eradicating the information from the contaminated system or component; f. Identifying other systems or system components that may have been subsequently contaminated; and g. Performing the following additional actions: Report incident information to the appropriate special agent-in-charge and the IRS Office of Safeguards.
-
FOR SOCIAL SECURITY ADMINISTRATION DATA
If the agency suspect a breach or loss of PII, or a security incident which includes SSA-provided data, they must notify the State official responsible for Systems Security designated in the agreement. That State official or delegate must then notify the SSA Regional Office Contact or the SSA Systems Security Contact identified in the agreement. If, for any reason, the responsible State official or delegate is unable to notify the SSA Regional Office or the SSA Systems Security Contact within one hour of discovering the incident, the responsible State Agency official or delegate must report the incident by contacting SSA’s National Network Service Center (NNSC) toll free at 1-877-697-4889 (select “Security and PII Reporting” from the options list). The EIEP will provide updates as they become available to SSA contact, as appropriate. Refer to the worksheet provided in the agreement to facilitate gathering and organizing information about an incident.
Evaluation
The Office of Information Technology (OIT), upon recommendation of the DHS Chief Information Security Officer (CISO), evaluates this policy annually by:
-
Comparing its content and intent to evolving regulatory compliance standards imposed upon the Agency, such as, IRS 1075, NIST 800-53, and CMS MARS-E.
-
Addressing any deficiencies or gaps discovered during periodic audits conducted by Georgia DOAA or other regulatory bodies, such as, IRS, CMS, SSA, FBI, etc.