...
Incident Severity | Levels | Characteristics (one or more condition present determines the severity) | Response Time | Incident Manager | Risk Controls | Who to Notify | Post-Incident Report Required* |
---|---|---|---|---|---|---|---|
High | 5,4 |
| 2 hours since identification | One of 3 Senior I.T. managers |
|
| Yes |
Medium | 3,2 |
| 4 hours | One of 3 Senior I.T. managers |
|
| Yes |
Low | 1 |
| Next business day | One of 3 Senior I.T. managers | None |
| No |
N/A | "Not Applicable" - used for suspicious activities which upon investigation are determined not to be an IT security incident. |
All security incidents/data breaches, High Medium and Low, will be logged in our Planfix system for monitoring. We have created a dedicated task and pipeline to keep track of incidents as seen in the below screen shot. All IT team members, and our CTO will be notified when a data breach task is created in Planfix and will be able to follow the progress of the incident through the various stages of this pipeline which is modeled on the notifiable data breaches scheme summary diagram.