Incident Response Policy and SLA template
Incident Response Policy
Purpose
The purpose of this Incident Response Policy is to establish a framework for detecting, responding to, and managing information security incidents effectively. This policy ensures that BTIT can protect its managed application services, minimize the impact of incidents, and maintain compliance with regulatory requirements.
Scope
This policy applies to all employees, contractors, and third-party vendors involved in the management and support of BTIT Managed Application Services.
Policy Statements
1. Incident Detection and Reporting
1.1 Monitoring
Implement continuous monitoring tools and processes to detect potential security incidents.
Utilize automated systems and manual reviews to identify unusual activities or breaches.
1.2 Reporting
Define clear procedures for reporting suspected or confirmed incidents.
Specify a point of contact and communication channel for internal and external reporting.
Ensure all employees are aware of the reporting procedures through regular training and awareness programs.
2. Incident Response Process
2.1 Incident Classification
Classify incidents based on severity and impact, such as low, medium, high, and critical.
Define criteria for each classification level to ensure consistent and accurate assessment.
2.2 Response Plan
Develop and maintain a formal incident response plan that outlines steps for detecting, analyzing, containing, eradicating, and recovering from incidents.
Ensure the response plan includes roles and responsibilities for all involved parties.
Provide a copy of the response plan to clients upon request.
2.3 Communication
Notify affected customers promptly when an incident that may impact the security of their information or interconnected systems is detected or reported.
Maintain regular communication with affected customers throughout the incident response process.
3. Incident Investigation and Resolution
3.1 Evidence Collection
Collect and preserve evidence related to the incident, such as time-stamped audit logs and forensic snapshots of virtual machines.
Provide customers with access to relevant evidence to enable their investigation.
3.2 Regulatory Cooperation
Provide sufficient information to enable customers to cooperate effectively with regulatory bodies, such as the Privacy Commissioner or the Payment Card Industry Security Standards Council (PCI SSC).
3.3 Data and Service Recovery
Define the responsibilities for data and service recovery after an incident has occurred.
Ensure that recovery procedures are aligned with the customer’s requirements and expectations.
4. Post-Incident Review
4.1 Post-Incident Reporting
Share post-incident reports with affected customers to enable them to understand the cause of the incident and make informed decisions about continuing to use the cloud service.
Include details on the incident, response actions, and measures taken to prevent recurrence.
4.2 Lessons Learned
Conduct a thorough review of each incident to identify lessons learned.
Update the incident response plan and processes based on insights gained from the review.
5. Training and Testing
5.1 Staff Training
Provide regular training to staff on incident response and management processes to ensure they respond effectively and efficiently to incidents.
Ensure training programs are updated regularly to reflect new threats and best practices.
5.2 Regular Testing
Test and refine the incident response plan regularly to ensure its effectiveness.
Engage customers in testing exercises to validate the plan and ensure alignment with their expectations.
6. Compliance and Integration
6.1 Policy Alignment
Ensure that incident response and management procedures map to or fit with the internal policies and procedures of customers.
Avoid any actions that might hinder or delay the customer’s ability to manage incidents effectively.
6.2 Insurance, Liability, and Indemnity
Specify in the contract the limits and provisions for insurance, liability, and indemnity for information security incidents.
Ensure customers review liability and indemnity clauses for any exclusions.
Review and Updates
This Incident Response Policy must be reviewed annually or whenever significant changes occur. Updates to the policy will be communicated to all relevant stakeholders.
Service Level Agreement (SLA) Template
1. Introduction
This Service Level Agreement (SLA) outlines the commitments, responsibilities, and performance standards for the delivery of BTIT Managed Application Services.
2. Service Commitments
2.1 Availability
BTIT guarantees a minimum uptime of 99.9% for managed application services.
Scheduled maintenance windows will be communicated in advance and will be scheduled during off-peak hours to minimize disruption.
2.2 Incident Response
BTIT will respond to critical incidents within 1 hour of detection.
Incident resolution will be prioritized based on the severity and impact of the incident.
3. Incident Management
3.1 Detection and Notification
BTIT will monitor services continuously for potential security incidents.
Customers will be notified promptly if an incident that may affect the security of their information or interconnected systems is detected.
3.2 Reporting Channels
Customers can report suspected information security incidents through designated communication channels, including email and phone.
BTIT will provide a specific point of contact for incident reporting.
3.3 Roles and Responsibilities
Define the roles and responsibilities of BTIT and the customer during an information security incident.
BTIT will manage the initial response, investigation, and resolution of the incident.
3.4 Evidence Access
BTIT will provide customers with access to relevant evidence, such as time-stamped audit logs and forensic snapshots, to enable their investigation of the incident.
3.5 Regulatory Cooperation
BTIT will provide sufficient information to enable customers to cooperate effectively with regulatory bodies.
3.6 Data and Service Recovery
BTIT will define which party is responsible for the recovery of data and services after an incident.
3.7 Post-Incident Reporting
BTIT will share post-incident reports with affected customers, detailing the cause of the incident and actions taken.
3.8 Insurance, Liability, and Indemnity
The contract will specify limits and provisions for insurance, liability, and indemnity for information security incidents.
4. Performance Metrics
4.1 Response Time
BTIT will respond to support requests within the following timeframes:
Critical issues: 1 hour
High-priority issues: 4 hours
Medium-priority issues: 24 hours
Low-priority issues: 48 hours
4.2 Resolution Time
Target resolution times will be based on the severity of the issue and the impact on customer operations.
5. Customer Responsibilities
5.1 Accurate Information
Customers must provide accurate and complete information when reporting incidents.
Customers are responsible for maintaining the security of their own systems and networks.
5.2 Cooperation
Customers must cooperate with BTIT during incident investigations and resolution processes.
6. Review and Amendments
This SLA will be reviewed annually or whenever significant changes occur.
Any amendments to the SLA will be communicated to customers in advance.
By adhering to this SLA, BTIT ensures the highest standards of service availability, incident response, and customer support for its managed application services.