SOP Guide for Pharma

SOP for Containing and Reporting Cybersecurity Incidents

SOP for Containing and Reporting Cybersecurity Incidents

Standard Operating Procedure for Containing and Reporting Cybersecurity Incidents

1) Purpose

The purpose of this SOP is to outline the steps for identifying, containing, and reporting cybersecurity incidents to minimize impact on organizational operations, protect sensitive data, and ensure timely remediation.

2) Scope

This SOP applies to all employees, contractors, and IT personnel within the organization. It covers cybersecurity incidents such as data breaches, malware infections, unauthorized access, phishing attacks, and system vulnerabilities.

3) Responsibilities

4) Procedure

4.1 Identifying Cybersecurity Incidents

  1. Monitor Systems:
    • Use security tools such as firewalls, intrusion detection systems (IDS), and antivirus software to detect anomalies.
  2. less
    Copy code

  3. Recognize Indicators:
    • Be alert to unusual system behavior, such as frequent crashes, slow performance, or unauthorized access attempts.
    • Identify signs of phishing, such as suspicious emails or links requesting sensitive information.
  4. Initial Reporting:
    • Employees must immediately report suspected incidents to the IT team using the Incident Reporting Form (Annexure 1).

4.2 Containing Cybersecurity Incidents

  1. Isolate Affected Systems:
    • Disconnect compromised devices or servers from the network to prevent further spread of the threat.
  2. less
    Copy code

  3. Identify Scope:
    • Determine the extent of the incident by analyzing logs, system activity, and affected devices.
  4. Mitigate the Threat:
    • Deploy antivirus or antimalware tools to remove malicious software.
    • Reset passwords and revoke access for compromised accounts.
  5. Secure Backup Data:
    • Ensure backup data remains unaffected and can be restored if needed.

4.3 Investigating Cybersecurity Incidents

  1. Collect Evidence:
    • Preserve logs, files, and other relevant data for forensic analysis.
  2. less
    Copy code

  3. Analyze Root Cause:
    • Determine how the breach occurred, whether through phishing, software vulnerabilities, or insider threats.
  4. Document Findings:
    • Record all investigative findings in the Cybersecurity Incident Report (Annexure 2).

4.4 Reporting Cybersecurity Incidents

  1. Notify Internal Stakeholders:
    • Inform relevant departments, including management and legal teams, about the incident and its impact.
  2. less
    Copy code

  3. Notify External Authorities:
    • If required, report the incident to regulatory bodies, law enforcement, or cybersecurity agencies.
  4. Communicate with Affected Parties:
    • Notify customers, partners, or employees whose data may have been compromised.

4.5 Post-Incident Actions

  1. Implement Corrective Measures:
    • Patch software vulnerabilities and strengthen access controls to prevent recurrence.
  2. less
    Copy code

  3. Review Policies:
    • Update cybersecurity policies and training programs based on lessons learned.
  4. Monitor Systems:
    • Increase monitoring to ensure the threat has been neutralized and no further breaches occur.

5) Abbreviations, if any

6) Documents, if any

7) Reference, if any

8) SOP Version

Version: 1.0

Annexure

Template 1: Incident Reporting Form

 
Date Time Incident Description Reported By Immediate Action Taken
DD/MM/YYYY 10:30 AM Phishing Email Detected John Doe Reported to IT

Template 2: Cybersecurity Incident Report

 
Incident Date Type of Incident Root Cause Impact Resolution
DD/MM/YYYY Data Breach Compromised Login Credentials 500 Records Exposed Passwords Reset, Systems Secured
Exit mobile version