S 6.61 Escalation strategy for security incidents

Initiation responsibility: IT Security Officer, Top Management

Implementation responsibility: Head of IT, IT Security Officer

After the responsibilities for security incidents have been specified (see S 6.59 Specification of responsibilities for dealing with security incidents) and all those concerned have been informed of the procedures and reporting paths (see S 6.60 Specification of reporting paths for security incidents), the next step is to determine how to proceed once the reports are received. An escalation strategy must be formulated for this purpose. The people responsible for incident management and information security management should work together during the development of the escalation strategy. This is necessary to efficiently and effectively utilise any methods and procedures already existing in the organisation (see S 6.124 Specification of where security incident handling overlaps with incident management).

The person who receives a report of a security incident must first examine and assess the report (see also S 6.63 Investigation and assessment of a security incident). If the incident is actually a security incident, then additional measures must be taken. The following questions arise in this case:

The answers to these questions are to be documented in an escalation strategy, and the employees must be informed of the escalation strategy.

In order for the persons responsible to be able to process the security incidents after their detection and registration without losing any time, the escalation strategies, escalation contacts, and escalation paths must be defined in advance. It is recommended to synchronise them with the escalation procedures of the persons responsible for incident management and with emergency management (see also S 6.124 Specification of where security incident handling overlaps with incident management).

There are two basic types of escalation, functional escalation and hierarchical escalation.

Functional escalation is initiated by incident management when no appropriate solution, for example in the form of a checklist (matching scenario), is available in first level support as an initial solution or when the matching scenario in the escalation path requires additional people with the corresponding authorisations to become involved. Security management should also be involved regularly according to the same conditions. The incident should be escalated immediately to security management in cases where it is suspected a security incident has occurred for which first level support does not have a matching scenario available. For this reason, first level support should have a copy of the current escalation strategy available.

Hierarchical escalation should be initiated when the following applies:

It is also necessary to clearly define the escalation response and escalation activities expected in order to plan the escalation strategy instance and to ensure the escalation plan does not only have an informative character. All escalations performed must be clearly documented.

The escalation strategy can be created in three steps:

Step 1: Specification of the escalation paths

Who is responsible for handling security incidents was specified in safeguard S 6.59 Specification of responsibilities for dealing with security incidents. The specification of the escalation path must also define who will pass a given report on to whom. This can be illustrated quite simply using a digraph (directed graph). The graph should take the regular escalation paths as well as paths in case of a substitution into account.

Example:

Reporting paths for handling security incidents
Figure: Reporting paths for handling security incidents

Step 2: Decision-making aids for escalation

In this step, you must first determine which cases require immediate escalation without any further examination or assessment. An example of such a list is shown in the table below:

Event Persons to be informed immediately
Infection with a computer virus IT Security Officer, Administrator
Fire Gatekeepers, Fire Safety Engineer, fire department
Deliberate acts and suspected criminal activity IT Security Officer
Suspicion of corporate espionage IT Security Officer, board of directors
The need to call in the police and criminal prosecution authorities Board of directors
Damage threatening the existence of the organisation Board of directors, Emergency Officer, and head of the crisis team

Table: Who needs to be informed and when they need to be informed

Afterwards, it must be specified when the other cases need to be escalated. Possible reasons for escalation include the following:

Step 3: Type and method of escalation

In this step, it must be specified how the next higher link in the escalation chain needs to be informed. Possible methods for this purpose include the following:

If tools such as ticket systems are used for escalation, then these tools must be checked to ensure that they will also be available during a security incident or an emergency, so that it is also possible to process confidential information with them.

Likewise, it must be specified when the report needs to be submitted. Examples include:

When specifying the criteria determining when the reports need to be submitted, the functional and hierarchical escalation definitions (see above), among others, can be a useful aid.

This escalation strategy should be provided to all possible recipients of reports on security incidents in order to enable a fast response. Application of the escalation strategy and the use of the reporting paths must be practised in exercises. Such exercises also help the participants to obtain the necessary routine, which then helps to reduce the level of stress in crisis situations. Since the reporting paths and assessments of events are subject to constant change, the escalation strategy must be checked and updated regularly, but at least once per year.

In general, action must be taken quickly to contain a security incident. It may be necessary to call in employees from other projects or even call them in outside of normal working hours. For this reason, it is also necessary to specify how the additional work will be dealt with and how the on-call service will be organised (see also S 6.59 Specification of responsibilities for dealing with security incidents).

Review questions: