Incident Response Policy

POLICY STATEMENT

This policy establishes rules that govern the response to security incidents that impact Vanderbilt University’s information and technology systems. 

REASON FOR POLICY

The Incident Response Policy (“IR Policy”) provides the structure and activities required to effectively respond to an information security incident and minimize negative impact to the confidentiality, integrity, and availability of institutional data and its information technology (IT) assets.

This IR Policy cannot anticipate and provide guidance for all potential information security incidents. Vanderbilt leadership and incident responders must consider the current situation, business impact, and security needs of the university and balance those against the guidance provided by the IR Policy.

The Office of Cybersecurity will review this policy annually with feedback collected from representatives across VU to understand new concerns and dynamic requirements to best serve the VU community and adhere to VU Information Security Principles listed in the Information Security Policy.  

SCOPE

This policy applies to the entire Vanderbilt University community including, but not limited to, faculty, staff, students, contractors, post-doctoral fellows, temporary employees, and volunteers (collectively called “VU Community Members”). All IT assets used to collect, transmit, process, store, or host institutional data are in-scope for this policy 

POLICY

The Chief Information Security Officer (CISO) shall oversee and is responsible for institutional incident response strategy and activities. 

A. INCIDENT REPORTING

A Security Event is an observable activity in a system or network that warns of potential harm to Vanderbilt University institutional data or IT Assets. Not all security events become security incidents.  

VU Community Members must immediately report security events to the Office of Cybersecurity by phone at 615-343-9999 or submit a ticket online.  

Examples of security events to report include, but are not limited to:  

  • Compromised user account; 
  • Compromised endpoint (e.g., malware, keylogger, ransomware, etc. detected on a user’s desktop, laptop, or other device); 
  • Compromised server (e.g., malware, unauthorized use/access, unusual activity); 
  • Compromised Vanderbilt-owned websites (e.g., website defacement); 
  • Compromised infrastructure (e.g., router, switch, firewall, ICS device); or 
  • Unauthorized exposure of sensitive data (especially high risk data types). 

While awaiting triage by the Office of Cybersecurity, stop using the device in question immediately. Do not turn off the device as this could result in the loss of valuable forensic evidence. Do not attempt to investigate or remediate the issue as this could damage valuable forensic data.

B. INCIDENT RESPONSE PHASES

In contrast to a security event, a Security Incident is harm that has been realized or will be if not immediately addressed. If a security event is a fire alarm, a security incident is smoke or a fire. 

The Office of Cybersecurity will work quickly to analyze detected alerts and reported events. Only Cybersecurity can confirm if an event is an actual incident. If confirmed, they will follow the VU Incident Response Plan (IR Plan).  

The Office of Cybersecurity is responsible for establishing and maintaining an IR plan that outlines incident response strategy and steps. This plan will align with the most recent version of NIST Special Publication 800-61: Computer Security Incident Handling Guide

Figure 1. NIST 800-61 Incident Response Lifecycle

Incident Response Lifecycle

The IR Plan outlines: 

  • VU’s organizational approach to incident response; 
  • How VU determines, categorizes, prioritizes, and escalates security incidents. This outline aligns with the institutional Risk Classification Matrix; and  
  • VU’s communication and hand-off strategy with other campus offices and programs (e.g., Operational Continuity Management, Special Situations Team). 

The IR Plan is an internal, confidential document that the VU Computer Incident Response Team (VU CSIRT) reviews regularly, no less than annually. Section D below, details the VU CSIRT purpose and membership. On at least an annual basis, the Office of Cybersecurity will coordinate a test exercise (i.e., a table top) to practice preparedness, exercise the IR Plan, and measure its effectiveness. 

The VU IR Plan is a parent, institutional document. Should they exist, any school/department/unit level IR Plans that are specific for that area must align with VU IR plan and IR policy (e.g., area specific IR Plan for Controlled Unclassified Information, Payment Card Information IR Plan). 

In response to an incident that poses an imminent threat to the university, the Office of Cybersecurity is authorized to take necessary steps to contain and/or disrupt malicious activity including, but not limited to, expediting changes to IT Assets, monitoring/retrieving relevant system records, and disconnecting systems from the network. At all times, the Office of Cybersecurity team will take careful consideration to minimize interruption to the operations of VU.  

VU Community Members are required to fully cooperate in support of security incident investigations, consistent with the Appropriate Use of Technology Assets Policy. Cooperation may require actions such as resetting passwords and granting the Office of Cybersecurity access to a compromised device for forensic analysis. 

The CISO, in coordination with the VU CSIRT and VUIT Senior Leadership, may involve external firms to facilitate incident response processes/phases.

C. INCIDENT COMMUNICATION

Information regarding security incidents is Level 2 Institutional Use Only, at a minimum, and incident knowledge is limited based on a need to know. The Office of Cybersecurity will communicate updates promptly to appropriate individuals and groups. The CISO shall communicate and escalate security incidents to appropriate governance bodies, campus offices and programs according to the IR Plan.  

Where appropriate or necessary, the VU CSIRT, along with the Office of the General Counsel (OGC), will determine and coordinate reporting requirements to individuals and/or external entities, such as law enforcement or government agencies.

D. VU COMPUTER SECURITY INCIDENT RESPONSE TEAM (VU CSIRT)

The CISO is responsible for establishing and managing the VU CSIRT. Membership includes cross-campus representatives to provide a robust, effective, and cross-disciplinary business response to a security incident. The VU CSIRT coordinates communications to affected individuals and/or external entities. Both core and consultant members may be brought in as needed. Core membership includes the following: 

  • Chief Information Security Officer (CISO) 
  • Chief Information Officer (CIO) 
  • Risk and Insurance representative 
  • Finance representative 
  • Communications representative 
  • Enterprise Risk Management representative 
  • Disaster Recovery representative 
  • General Counsel representative 
  • Public Safety representative 

E. IR RESPONSIBILITY SUMMARY

Incident response activity

Responsibility

Report security events to VUIT

All members of the VU community

Cooperate during security investigations

All members of the VU community

Establish, maintain, and test the VU IR Plan

Office of Cybersecurity

Detect and analyze security events

Office of Cybersecurity

Confirm security incidents, determine classification, and contain/eradicate security threats

CISO and Office of Cybersecurity

Escalate security incidents

CISO

Determine and manage reporting requirements (internal and external)

VU CSIRT and OGC

Develop and communicate lessons learned

CISO and Office of Cybersecurity

Activate cyber liability insurance

Risk and Insurance Management

EXCEPTIONS

On a rare occasion, a security policy exception may be considered depending on the impact to the university mission and security risk(s) introduced. Exception requests must be submitted to the VU Chief Information Security Officer for evaluation and risk assessment. The CISO, or a delegate, will grant or deny the request based on the level of risk. 

ENFORCEMENT

Any VU community member that violates this policy may be subject to disciplinary action up to and including termination. The Chief Information Security Officer will refer violations to university units (e.g., Student Accountability Office, Human Resources, and Deans) as appropriate. Violations may also constitute a violation of state or federal law and individuals shall be accountable as applicable. 

DEFINITIONS

  • All Terms

    Compromise: Unauthorized access of data, applications, services, networks, and/or devices often through bypassing security mechanisms. 

    Incident Response: A process to quickly identify a cyber-attack, minimize its effects, contain damage, and remediate the cause to reduce risk of future incidents. 

    Incident Response Plan (IRP): The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of a malicious cyber-attacks. 

    Information Technology (IT) Asset: Devices, systems, and applications that enable the organization to achieve university business, academia, and research. IT Assets include but are not limited to hardware assets (e.g., servers, laptops, printers, IoT devices), software assets (e.g., operating systems, applications, cloud components). 

    Institutional Data: Consistent with the Data Classification Policy, institutional data is all data maintained to support delivery of Vanderbilt’s central mission of scholarly research, informed and creative teaching, and service to the society at large. For the purposes of this policy, this includes data to support Vanderbilt’s auxiliary services as well as research and teaching data.   

    Security Event: Observable, adverse activity in a system or network that could potentially jeopardize Vanderbilt University digital institutional data or IT Assets. 

    Security Incident: A security event or set of events that results in damage or imminent risk to IT assets and operations. 

    VUCSIRT: Computer Security Incident Response Team made up of administrative representatives to provide a business response to IT security incidents. 

PROCEDURES

To report a security event or incident, call 615-343-9999 or submit a ticket 

FREQUENTLY ASKED QUESTIONS

  • What details should I include in an incident report?

    The details needed for investigation will vary depending on the type of event. At a minimum, include these details, as applicable, and be readily available for follow-up questions: 

    • When you first noticed the anomaly(ies)
    • Device type and hostname 
    • User account name 
    • IP address 
    • Operating System version 
    • Type of data on the device 
    • Best way to contact you for follow-up 

ADDITIONAL CONTACTS

ContactEmail
Office of Cybersecuritycybersecurity@vanderbilt.edu