IT Security Incident Response Policy

PRINT DISCLAIMER: Official version of this document is accessible in the online policy library at https://policyoffice.ku.edu/. Printed copies may not reflect the most recent updates.

DOCUMENT TYPE:

Policy

PURPOSE:

The Information Technology (IT) Security Incident Response Policy defines the responsibilities of KU Lawrence campus and all reporting units staff when responding to or reporting security incidents.

APPLIES TO:

This policy applies to members of the Computer Security Incident Response Team (CSIRT) and those members of the University administration involved in security incident response.

CAMPUS:

Edwards, Lawrence, Juniper Gardens, Parsons, Topeka, Yoder

POLICY STATEMENT:

The IT Security Incident Response Policy defines the responsibilities of KU Lawrence campus staff when responding to or reporting security incidents. It delineates roles within the Computer Security Incident Response Team (CSIRT) and outlines which members of University administration should be involved in different types of security incidents.

Roles and responsibilities:

IT Security Officer—The IT Security Officer is responsible for assessing the initial scope of a security incident, assembling the Enterprise Incident Management Team, and appointing the Incident Manager.

Incident reporting—All members of the University community are required to report actual or suspected security incidents. All suspected security incidents should be reported to the KU Customer Service Center at 785-864-8080 or itcsc@ku.edu.

Incident manager—This role is designated by the IT Security Officer and will lead the response to the incident. This is a technical role and will coordinate the work of log collection, evidence preservation, and analysis activities.

Enterprise Incident Management Team:

When a breach of Category 1 data has been declared, the following University administration roles will be added to the incident response team:

  • Senior administrator for impacted unit(s)
  • Chief Information Officer
  • IT Security Officer
  • Representative from the Office of General Counsel
  • Director of Security
  • Director of Strategic Communications
  • Others on an as-needed basis

The Enterprise Incident Management Team will work with the Director of Strategic Communications to determine when and how to inform individuals outside the EIMT regarding the incident.

Members of the Enterprise Incident Management Team and all IT staff shall receive annual incident response training. Tabletop exercises recreating a significant security incident will be conducted at minimum every two years.

Incident Severity Levels:

Incident response will be addressed based on the severity of the incident. Incident severity takes several factors into account: sensitivity of the data involved, number of end users impacted, and its overall impact on the ability of the University to fulfill its mission. Incident severity also will be used to determine who manages an incident, who is informed about an incident, and the extent and immediacy of the response to the incident.

High:

A security incident will be considered “high” if any of the following characteristics are present:

I. Threatens to impact (or does impact) systems critical to the University’s ability to function normally. This includes but is not limited to: email, courseware, human resources, financials, internet connectivity, or portions of the campus network

II. Poses a serious threat of financial risk or legal liability

III. Threatens to expose (or does expose) Category 1 data as defined by the Data Classification Policy

IV. Threatens to propagate to or attack other networks, or organizations internal or external to the University

V. Terroristic threats or other threats to human life or property when received by the IT Security Office

Medium:

A security incident will be considered “medium” if any of the following characteristics are present:

I. Threatens to impact (or does impact) a significant number of systems or people. The University can still function, but a group,  department, unit, or building may be unable to perform its mission

II. Systems impacted contain only Category 2 and/or Category 3 data

III. Impacts a non-critical system or service

Low:

Low severity incidents have no characteristics from the “medium” or “high” categories and may include the following:

I. Only a small number of people or systems are impacted

II. Systems impacted contain only Category 3 data

III. Little to no risk of the incident spreading or impacting other organizations or networks

Incident Response Summary Table:

The following table summarizes how IT security incidents will be handled based on severity. It includes response times, who will manage each type of incident, and reporting requirements.

Incident Severity Response Time Incident Manager Who to Notify Incident Report Required?
High Immediate IT Security Officer
  • IT Security Officer
  • CIO
  • Unit Administrator (Vice Provost, Dean, etc)
  • General Counsel
  • KU Director of Security
  • Others on a need-to-know basis
Yes
Medium 4 hours IT Security Officer or
Incident Response lead (ITSO)
  • IT Security Officer
  • CIO
  • Unit Administrator (Vice Provost, Dean, etc)
  • General Counsel
  • KU Director of Security
  • Others on a need-to-know basis
If requested by IT Security Officer,
CIO, or other administrator
Low Next business day Incident Response lead (ITSO)
  • IT Security Officer
  • CIO
  • KU Director of Security
  • Others on a need-to-know basis
No

CONSEQUENCES:

Failure to report an information security incident may subject the user to disciplinary action including, but not limited, to suspension of the user’s access to electronic information resources. Users also should be aware of other possible consequences under University or Kansas Board of Regents policies and federal, state, or local laws, particularly those related to computer crime and copyright violation.

CONTACT:

Chief Information Officer
1001 Sunnyside Ave.
Lawrence, KS 66045
(785) 864-4999
kucio@ku.edu

APPROVED BY:

Office of the Provost & Executive Vice Chancellor

APPROVED ON:

2018-05-22

EFFECTIVE ON:

2018-05-22

REVIEW CYCLE:

Annual (As Needed)

RELATED STATUTES, REGULATIONS, AND/OR POLICIES:

Server Hosting Policy

Data Classification and Handling Policy

Information Technology Security Policy

Policy 7230 - Enterprise Security Policy

Policy 7230A - Default Security Requirements

DEFINITIONS:

Security incident:

A security incident is defined as any actual or suspected event that may adversely impact the confidentiality, integrity, or availability of data or systems used by the University to process, store, or transmit that data. Examples of events that could constitute a security incident include:

  • Unauthorized access to data by an outsider or insider not authorized to access that data
  • An endpoint (desktop, laptop, server, or mobile device) infected by malware. “Malware” is a broad category encompassing Trojans, worms, viruses, ransomware, and other malicious programs
  • Reconnaissance activities such as scanning the network for security vulnerabilities when scans are performed by outsiders or insiders not authorized to perform such scans
  • Denial of Service attacks (performed by outside or inside entities)
  • Web site defacements
  • Violations of KU IT security policies
  • Unpatched vulnerabilities on systems connected to the KU network
  • Discovery of an unregistered or non-centralized server in violation of the Server Hosting Policy.

CHANGE HISTORY:

03/26/2025: Migration to TeamDynamix from Drupal.
10/11/2024: Updated broken links.
05/22/2018: Uploaded new policy into Policy Library.

Was this helpful?
0 reviews
Print Article

Related Articles (4)

Information is a valuable University asset and is critical to the mission of teaching, research, and service to Kansans.Determining how to protect and handle information depends on a consideration of the information’s type, importance, and usage.Classification is necessary to understand which security practices should be used to protect different types of information. The more protected the information needs to be, the more practices are required.
To provide the requirements for processing e-commerce transactions and any acceptance of credit card payments by administering entities for the University of Kansas Lawrence campus and its reporting units; to establish protocols to reduce the risk of exposure of cardholders’ personal financial information when such information is processed electronically through an e-commerce transaction; and to subject all e-commerce transactions to mandatory compliance with the Payment Card Industry (PCI) Data
This Information Security Policy (“Policy”) defines the security requirements that everyone who works or studies at KU Lawrence campus and all reporting units is expected to be familiar with and consistently follow. These security measures are set forth to avoid problems that affect the Confidentiality, Integrity, and Availability of information and systems at the University.
To ensure the registration and collection of accurate information about all servers owned, operated or housed by the University of Kansas Lawrence campus and all reporting units and affiliated organizations, or servers that store data belonging to the University regardless of their location. This policy also describes the criteria for centralization of these systems into centrally administered data centers.