Incident Response Plan

Purpose

The purpose of this Incident Response Plan (IRP) is to provide full transparency into Nimbus Logic’s role in detecting cybersecurity incidents, responding to and remediating them, and reducing the risk of recurrence. This IRP also outlines incident response tasks that the Organization seeking certification (OSC) is responsible for.

Scope

The scope of this IRP is specific to the use of Microsoft 365 services as part of the Compliance-as-a-Service (CAAS) product. It is a system-specific IRP and is designed to complement an OSC’s overarching IRP. This document will be updated over time based on evolving agency needs and lessons learned from cyber incidents.

Important Contact Information

Incident Response Team Contacts

Role Name Email Cell Phone
Incident Response Team Lead Jason Smith jsmith@nimbus-logic.com 518-293-0550
Incident Response Team Lead Backup Gregory Rowe greg@nimbus-logic.com 518-331-3572
Incident Responder David Wilming david@nimbus-logic.com  
Incident Responder & Forensic Analyst Chris Denno cdenno@nimbus-logic.com  
Incident Responder Daniel Hurd dhurd@nimbus-logic.com  

Incident Response Team Members & Roles

Role Name Responsibilities
Incident Response Team Lead Jason Smith Coordinates response efforts, maintains response capability
Incident Responder(s) Jason Smith, Gregory Rowe, David Wilming, Daniel Hurd, Chris Denno Detects and contains incidents
Forensic Analyst Jason Smith, Gregory Rowe, Chris Denno Captures and analyzes system images and logs
Recovery Specialist Jason Smith, Gregory Rowe Recovers systems back to pre-incident condition

Nimbus Logic (ESP) Tenant Roles

Role Assignments

This table outlines the assigned Azure roles and their status assigned to the ESP Incident Response Team (Nimbus Logic) leveraging Azure Privileged Identity Management (PIM).

  • Active roles are permanently assigned and always available to the user.
  • Eligible roles require just-in-time (JIT) activation when needed, enhancing security by reducing standing privileges.
Role Category Azure Role Assignment Status
Entra ID Roles Global Reader Active
  Global Admin Eligible
Azure Subscription Roles Owner Eligible
Sentinel Roles Sentinel Reader Active
  Sentinel Contributor Eligible

Responsibilities

Nimbus Logic (ESP) Responsibilities

  • Design, implement, and assess the security of the CAAS solution.
  • Maintain security monitoring and logging capabilities.
  • Provide Sentinel Reader permissions permanently for incident diagnosis.
  • Maintain Global Admin as an eligible role, activated only through Privileged Identity Management (PIM) when necessary.
  • Perform initial triage and analysis on security incidents.
  • Coordinate remediation efforts with OSC Compliance Managers.
  • Confirm Compliance Managers as defined in the by the OSC (User Role Assignments)
  • Maintain an Incident Response Team (IRT) responsible for analyzing and addressing cybersecurity threats.
  • Be sure to work with only Compliance Managers from the OSC in any kind of incident handling.

Organization seeking certification (OSC) Responsibilities

  • Respond to incident alerts and work with Nimbus Logic to confirm false positives.
  • Provide additional context when needed (e.g., user activity validation).
  • Authorize and assist with user or device isolation when required.
  • Maintain access to required Microsoft security and compliance portals.
  • Participate in post-incident analysis and continuous improvement activities.
  • Follow designated escalation procedures and communication protocols, and confirm availability of Compliance Managers during the time of Incident Response.

Incident Response Team (IRT) Responsibilities

  • Execute the four-step NIST incident response life cycle.
  • Maintain communication channels and escalation procedures.
  • Document and review incidents for compliance adherence.
  • Conduct forensic analysis and recommend corrective actions.

Definitions

  • Event: Any observable occurrence in a network or system.
  • Incident: A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices.
  • Threat: The potential source of an adverse event.
  • Vulnerability: A weakness in a system, application, or network that is subject to exploitation or misuse.
  • Incident Handling: The mitigation of violations of security policies and recommended practices.
  • Incident Response Team (IRT): The collaborative teams from the ESP (ESP Incident Response Team) and OSC (Compliance Managers).

Incident Response Plan

This IRP follows the four-step National Institute of Standards and Technology (NIST) incident response life cycle as documented in Special Publication 800-61 Revision 2:

Preparation

Detection & Analysis

Containment, Eradication, and Recovery

Post-Incident Activity

Microsoft Management Portals
Table 1a: Microsoft Management Portals (GCC)

Portal URL
Microsoft 365 Defender Portal https://security.microsoft.com
Defender for Cloud Apps Portal https://portal.cloudappsecurity.com
Azure portal (including Entra ID) https://portal.azure.com
Microsoft 365 Purview Portal https://purview.microsoft.com
Microsoft 365 Admin Center https://admin.microsoft.com

Table 1b: Microsoft Management Portals (GCC High)

Portal URL
Microsoft 365 Defender Portal https://security.microsoft.us
Defender for Cloud Apps Portal https://portal.cloudappsecurity.us
Azure portal (including Entra ID) https://portal.azure.us
Microsoft 365 Purview portal https://purview.microsoft.us/
Microsoft 365 Admin Center https://portal.office365.us/adminportal/

Incident Criticality Assessment
Table 2: Incident Criticality Definitions

Incident Criticality Performance Metrics
Extreme Major impact on departmental outcomes and performance. Requires major additional management effort by Senior Executive to control the impact. Unavailability of agency mission-critical systems including the delivery of Government outcomes. Catastrophic breach and/or loss and/or destruction of agency information containing sensitive and personal information and/or controlled unclassified information.
High Moderate impact on achievement of outcomes and performance. Requires additional management effort by business area, Senior Executive to control the impact.
Medium Minor impact on achievement of outcomes and performance. Requires additional management effort within the business area to control the impact. Some adverse publicity.
Low Insignificant impact on achievement of outcomes and performance.
None No effect to the organization’s ability to provide all services to all users.

Information Impact Categories
Table 3: Information Impact Categories

Impact Category Definition
None No information was exfiltrated, changed, deleted, or otherwise compromised.
Privacy Breach Sensitive personally identifiable information (PII) was accessed or exfiltrated.
Proprietary Breach Unclassified proprietary information, such as protected critical infrastructure information (PCII), was accessed or exfiltrated.
CUI Breach Controlled Unclassified Information (CUI) was changed or deleted.

Incident Containment, Eradication, and Recovery
Table 4: Recoverability Effort Category

Category Definition
Regular Time to recovery is predictable with existing resources.
Supplemented Time to recovery is predictable with additional resources.
Extended Time to recovery is unpredictable; additional resources and outside help are needed.
Not Recoverable Recovery from the incident is not possible (e.g., sensitive data exfiltrated and posted publicly); launch investigation.

Testing


This IRP aligns with NIST 800-171r2 and CMMC 2.0 standards and will be reviewed periodically for compliance updates and process enhancements.