Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Every employee and user of any Tekai information resources has responsibilities toward the protection of the information assets. The table below establishes the specific responsibilities of the incident responder roles.

Response Team Members

Role

Responsibility

IncidentManager

The Incident Manager is the primary and ultimate decision maker during the response period. The Incident Manager is ultimately responsible for resolving the incident and formally closing incident response actions. See Appendix A for Incident Manager contact information.These responsibilities include:Ensuring the right people from all functions are actively involved asappropriateCommunicating status updates to the appropriate person or teams at regular intervalsResolving incidents in the immediate term Determining necessary follow-up actionsAssigning follow-up activities to the appropriate peoplePromptly reporting incident details which may trigger breach reporting, in writing to the COO

IncidentResponseTeam

The individuals who have been engaged and are actively working on the incident. All members of the IRT will remain engaged in incident response until the incident is formally resolved, or they are formally dismissed by the Incident Manager.

Engineers

Qualified engineers will be placed into the on-call rotation and may act as the Incident Manager (if primary resources are not available) or a member of the IRT when engaged to respond to an incident. Engineers are responsible for understanding the technologies and components of the information systems, the security controls in place including logging, monitoring, and alerting tools, appropriate communications channels, incident response protocols, escalation procedures, and documentation requirements. When Engineers are engaged in incident response, they become members of the IRT.

Users

Employees and contractors of Tekai. Users are responsible for following policies, reporting problems, suspected problems, weaknesses, suspicious activity, and security incidents and events.

Customers

Customers are responsible for reporting problems with their use of Tekai services. Customers are responsible for verifying that reported problems are resolved.

LegalCounsel

Responsible, in conjunction with the CEO and executive management, for determining if an incident presents legal or regulatory exposure as well as whether an incident shall be considered a reportable breach. Counsel shall review and approve in writing all external breach notices before they are sent to any external party.

ExecutiveManagement

Responsible, in conjunction with the CEO and Legal Counsel, for determining if an incident shall be considered a reportable breach. An appropriate company officer shall review and approve in writing all external breach notices before they are sent to any external party.Tekai shall seek stakeholder consensus when determining whether a breach has occurred. The Tekai CEO shall make a final breach determination in the event that consensus cannot be reached.

Management Commitment

Tekai management has approved this policy and commits to providing the resources, tools and training needed to reasonably respond to identified security events and incidents with the potential to adversely affect the company or its customers.

...

Any known violations of this policy should be reported to the COO. Violations of this policy may result in immediate withdrawal or suspension of system and network privileges and/or disciplinary action in accordance with company procedures up to and including termination of employment.

Version

Date

Description

Author

Approved by

1.0

01.03.2025

First Version

Lucas


Appendix A - Contact Information

Contacts for IT and Engineering Management as well as executive staff and can be found Elia Elenius, COO: info@tekai.vn, +358 40 680 2552

Ossi Rajuvaara, Principal Engineer: info @tekai.vn, +358 40 519 6276

Hieu Nguyen, IT Manager: hieu@Tekai.com

Appendix B - Incident Collection Form

General Information

Incident Detector's Information

Name:

 

Date and Time Detected:

 

Title:




Phone:

 

Location Incident Detected From:

 

E-mail:




Additional Information:




 





Incident Summary

Type of Incident Detected:

Denial of Service

Unauthorized Use

Espionage

Probe

Hoax

Malicious Code

Unauthorized Access

Other:



Incident Location:





Site:





Site Point of Contact:





Phone:





Email:





How was the Incident Detected:





Additional Information:






Location(s) of affected systems:



Date and time incident handlers arrived at site:



Describe affected information system(s) (one form per system is recommended):



Hardware Manufacturer:



Serial Number:



Corporate Property Number (if applicable):



Is the affected system connected to a network?

Yes

No

Describe the physical security of the location of affected information systems (locks, security alarms, building access, etc.):



Isolate affected systems:



Approval to removal from network?

Yes

No

If YES, Name of Approver:



Date and Time Removed:



If NO, state the reason:



Backup of Affected System(s):



Last System backup successful?

Yes

No

Name of persons who did backup:



Date and time last backups started:



Date and time last backups completed:



Backup Storage Location:



Incident Eradication:



Name of persons performing forensics:



Was the vulnerability (root cause) identified:

Yes

No

Describe:



How was eradication validated: