ODG/G4.12a Government guideline on cyber security ISMF Guideline 12a Cyber Security Incident Reporting Scheme BACKGROUND Reporting cyber security incidents is a source of intelligence information that assists in the development of a greater understanding of any threats to South Australian Government assets. A holistic picture of the cyber threat environment can be used to assist other at risk agencies as well as aid in developing new policies, procedures, techniques and training measures to help prevent future incidents. The Cyber Security Incident Reporting Scheme is aimed at helping gain a greater understanding of all incidents that are impacting, or have the potential to impact, SA Government assets. GUIDANCE This guideline has been developed to assist agencies understand the Cyber Security Incident Reporting Scheme and implement it in to their agency’s internal processes. This document should be read in conjunction with ISMF Standard 140. Emergency Management Act (2004) State Emergency Management Plan [SEMP] Protective Security Management Framework [PSMF] Information Security Management Framework [ISMF] ICT Support Plan Cyber Security Incident Reporting Scheme (ISMF Standard 140) ISMF Guideline 12a – Cyber Security Incident Reporting Scheme (This Document) Figure 1 - Document relationship diagram ISMF Guideline 12a What is the Cyber Security Incident Reporting Scheme? As the Control Agency for ICT Failure, the Department of the Premier and Cabinet1 is tasked with the control and coordination of whole-of-government operational responses to cyber incidents. The Cyber Security Incident Reporting Scheme assists the Department fulfil this role. This scheme is a replacement for the previous Notifiable Incident system and is based on similar incident reporting systems used within the other Australian government jurisdictions and draws on the principles of the international standard for Information Security Incident Management (ISO/IEC 27035). All South Australian Government agencies and applicable suppliers have a requirement to report cyber security incidents and events which disrupt or are likely to disrupt ICT services in the South Australian Government to the Watch Desk of the Control Agency for ICT Failure (Watch Desk). “This scheme does not replace an agency’s internal incident management processes….” Does the Cyber Security Incident Reporting Scheme replace my agency’s incident management processes? The Scheme does not replace an agency’s internal incident management processes and procedures. The Scheme runs in parallel and compliments existing agency arrangements to provide a holistic picture of the threat environment for government systems, as well as allowing the Watch Desk to provide assistance to other agencies who may also be at risk. Why is there a need for the Cyber Security Incident Reporting Scheme? By being adequately informed the SA Government, can undertake a number of preventative or response measures, including: Notifying agencies of current threats that they need to be aware of and measures they can take to mitigate these threats. Developing new policies, procedures, techniques and training measures to help prevent future incidents. Implementing additional technical preventative measures such as blocking or filtering. Coordinating and prioritising government resources to investigate or respond to significant or multi-agency incidents. Reporting the information to relevant national resources and intelligence services. Providing regular reports to relevant governance committees on quantity and type of incidents occurring. Feedback to agencies via ad-hoc Security Bulletins and regular newsletters outlining the types of Events and Incidents occurring within the SA Government ICT environment. The Control Agency for ICT Failure and the Office for Digital Government is committed to working with agencies to help ensure that the Cyber Security Incident Reporting Scheme improves the government’s security posture as well as provides value to all relevant parties. 1 The Office for Digital Government fulfils the role of the Control Agency for ICT Failure on behalf of the Department of the Premier and Cabinet. Government guideline on cyber security Cyber Security Incident Reporting Scheme v 1.1 Page 2 of 11 ISMF Guideline 12a What is a Cyber Security Incident? The Cyber Security Incident Reporting Scheme uses two key definitions that must be considered: Cyber Security Event: An identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of controls, or a previously unknown situation that may be security relevant. Cyber Security Incident: A single or a series of unwanted or unexpected Cyber Security Events that have a significant probability of compromising business operations and threatening information security. Figure 2 - Incidents make up only a small portion of Cyber Security Events. All Agencies are responsible for reporting Cyber Security Events to the Watch Desk. A Cyber Security Event being identified will not necessarily mean that an attempt has been successful or that there are any consequences for the security of the government’s information or cyber assets - not all Cyber Security Events will be classified as Cyber Security Incidents. The Watch Desk will make an assessment at the time of an Event being reported. The reporting agency will aid in the assessment process to determine whether the Event constitutes a Cyber Security Incident. If it is assessed as an Event then nothing further will be required of the agency, however, if it is determined that an Incident then additional follow up activities will be required (refer Figure 4 below for full workflow). Cyber Security Events Cyber Security Incidents Figure 3 - Relationship of objects in the Cyber Security Incident chain Causes Unwanted or unexpected action Threat Exploits Vulnerability Occurrence of Cyber Security Event Exposes Assessed as Cyber Security Incident Implications on information security Government Information Asset Diagram adapted from ISO/IEC 27035: Information Technology - Security techniques - Information security incident management Government guideline on cyber security Cyber Security Incident Reporting Scheme v 1.1 Page 3 of 11 ISMF Guideline 12a What should or should not be reported? Not all unwanted or unexpected actions are going to result in the occurrence of a Cyber Security Event nor are they going to of interest for reporting or recording purposes. The following is examples of the types of occurrences that the Watch Desk is less likely to be interested in: Table 1 - Examples of what does not need to be reported Non-ongoing malware or virus activity on a standard user device that is easily remediated. (e.g. single case of a user device with a virus that is automatically detected, and cleaned by the existing controls). Short term outages on non-critical services. (e.g. non business critical machine has an unplanned outage which is easily recovered from within recovery time objectives). Single cases of standard spam e-mails without any malicious links or attachments. (e.g. marketing or advertisement spam, or “Nigerian” scams without any malicious links or attachments). Normal background activity detected in logs. (e.g. standard, regular activity seen in log managers or SIEM systems). Users breaching agency specific policies or guidelines for appropriate usage of government internet. (e.g. single user browsing inappropriate, but not illegal or malicious, websites during work time). Unexploited vulnerability in non-critical information systems, services or networks. (e.g. unpatched vulnerabilities of desktop machines which have not been exploited). The following are examples of the types of occurrences that the Watch Desk is interested in and should be reported. “If in doubt, report it. It is better to over report than under report.” Table 2 - Examples of what should be reported Suspicious or seemingly targeted emails with attachments or links. Compromise or corruption of official information. Data breaches. Theft or loss of electronic devices that have processed or stored government information. Intentional or accidental introduction of malware or potentially unwanted programs to a network. Denial of service attacks. Suspicious or unauthorised network activity. Reduced capacity or failure of government systems, services or networks. Web or online presence defacement or compromise Government guideline on cyber security Cyber Security Incident Reporting Scheme v 1.1 Page 4 of 11 ISMF Guideline 12a The above examples are not a complete list but can be used as a guide for the types of things that should, or should not be reported. Consideration should also be given to whether any occurrence may be part of a wider incident, whether it may impact on essential or important services, or whether the findings within one agency may assist another. If in doubt, report it. It is better to over report than under report. Government guideline on cyber security Cyber Security Incident Reporting Scheme v 1.1 Page 5 of 11 ISMF Guideline 12a Figure 4 – Cyber Security Incident Reporting Scheme Workflow diagram Government guideline on cyber security Cyber Security Incident Reporting Scheme v 1.1 Page 6 of 11 ISMF Guideline 12a When, Where and How should events and incidents be reported? The reporting process is intended to be simple and the Watch Desk will work with agencies to make sure it is easy and useful for all stakeholders. When: Cyber Security Events and Incidents should be reported immediately. o The timing of incident reporting is vital to the response process and as such Cyber Security Events and Incidents should be reported to the Watch Desk immediately. In many cases this may result in incomplete and potentially inaccurate information; however the risk posed by early reporting is outweighed by the advantage gained from early action. Where: The Watch Desk is the contact point for Cyber Security Event and Incident Reporting. The Watch Desk may be contacted via the following means: Phone (Business Hours): (08) 8226 7513 E-mail (Business Hours): [email protected] Watch Desk Duty Officer (Emergency/Out of Hours number): (08) 8232 3049 How: Reports should initially be made via phone or e-mail to the details listed above. In the case of a Cyber Security Event then there will be no further formal action required of the agency. If it is determined that a Cyber Security Incident has occurred then agencies will be asked to complete an Incident Report Form (see Annex A) and there will also be a request to submit a Post Incident Review (see Annex B) once the incident has been closed. “…not all Cyber Security Events will be classified as Cyber Security Incidents.” Who from my agency is responsible for reporting? Each agency will already have their own internal incident management processes which are likely to determine who handles the operational information regarding Cyber Security Events and Incidents. This person may or may not be the agency ITSA. Because of this, initial reports of Cyber Security Events or potential Incidents may be received from whomever an agency considers appropriate to do so (e.g. ICT Security Analysts, Service Desk staff etc.). The moment an Event is considered an Incident there is an expectation the ITSA will be involved. The Watch Desk will not, however, accept a Cyber Security Incident Report that has not been reviewed by the ITSA. Additional Considerations Illegal Activity: Incidents involving illegal activity must be reported to SA Police in addition to the Watch Desk. The Watch Desk will report illegal activity to the SA Police if the agency does not. Reports to Australian Cyber Security Centre: The Watch Desk and the Office for Digital Government are the single point of contact for the Australian Cyber Security Centre in regards to cyber security incidents. Post Incident Reports: Post incident reporting is an important part of the incident management process. Post incident reports provide opportunities to improve technical security measures, response processes and government policy. An incident cannot be closed by the Watch Desk until a Post Incident Report has been submitted. The Post Incident Report Form (Annex C) should be submitted within 30 days of the incident response process being completed. Government guideline on cyber security Cyber Security Incident Reporting Scheme v 1.1 Page 7 of 11 ISMF Guideline 12a ANNEX A: INCIDENT CATEGORIES These incident categories are used by the Watch Desk for categorisation and reporting purposes. Term Description Phishing or Social Engineering Spear Phishing Attempts to acquire information such as usernames, passwords or other sensitive using social engineering or technical subterfuge. Phishing or social engineering attempts that are specifically targeted against an individual or groups. These attempts make use of specific details which are unique to those being targeted in order to increase their probability of success. The theft or loss of any information or technology asset/device (including portable and fixed media) that might have been or has been used to either process or store government information. Unauthorised access from internal and external sources to Government information and systems. Unauthorised release or disclosure of Government information to an unknown environment. Theft/loss of assets Unauthorised access to information/systems Unauthorised release of or disclosure of information Malware infections Intrusions against networks Abuse of privileges Unauthorised changes to information, applications, systems or hardware Software programs designed to cause damage to Government systems. Intrusions specifically targeting Government internal infrastructure. This includes but is not limited to: denial-of-service (DoS)/distributed denial-of-service (DDoS) website defacements brute force attempts. Intrusion that cannot be attributed, after analysis, to what is considered consistent with Internet noise. For example intrusion attempts that consistently target internal network infrastructure, users or services provided for external use such as web applications. Changes to privilege use settings on stand-alone or networked equipment including network profiles, local user or device configuration files that have not been approved through the agency’s change management process. Any unauthorised changes to an organisation’s file system, including media, through insertion, modification or deletion: e.g. changes to standard operating environments (SOEs), addition of executables or the modification of an executable’s configuration. Any unauthorised installation of additional processing, communications or storage equipment into the IT network. This includes but is not limited to: modems, portable games units, smart phones, PDAs or wireless access points. Violation of information security policy Suspicious system behaviour or failure (hardware/software) or communications) Password confidentiality Sabotage/physical damage Other events Any violation of information security policy or the information security related aspects of the code of conduct. Unknown network activities affecting/degrading network performance with increased network bandwidth usage and decreased response time, using excessive CPU, increased suspicious network requests or increased Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) alerts leading to application crashes. Includes a malfunction within the electronic circuits, electromechanical components of a computer/communications system, or malfunction/inability of a program to continue processing due to erroneous logic. Sharing/stealing/loss of passwords or other authentication token. Any damage or destruction of physical information or electronic devices. Natural events and other events which result in damage to information and systems. This includes but is not limited to fire, flood, excessive heat, storms, biological agents, toxic dispersion, riots, power outages. Government guideline on cyber security Cyber Security Incident Reporting Scheme v 1.1 Page 8 of 11 ANNEX B: CYBER SECURITY INCIDENT REPORT FORM This form is only required for those occurrences that are deemed to be a Cyber Security Incident. This form may be submitted at any stage of completion. Name Phone Agency Email Brief Description Date & Time of Incident: Incident Status Incident Impact Is this incident affecting State Government Critical ICT Infrastructure (SGCII)? ☐Yes ☐No How do you rate the impact of this incident on your agency? (this may be an informal rating based on currently known information) ☐High ☐Medium ☐Low Reporting & Assistance Has this incident been reported to any other agencies or organisations (SAPOL, Suppliers etc.?). If so please list: Do you require any assistance responding to this incident at this time? If so please specify Report Submission E-mail: [email protected] (business hours) Phone: (08) 8226 7513 (business hours) If you require immediate assistance out of hours please contact the duty Watch Desk Officer on (08) 8232 3049. ANNEX C: POST INCIDENT REPORT FORM An incident cannot be closed by the Watch Desk until a Post Incident Report has been submitted. Please include all additional documentation Reference Number (if provided) Incident Title/Description Date(s) of Incident: Incident Outcome Provide a short description of the incident outcome (resolutions, workarounds, findings, recommendations). Attachments List any attachments (e.g. Copies of internal post incident reports, log files, etc.). Post Incident Report Submission This form should be submitted within 30 days of the incident response process being completed. E-mail: [email protected] (business hours) Mail: Watch Desk (Control Agency ICT Failure) GPO Box 1484 Adelaide SA 5001 DX: 142 ISMF Guideline 12a REFERENCES, LINKS & ADDITIONAL INFORMATION PC030 Government of South Australia Protective Security Management Framework [PSMF] ODG/F4.1 Government of South Australia Information Security Management Framework [ISMF] ODG/S4.5 ISMF Standard 140 – Notifiable Incidents: Across Government Incident Reporting Scheme ISO/IEC 27035:2011 Information technology - Security techniques - Information security incident management ICT Support Plan State Emergency Management Plan This guideline does not aim to provide the reader with all of the responsibilities and obligations associated with Cyber Security Incident Reporting. It is highly recommended that agencies review all related documents in their entirety. The individual requirements of agencies will have direct bearing on what measures are implemented to mitigate identified risk(s). Document Control ID ODG/G4.12a Version 1.1 Classification/DLM PUBLIC-I2-A1 Compliance Mandatory Original authorisation date February 2014 Last approval date January 2016 Review date January 2018 Licence With the exception of the Government of South Australia brand, logos and any images, this work is licensed under a Creative Commons Attribution (CC BY) 4.0 Licence. To attribute this material, cite the Office for Digital Government, Department of the Premier and Cabinet, Government of South Australia, 2016.
© Copyright 2026 Paperzz