Management, compliance & auditing

How to document security incidents for compliance in 10 steps

Greg Belding
August 17, 2018 by
Greg Belding

Many organizations are subject to regulations that enforce compliance to federal standards, such as HIPAA. This is because these organizations often operate in sensitive ways, such as handling customers' personal data, and enforcing regulations can be necessary to ensure properly-heightened security. However, it's impossible to predict every outcome, and security incidents are very likely to occur.

One of the chief compliance requirements is for organizations to document such security incidents. This article will detail the steps that organizations will want to use if they are documenting security incidents for compliance.

Documentation

When security incidents occur, documentation is required for compliance. The Security Officer for the organization is the individual responsible for this documentation, whether in an electronic or written format.

Step 1: Security incident report – Contact information

The security incident report needs to contain certain information to meet compliance. It is best to make a form that will contain certain information in different sections.

The first section that you will want to make is Contact Information. The information should include:

  • The reporting individual's name and title
  • Both work and mobile phone number
  • Name of the organization's security officer
  • Email address
  • Fax number

Step 2: Security incident description

Next, the security incident report should have a section designated for the description of the security incident. This section is where you want to be brief but include as much detail as possible about the security incident. Not only will this look good for compliance auditors, but it will also serve as good documentation of commonly-occurring security issues your organization faces.

Step 3: Impact/potential impact

Document any impact that this security incident may have had on your organization. You can present this as a free-form text box to be filled, check boxes next to predefined impact types or an approach where you use both. If you want to use predefined impact types, they should include the following:

  • Loss of Data/Data Compromise
  • System Damage
  • Financial Loss
  • Other System was Affected
  • Damage to the Delivery or Integrity of Information
  • Regulation Violation
  • Information Security Policy or Procedure Violation
  • Presently Unknown

Step 4: Sensitivity of information/information involved

You will want to categorize the sensitivity level of the information involved in the security breach. For each selection, your security officer will want to include an example of information that qualifies for each of the different levels of sensitivity. Include the following levels:

  • Public
  • Internal Use Only
  • Restricted or Confidential (Privacy Policy Violation)
  • Unknown

After the sensitivity levels have been defined, use a check box selection for the different levels. Also include a text box area for a brief description of the information that was compromised.

Step 5: Notification

Include a section that describes who else has been notified of the security incident. Make sure to include the individual's name and title at the organization.

Step 6: Incident details

This section is an at-a-quick-glance version of the security incident description section above. It should be brief answers to predefined questions about the security incident. The incident details questions should include:

  • Date and time that the security incident was discovered
  • Has the security incident been resolved?
  • Physical location of the affected system or information
  • Number of physical locations affected
  • Number of systems affected the security incident
  • Number of users affected by the security incident
  • Any other additional important information about the security incident

Step 7: Mitigation

This section should include details about what actions the organization has taken to mitigate the security incident. The response should be brief but include all relevant information.

Step 8: Security officer's signature

The Security incident report should include the security officer's signature.

Step 9: Security incident log

Aside from the security incident report, security officers are also tasked with creating and maintaining a security incident log. The security incident log is a short document that will tell you most of what you will want to know at a quick glance. Some items that you will want to include in your security incident log are time, date and who discovered the security incident, along with a brief description of what the security incident was.

Where the security incident log differs most from the security incident report is the use of a severity scale. The log should include an item that rates the severity of the security incident from 1 to 5, with 1 being the least serious and 5 being the most serious.

Step 10: Retention

To meet compliance, organizations are required to retain all security incident reports and security incident logs for at least six years. This six-year period begins at the time of the last entry.

Conclusion

Organizations that operate in highly-regulated industries, such as healthcare, are subject to meeting compliance with regulations like HIPAA. HIPAA mandates that to meet compliance, organizations have to create and maintain security incident reports and security incident logs for all security incidents that affect their organization and retain these documents for at least six years. By following the steps detailed above, your organization's security incident documentation will meet compliance.

Sources

Greg Belding
Greg Belding

Greg is a Veteran IT Professional working in the Healthcare field. He enjoys Information Security, creating Information Defensive Strategy, and writing – both as a Cybersecurity Blogger as well as for fun.