If you suspect a security incident is happening right now: Call the CSIRT hotline immediately at 1800-ASI-SEC (1800-274-732) or page via PagerDuty: Security Incident. Do not attempt to investigate or remediate alone. Preserve evidence.

Incident Classification

Incident TypeDescriptionSeverityPlaybook
Data BreachUnauthorised access to, disclosure of, or loss of personal or confidential dataCriticalData Breach Playbook
RansomwareMalware that encrypts data and demands payment for decryptionCriticalRansomware Playbook
DDoS AttackDistributed Denial of Service attack against client or ASI infrastructureHighDDoS Playbook
Insider ThreatMalicious or negligent action by an employee, contractor, or trusted partyHighInsider Threat Playbook
Phishing / BECSocial engineering attacks including business email compromiseMedium-HighPhishing Playbook

Severity Levels

SeverityCriteriaResponse TimeframeEscalation
CriticalActive data breach, ransomware execution, APT detected, regulatory notification likelyImmediate (within 15 min)CEO, Legal, affected clients immediately
HighActive attack in progress, privilege escalation, significant malware spreadWithin 30 minHead of Security, VP Ops within 1 hour
MediumContained malware, suspicious activity under investigation, policy violationWithin 2 hoursCSIRT Lead within 4 hours
LowFalse positive confirmed, minor policy exception, unsuccessful attack blockedWithin 1 BDLog and monitor

Response Phases (NIST Framework)

Phase 1: Preparation

Ongoing activities that ensure the CSIRT is ready to respond effectively.

Team Readiness

  • CSIRT members trained and certified (GCIH, GCFE, or equivalent)
  • On-call rotation: 24/7 coverage with 15-minute response SLA
  • Tabletop exercises conducted quarterly
  • Full simulation exercise conducted annually
  • Cross-training with Service Delivery and Cloud teams

Tools & Infrastructure

  • SIEM: Microsoft Sentinel + ASI AI Sentinel integration
  • EDR: CrowdStrike Falcon
  • Forensics: Velociraptor, Magnet AXIOM, FTK Imager
  • Threat Intelligence: MISP, ASD threat feeds, CrowdStrike Intel
  • Communication: Dedicated encrypted Teams channel + out-of-band Signal group

Phase 2: Detection & Analysis

1

Alert Triage

Security alerts from SIEM, EDR, email security, AI threat detection, and user reports are triaged by the on-call CSIRT analyst. AI-powered correlation reduces alert fatigue by grouping related events and scoring threat confidence (0-100).

2

IOC Analysis

Indicators of Compromise (IOCs) are extracted and cross-referenced with threat intelligence feeds. AI models compare behavioural patterns against known TTPs (MITRE ATT&CK mapped). Determine if the alert is a true positive.

3

Scope Assessment

Determine the scope: How many systems/users are affected? What data is at risk? Is the attack ongoing? Use EDR telemetry and network logs to map the blast radius.

4

Classification & Escalation

Classify the incident type and severity per the matrix above. Escalate to appropriate personnel and notify the CSIRT Lead. Declare a security incident in ServiceNow.

Phase 3: Containment

Short-Term Containment

Immediate actions to stop the attack from spreading:

  • Isolate affected endpoints (network quarantine via CrowdStrike)
  • Block malicious IPs/domains at firewall and DNS level
  • Disable compromised accounts
  • Preserve volatile evidence (memory dumps, running processes)
  • Redirect traffic if DDoS

Decision point: Can business continue with affected systems isolated? If not, escalate to CEO for business impact decision.

Long-Term Containment

Sustainable containment while eradication is planned:

  • Implement temporary firewall rules and network segmentation
  • Deploy additional monitoring on adjacent systems
  • Rebuild affected systems from clean images (if needed)
  • Force password resets for potentially compromised accounts
  • Enable enhanced logging on all related systems

Phase 4: Eradication

  • Identify and remove root cause (malware, backdoors, compromised credentials, vulnerable software)
  • Patch exploited vulnerabilities
  • Rebuild compromised systems from known-good images
  • Rotate all credentials that may have been exposed
  • Update security controls (firewall rules, email filters, EDR policies)
  • Verify eradication with thorough scan and forensic review

Phase 5: Recovery

  • Restore systems from verified clean backups
  • Gradually reconnect isolated systems to the network (monitored)
  • Validate all services are functioning correctly
  • Monitor for any signs of re-infection for minimum 30 days
  • Confirm with affected clients that services are restored
  • Maintain elevated monitoring thresholds during recovery period

Phase 6: Lessons Learned

  • Post-Incident Review conducted within 5 business days of incident closure
  • All CSIRT members and key stakeholders participate
  • Timeline reconstruction: what happened, when, how did we respond
  • Root cause analysis and contributing factors
  • Review of detection effectiveness: how quickly did we detect? Could we have detected sooner?
  • Review of response effectiveness: what worked, what did not
  • Improvement actions documented with owners and deadlines
  • Update playbooks, procedures, and training materials
  • Report shared with leadership and affected clients (sanitised version)

Notification Requirements (OAIC Notifiable Data Breaches)

Under the Notifiable Data Breaches (NDB) scheme of the Privacy Act 1988, ASI is required to notify the OAIC and affected individuals when a data breach involving personal information is likely to result in serious harm. Notification must occur within 72 hours of becoming aware the breach has occurred (or as soon as practicable).

Notification Decision Process

  1. Assessment (within 30 days max, but aim for 72 hours): Determine if the breach is an "eligible data breach" — i.e., likely to result in serious harm to any individual
  2. Legal review: ASI Legal Counsel and Privacy Officer must be consulted before notification decision
  3. OAIC notification: Submit notification via the OAIC NDB portal (notifiabledatabreaches.gov.au)
  4. Individual notification: Notify affected individuals with:
    • Description of the breach
    • The types of information involved
    • Recommended steps individuals should take
    • ASI contact details for enquiries
  5. Client notification: Notify affected clients per contractual obligations (typically within 24 hours of ASI becoming aware)

Authority Contacts

AuthorityWhen to ContactContact Method
OAICEligible data breach involving personal informationNDB portal: oaic.gov.au
ACSC (ASD)Significant cyber security incidentcyber.gov.au/report or 1300 CYBER1
AFPSuspected criminal activity (fraud, extortion, espionage)AFP referral via ACSC or direct
APRABreach affecting APRA-regulated client (financial services)As per client's APRA notification obligations

Communication Plan

AudienceTimingChannelContentResponsible
CSIRT (internal)ImmediatelyPagerDuty + encrypted Teams channelFull technical detailsOn-call analyst
ASI LeadershipWithin 1 hour (Critical)Phone + emailSummary, impact, actions being takenCSIRT Lead
Affected Client(s)Within 2 hours (Critical)Phone call + emailWhat happened, impact, what we're doing, next update timeSDM + CSIRT Lead
All Clients (if widespread)Within 4 hoursEmail + status pageAdvisory with recommended actionsHead of Security
Regulators (OAIC, ACSC)Within 72 hours (if data breach)Official portalsFormal notification per requirementsPrivacy Officer + Legal
Media (if needed)As directed by CEOPrepared statement onlyApproved statement. No technical details.CEO + external PR firm
Media protocol: Only the CEO or their designated spokesperson may communicate with media about a security incident. All media enquiries must be directed to media@asiaisolutions.com.au. Do not share any details on social media or with unauthorised parties.

CSIRT Team Structure

📄 CSIRT Contact List (Template)

RolePrimaryBackupContact
CSIRT LeadPriya SharmaAlex MikhailovPagerDuty: security-lead
Incident CommanderRotating on-callCSIRT LeadPagerDuty: security-oncall
Forensic AnalystJordan LeeSam BlackwellPagerDuty: security-forensics
Threat Intel AnalystMaria SantosJordan LeePagerDuty: security-intel
Network/Cloud SpecialistFrom Cloud & Infra teamPagerDuty: cloud-oncall
Communications LeadSarah Chen (SD)Emma Thompson (P&C)Direct phone
Legal CounselExternal firm (Clayton Utz)Partner direct line (in IR retainer)
Privacy OfficerPriya SharmaTom NguyenDirect phone
Executive SponsorCEOVP OperationsDirect phone

Full contact details (mobile numbers, personal emails) maintained in a sealed envelope in the CEO's office and in an encrypted offline document accessible to CSIRT Lead and CEO only.

Playbook Summaries

☉ Playbook 1: Data Breach

  1. Detect: SIEM alert on data exfiltration, DLP trigger, user report, or third-party notification
  2. Validate: Confirm data has been accessed/exfiltrated. Identify data types and volume.
  3. Contain: Block exfiltration channel, disable compromised accounts, isolate affected systems
  4. Assess: Determine if personal information is involved (Privacy Act trigger). Quantify affected records.
  5. Notify: Legal Counsel immediately. OAIC within 72 hours if eligible data breach. Affected individuals as required.
  6. Eradicate: Remove attacker access, patch vulnerability, rotate credentials
  7. Recover: Restore services, implement additional DLP controls, enhance monitoring
  8. Review: Full PIR within 5 BD. Update DLP policies. Regulatory reporting follow-up.

☉ Playbook 2: Ransomware

  1. Detect: EDR alert on encryption activity, user reports files inaccessible, ransom note displayed
  2. Contain IMMEDIATELY: Isolate affected endpoints from network. Shut down file shares. Disable SMB if worm-like spread.
  3. Assess: Identify ransomware variant (CrowdStrike + VirusTotal). Determine encryption scope. Check backup integrity.
  4. Decision: Assess recovery options. ASI policy: do NOT pay ransom without CEO + Legal + Law enforcement consultation.
  5. Eradicate: Rebuild affected systems from clean images. Patch entry point vulnerability.
  6. Recover: Restore data from verified clean backups. Validate data integrity. Gradual network reconnection.
  7. Report: ACSC notification. OAIC if personal data involved. AFP if criminal investigation warranted.
  8. Review: Full PIR. Review backup strategy. Implement additional controls (e.g., immutable backups).

☉ Playbook 3: DDoS Attack

  1. Detect: AI Sentinel traffic anomaly alert, monitoring system latency spike, client reports service unavailability
  2. Classify: Volumetric, protocol, or application-layer attack. Identify target (client, ASI infrastructure).
  3. Mitigate: Activate DDoS protection (Cloudflare / Azure DDoS Protection). Implement rate limiting. GeoIP blocking if source is concentrated.
  4. Communicate: Notify affected clients. Update status page.
  5. Monitor: Track attack pattern changes. Adjust mitigation rules as attack evolves.
  6. Recovery: Confirm services restored. Maintain elevated DDoS protection for 72 hours post-attack.
  7. Report: ACSC notification if significant. PIR within 5 BD.

☉ Playbook 4: Insider Threat

  1. Detect: UEBA (User Entity Behaviour Analytics) alert, DLP trigger, manager report, anonymous tip
  2. Validate discreetly: Review access logs, file activity, email patterns. Do NOT alert the subject.
  3. Escalate: CSIRT Lead + Head of People & Culture + Legal Counsel. Determine if malicious or negligent.
  4. Contain: Adjust access permissions covertly. Increase monitoring. Preserve evidence chain.
  5. Investigation: Formal investigation per HR policy. Forensic evidence collection if criminal activity suspected.
  6. Action: Per HR investigation outcome (counselling, termination, law enforcement referral)
  7. Remediate: Revoke all access, collect assets, review access of similar roles for systemic gaps
  8. Review: PIR focusing on detection gaps and access control improvements

☉ Playbook 5: Phishing / Business Email Compromise

  1. Detect: User report (phish button), email security alert, AI analysis of suspicious email patterns
  2. Validate: Analyse email headers, URLs, and attachments in sandbox. Check for credential harvesting.
  3. Contain: Block sender and URLs across all mailboxes (retrospective purge). Reset passwords for anyone who clicked.
  4. BEC-specific: If financial fraud attempted, immediately contact bank to reverse/freeze transactions. Notify Finance.
  5. Assess scope: Search for similar emails across all mailboxes. Check if credentials were entered on phishing site.
  6. Remediate: MFA enrollment check, email filtering rule update, user security awareness follow-up
  7. Communicate: Send advisory to all staff if widespread campaign. Targeted coaching for users who fell for the phish.
  8. Report: ACSC if significant campaign. Log in threat intelligence platform.