Incident Response Plans
Updated Aug 29, 2023Incident Response plans
As an Incident Response (IR) JumpStart customer, you can build your IR plan within the Cyber JumpStart Portal. If you experience a major cybersecurity incident, IR plans can help you quickly access incident response experts who can assist with identifying and containing cyberattacks, as well as restoring the organization to pre-incident operations.
Examples of major cybersecurity incidents include:
- Ransomware and business email compromise
- Privilege escalation
- Insider threat
- Brute force attack
- Phishing
- Malware
- Denial-of-service
- Man-in-the-middle
- Password attack
Note: If you are an existing Arctic Wolf® Managed Detection and Response customer and want to see if you are eligible to opt-in to the IR JumpStart Retainer, contact your Customer Success Manager.
Prepare your incident response plan
Step 1: Build an IR plan in the Cyber JumpStart Portal
-
In the Arctic Wolf Unified Portal, click App Launcher > Cyber JumpStart.
-
On the JumpStart IR Planner tile, click Open.
-
On the Response Team tab:
- In the Executive Response Leader section, click Add info.
- Enter the contact information for the leader.
- Click Save.
- (Optional) Add additional contacts by clicking Add info next to a labeled section or clicking Add Additional Leader.
- (Optional) Enter the stakeholder contact information.
- (Optional) Click Save.
- Click Continue.
-
On the External Providers tab:
- Verify that your IR provider is Arctic Wolf.
- (Optional) Add external providers by clicking Add info next to a labeled section or clicking Add Additional IT Provider.
- (Optional) Enter the provider information.
- (Optional) Click Save.
- Click Continue.
-
On the Locations and Networks tab:
- In the Primary Business Location section, click Add info.
- Enter the address and server information.
- Click Save.
- (Optional) Add additional locations by clicking Add info next to a labeled section or clicking Add Additional Location.
- (Optional) Enter the location or network information.
- (Optional) Click Save.
- Click Continue.
-
On the Incident Escalation tab:
- In the Incident Detection section, click Add info.
- Respond to the questions.
- Click Save.
- Repeat for the subsequent sections, and then click Continue.
-
On the Critical Business Functions tab, do the following for each business function that is high priority in the event of restoration following a security event:
- Click Add New Critical Business Function.
- Enter details about the business function.
- Click Add New System for each supporting system for that function.
- Enter details about the system.
- Click Save for the system information.
- Click Save for the business function.
-
On the Critical Business Functions tab, click Finish.
Step 2: Review the IR plan
The review process differs depending on if you have an assigned Concierge Security® Team (CST).
Request an IR plan review from a CST
- Contact your CST and inform them that your IR plan is complete and ask any remaining questions. Your CST reviews your IR plan to identify gaps.
Schedule an IR plan review session
If you do not have an assigned CST, you receive an email that includes a link to schedule the session with an IR Director.
Note: Only schedule the IR plan review session if your IR plan is complete, or completed to the best of your ability.
-
On the scheduling page, select a date and time.
-
Click Confirm.
-
Provide your name, email, organization, and any preliminary questions or topics you want to cover during the session.
-
Click Add Guests to add other attendees.
-
Click Schedule Event.
You receive a confirmation email and calendar invitation for the selected date and time.
At the scheduled time, click the Zoom meeting link in the calendar invitation.