Incident Response

Business Continuity and Incident Response both fall under the Information Security Program umbrella, designed to complement each other to protect the Confidentiality, Integrity, and Availability of data and information technology assets. Both follow a similar set of steps in the development and execution of documented strategies. Incident Response is typically used to plan for scenarios that include the potential for exposure of sensitive data, or unauthorized access of IT. Most of these threats are associated with cybersecurity risk.

The Business Continuity Team at CU*Answers oversees the Incident Response program for the CUSO, working closely with Networking and Security Operations as well as Internal Auditing for compliance purposes. Multiple audits and examinations are conducted on a regular basis, internal and independent, with reporting provided to Senior Management and the Board of Directors. Results of these audits and examinations are reviewed as part of our SSAE-18 audit process with both SOC I and SOC II reports available at https://www.cuanswers.com/about/due-diligence-materials/.

A key component of the Information Security Program

Incident Response is a critical component of the Information Security Program, identifying processes and procedures to follow in the event of a security attack. While controls are implemented to prevent, deter, and detect attacks, bad actors are often skillful in finding their way around (or sometimes even through) these controls, or are able to identify and exploit a vulnerability before teams have had a chance to remediate it.

Incident Response requires a set of skills and experiences not often found within the employee base of most financial institutions. It is the next evolution of cybersecurity awareness training, with roles and responsibilities identified for members of the Incident Response Teams. As a CUSO and core processor, CU*Answers provides regular educational webinars on the topic as well as resources and services to help credit unions address any gaps on their response teams.

The threat landscape in the cybersecurity realm is always changing as bad actors seek new methods of monetizing their efforts. It’s imperative that CUSOs and credit unions include Incident Response development as part of their overall program, seeking to continuously strengthen the security posture.

incident response awareness training
incident response plan development
incident response plan testing

Resources available to enhance the security posture for CUSOs and credit unions.

Your Incident Response Strategy

Effective Incident Response begins with a solid risk-based Information Security Management program.  As a financial institution, regular Risk Assessments should be performed to measure inherent and residual risks, uncovering areas where controls are missing or weak (relative to your risk appetite), as well as identifying likely scenarios to plan your response efforts. Along with the regular Risk Assessments, networks and systems must both be scanned for vulnerabilities, and their controls tested regularly for effectiveness.

A culture of security is perhaps the organization’s best defense against an attack. Influencing staff behavior begins with carefully designed and clearly understood security policies. An ongoing cybersecurity awareness training program is vital, given that more than 90% of all data breaches begin with social engineering tactics, such as phishing or credential theft. For those staff with specific roles on the Incident Response Team, adequate training is required to develop the skills and experience needed, as well as identifying areas where gaps exist, indicating the need for additional training or outsourcing.

Specific processes and procedures for responding to security incidents must be documented and validated through an ongoing testing program. These must address each stage of an incident response, from detection and containment to remediation and recovery. Several resources are available from regulatory agencies, as well as case studies from actual incidents.  These resources help to define guidelines and best practices as part of intelligence sharing activities.

Effective communication and notification during an incident response is a key element and a regulatory requirement under specific circumstances. Communications among response team members during the initial stages of an attack help to initiate proper containment strategies. Communicating with all key stakeholders is important to maintaining control of the message and protecting the reputation of the organization.

The Incident Response Team

The Incident Response Team is made up of a cross-enterprise group, responsible for quickly identifying threats to the organization, assessing the level of risk, and taking immediate steps to mitigate impact and loss. The team notifies appropriate authorities and mobilizes response and recovery teams to bring operations back to normal.

incident response team flow chart

Identify and seek to fill the skills gaps of your response team members.

The Incident Response Team is comprised of a blend of internal and external parties, including legal counsel, law enforcement, cybersecurity insurance agents, as well as breach experts. Roles are often grouped by function, including the technology response, operations response to maintain at least a minimal level of services for members, as well as back-office administration. It’s important to identify the members of your Incident Response Team and seek to fill any skills and experience gaps through additional training and/or outsourcing to a trusted vendor.

Stages of an Incident Response

Whether we like it or not, every organization is either undergoing a cybersecurity attack, just coming out of a cybersecurity attack, or preparing for the next attack to begin. With a continuously evolving threat landscape, it is imperative that CUSOs and credit unions adapt to maintain a strong security posture. Recognizing that an attack is underway requires having a general knowledge of the typical stages of an Incident Response.

stages of incident response

Stages of a Cybersecurity Incident

  1. Preparation: Like good physical health, these are the activities we do (or don’t do) to maintain a strong security posture.
    • This starts with strong security policies, an ongoing cybersecurity awareness and training program, a layered approach to security controls such as multi-factor authentication, vulnerability scanning and patch management, comprehensive risk assessments, and regular testing and exercises.
  2. Detection: What activity on your network should you be monitoring? Where are the early signs of an attack likely to surface?
    • A few key questions to ask include:
      • What activity on your network should you be monitoring?
      • Where are the early signs of an attack likely to surface?
  3. Containment: What tools and procedures will your response team follow to quickly isolate and contain the attack, whether malicious software, an exploited vulnerability, or stolen network account?
    • What tools and procedures will your response team follow to quickly isolate and contain the attack, whether malicious software, an exploited vulnerability, or stolen network account?
  4. Remediation: What tools and procedures will your response team follow to completely eradicate the attack, including locating the means of ingress to prevent future occurrences?
    • What tools and procedures will your response team follow to completely eradicate the attack, including locating the means of ingress to prevent future occurrences?
  5. Recovery: What is the process for returning to a normal business state so that you can continue serving your member base.
    • This is only possible with a solid business continuity program that includes protected, immutable data backups and available resources to recreate the production environment.
  6. Post-Incident Analysis: What did we learn about this incident and what steps can we take to strengthen our posture and enhance our response?
    • What did you learn about this incident and what steps can you take to strengthen our posture and enhance our response?
  7. Risk Mitigation: Everything that is learned through each stage of the response as well as case studies from incidents reported by other financial institutions collectively teach us how to better mitigate and manage risk.
    • This information must be disseminated to the response team and all staff through awareness and training events such as a simulation-based tabletop exercise.

All of the above should be documented in your Incident Response Plan and tested and reviewed regularly to ensure it remains relevant to credit union operations.

Resources available for CUSOs and Credit Unions

CU*Answers and AdvantageCIO have several services and resources to help you achieve your goals in this area.

business continuity disaster recovery
incident response / information security
vendor due diligence

Resources available to enhance the security posture for CUSOs and credit unions.

Due diligence documentation including risk assessment tools for:

Updated
May 19, 2023

Reminder: HA Rollback This Weekend

Reminder: HA Rollback This Weekend

This is a reminder of the high-availability rollback event that will be occurring this weekend.  The rollback process will begin Sunday, July 24th at 3:00 AM ET. During this time, there will be a period of approximately 60 to 90 minutes that will include an interruption to the following services: CU*BASE/GOLD, CU*Talk audio response and… Read more »

Jul 22, 2022

Rollover Event This Weekend – Updates to be Posted on CU*BASE Alerts Page

Rollover Event This Weekend – Updates to be Posted on CU*BASE Alerts Page

Don’t forget: this weekend, we will be testing our ability to redirect CU*BASE core-processing from our production data center to our high-availability (HA) data center.  The rollover will begin at 3:00 AM ET on Sunday, July 10th with the rollback scheduled for 3:00 AM ET on Sunday, July 24th. During the rollover process, there will… Read more »

Jul 8, 2022

Reminder: CU*Answers HA Rollover this Weekend

Reminder: CU*Answers HA Rollover this Weekend

Twice each year, CU*Answers tests our ability to redirect CU*BASE core-processing from our production data center in Kentwood, MI to our high-availability (HA) data center in Yankton, SD.  The next HA rollover is scheduled for Sunday, July 10th. As announced at this year’s Leadership Conference, this rollover will occur over a two-week period to accommodate… Read more »

Jul 5, 2022

CUSO partners working together to defend against cyber attacks

On June 22, 2022, speakers from CU*Answers were invited to participate in the annual CU*NorthWest Leadership Conference held this year in Spokane, WA to discuss services available to assist credit unions in daily network management and information security compliance. One such presentation, titled “Future Technology Advancements Require Modern Cybersecurity Measures”, focused on today’s emerging cyber […]

Jul 1, 2022

Reminder: The Next HA Rollover is Coming July 10th – We Need You to Perform a Connectivity Test!

Reminder: The Next HA Rollover is Coming July 10th – We Need You to Perform a Connectivity Test!

Twice each year, CU*Answers tests our ability to redirect CU*BASE core-processing from our production data center in Kentwood, MI to our high-availability (HA) data center in Yankton, SD.  The next HA rollover is scheduled for Sunday, July 10th. As announced at this year’s Leadership Conference, this rollover will occur over a two-week period to accommodate… Read more »

Jun 27, 2022

Generating Business Continuity at CU*Answers

As severe weather season approaches, response and recovery teams at CU*Answers, a credit-union-owned CUSO and core processor, conduct regular training exercises to practice mobilizing a portable generator at one of three data centers, in the event of a hardware failure with the stationary generator. “Hand-on experience with transporting, staging, and starting generators is imperative to […]

Jun 20, 2022

Get a Behind-the-Scenes Look at the HA Rollover Process!

Get a Behind-the-Scenes Look at the HA Rollover Process!

Have you ever wondered what goes on behind the scenes of the CU*Answers High-Availability (HA) Rollover exercise?  Join our 30-minute webinar for a closer look into the process and learn about the ongoing investments we are making to strengthen the resilience of the CU*BASE core processing platform! During this session, the Business Continuity Team will… Read more »

Jun 20, 2022

The Next HA Rollover is Coming July 10th – We Need You to Perform a Connectivity Test!

The Next HA Rollover is Coming July 10th – We Need You to Perform a Connectivity Test!

Twice each year, CU*Answers tests our ability to redirect CU*BASE core-processing from our production data center in Kentwood, MI to our high-availability (HA) data center in Yankton, SD.  The next HA rollover is scheduled for Sunday, July 10th. As announced at this year’s Leadership Conference, this rollover will occur over a two-week period to accommodate… Read more »

Jun 20, 2022

CUSO partners working together to serve the cuasterisk.com network

On April 12, 2022, speakers from CU*Answers were invited to participate in the annual CU*SOUTH Visionary Conference, held this year in Pensacola Beach, FL to discuss services available to assist credit unions in daily network management and information security compliance. True to the collaborative nature of the cuasterisk.com network, partners combine resources, knowledge, and experience […]

Apr 28, 2022

[The Pulse] Item Processing Services 2022 Recovery Test: Report Now Available

[The Pulse] Item Processing Services 2022 Recovery Test: Report Now Available

Item Processing Services 2022 Recovery Test: Report Now Available   For those credit unions who currently use CU*Answers for Electronic Check Processing (ECP), this report is for you.  During the week of March 7th, 2022, teams at CU*Answers completed the annual recovery test by restoring the CheckLogic environment and performing daily check processing operations from… Read more »

Mar 29, 2022