Part of Objective D - Minimising the impact of incidents
Principle D1: Response and recovery planning
There are well-defined and tested incident management processes in place, that aim to ensure continuity of essential function(s) in the event of system or service failure and to uphold the rights of impacted individuals. Mitigation activities designed to contain or limit the impact of compromise are also in place.
D1.a Response plan
Description
You have an up-to-date incident response plan that is grounded in a thorough risk assessment that takes account of your essential function(s) and covers a range of incident scenarios.
The expectation for this contributing outcome is Partially achieved.
Indicators of good practice (IGP) achievement levels
Expand the achievement levels to find out the requirements needed to meet each level.
As documented in the introduction to this framework, independent assessors are expected to use their professional judgement when assessing organisations against the Cyber Assessment Framework (CAF).
The approach and documentation list described below are a suggestion to the independent assessors, and do not have to be followed stringently.
Suggested approach to testing – Partially achieved
1. Incident response plans - Obtain and inspect the incident response plans, assessing whether:
- It shows that the organisation’s essential functions have been considered, with specific business areas and key contacts named who hold responsibility for those functions in the event of an incident. (PA#1)
- Scenarios have been identified and documented for known attacks and incidents. (PA#2)
- The roles and responsibilities of staff within the response function have been clearly documented and assigned. (PA#3)
- It includes a section on the obligations of the organisation as controller or processor of personal data for the reporting of incidents. This section should show the organisation’s awareness of relevant data protection obligations, and how they will comply with them during an incident. It should also identify the stakeholders to be informed, such as the Information Commissioner’s Office (ICO), and the timelines and procedure for informing them, for example through the Data Security and Protection Toolkit (DSPT) reporting portal. (IGP PA#5)
- The response plans include the requirement to notify impacted system partners (PA#6)
2. Sharing with relevant stakeholders - Obtain evidence that the response to the incident response plan(s) has been approved by a relevant group and distributed to the response team. (PA#4).
3. Personal data - Review the latest report of an incident involving personal data and verify that procedures were followed appropriately. (PA#5)
4. System partners - A list of system partners exists, with key contacts for each to enable notification. (PA#6, A#6)
Additional approach to testing – Achieved
1. Incident Response plan - Obtain and inspect the incident response plan, assessing whether:
- It covers all stages of the incident response lifecycle, including preparation, detection, containment, eradication, recovery, and post-incident activities, for the most likely scenarios as dictated by risk assessments. (A#2)
- Dependencies on supporting infrastructure have been identified and documented. This also includes dependencies on suppliers and technology. (A#3)
- It is integrated with other relevant policies and processes, for example the incident review process and business continuity policy. (A#3)
- Its location is well-known and easily accessible to staff. (A#4)
2. Risk assessments or risk management report – Assess whether a risk assessment has been undertaken for each essential function, with the risks accounted for in the incident response plan(s). The risks identified should inform the response plan activities. (A#1)
3. Staff knowledge – Assess whether relevant staff have read and understood the document. This should also include third parties where relevant. Is there evidence of understanding, such as briefing sessions, emails, meeting minutes etc. (A#4)
Suggested documentation list – Partially achieved
- incident response plan(s)
- evidence of incident response plan being approved and distributed to relevant staff members
- report of the latest incident involving personal data
- evidence of communication plans and channels with system partners to coordinate incident response
Additional documentation for Achieved level
- image of policy repository (shared on screen)
- risk assessment for each essential function
- evidence of cross-organisational understanding of the incident response plan(s)
D1.b Response and recovery capability
Description
You have the capability to enact your incident response plan, including effective limitation of impact on the operation of your essential function(s). During an incident, you have access to timely information on which to base your response decisions.
The expectation for this contributing outcome is Achieved.
Indicators of good practice (IGP) achievement levels
Expand the achievement levels to find out the requirements needed to meet each level.
As documented in the introduction to this framework, independent assessors are expected to use their professional judgement when assessing organisations against the Cyber Assessment Framework.
The approach and documentation list described below are a suggestion to the independent assessors, and do not have to be followed stringently.
Suggested approach to testing
1. Incident response plans - Obtain and inspect the incident response plans, assessing whether:
- The resourcing requirements to respond to the most likely incidents have been identified and how the resources will be made available when needed. (A#1)
- Roles and responsibilities have been assigned for all key roles, and whether a backup member of staff has been identified to assume responsibility if required. (A#4)
2. Scenario planning - Obtain and inspect documentation relating to scenario planning and assess whether it contains:
- Clear identification of activities and a clear owner with authority to carry them out. (A#3)
- The type and source of information required to carry out the plan. (A#2)
3. Scenario testing - Enquire and obtain evidence of a sample of the tests undertaken, verifying that testing took place in the last 12 months. Verify that knowledge was captured and shared with all members, including those who could not attend. (A#3,A#4)
4. Incident resourcing - Obtain the testing and exercising documentation to ascertain whether the resourcing requirements documented in the scenario plan are realistic. (A#1)
5. Staff resilience - Enquire of the members of staff named as backups as to whether they are aware of their responsibilities, and whether they have received training for it. Inspect the evidence of training being undertaken. (A#4)
6. Staff skills and knowledge - Review evidence of a skills analysis, training needs analysis or similar which outlines the skills required and their presence within the team and any training required. (A#3)
7. Clear roles and decision-making authority - Assess whether a clear escalation process is in place, with a defined chain of command dictating the authority of each member of the response team. (A#3)
8. Information availability for response decisions - For a sample of each type of information identified, verify that the source of the information is recorded, and in cases where the information is confidential or private, verify that the activity owner either has access to it, or has a method of gaining access when required (for example, access to a specific system). (A#2)
9. Information continuity - Also verify that the latest plan takes into account the possibility of the system containing the information being unavailable, and includes additional methods of obtaining the required information. (A#2)
10. Backup plans and processes - Obtain and inspect the latest business continuity plan to assess whether back-up mechanisms have been identified and documented to allow continued operation of essential functions. This includes roles and responsibilities of relevant staff to activate the back-up mechanisms. Assess whether the plans in place allow for ready activation of the back-up mechanisms, and whether any dependencies have been identified and planned for. (A#5)
11. Minimum operational provision - Obtain a sample of the organisations’ essential functions and assess whether the acceptable level of operation of essential functions has been defined and approved, and assess whether the plans in place allow for this level of operation. (A#5)
12. External CIR support - Test if the organisation is aware of the Cyber Incident Response (CIR) services provided by NHS England. (A#6)
Suggested documentation list
- incident response plan(s)
- evidence of scenario planning
- latest tests of scenario plans
- documentation of the latest training attended by the response team
- skills analysis or training needs analysis
- evidence of established chain of command during incidents
- response team organisational chart
- documentation of information sources and methods of gaining access to information required for incident response
- evidence of back-up mechanisms being identified for continuation of services
- assessment of acceptable levels of operation of essential functions - for example, recovery time objective (RTO) or recovery point objective (RPO)
- agreement/contract with external support provider or process includes contacting NHS England for CIR services
D1.c Testing and exercising
Description
Your organisation carries out exercises to test response plans, using past incidents that affected your (and other) organisation, and scenarios that draw on threat intelligence and your risk assessment.
The expectation for this contributing outcome is Achieved.
Indicators of good practice (IGP) achievement levels
Expand the achievement levels to find out the requirements needed to meet each level.
As documented in the introduction to this framework, independent assessors are expected to use their professional judgement when assessing organisations against the Cyber Assessment Framework (CAF).
The approach and documentation list described below are a suggestion to the independent assessors, and do not have to be followed stringently.
Suggested approach to testing
1. Threat intelligence - Enquire of the sources of information used to design the scenarios, which could include sources of threat intelligence, experience from past incidents, or product-specific sources of information. Assess whether the use of those sources is adequate and documented. (A#1)
2. Exercise scenario documentation - Obtain and inspect the exercise scenario documentation, and assess whether it contains:
- Details of exercises conducted. (A#2)
- Evidence of aligning to best practices. (A#1)
- A regular testing schedule or evidence of that exercise have been conducted at regular intervals or are scheduled. (A#3)
- How the entire lifecycle of the incident response has been covered, including preparation, detection, containment, eradication, recovery to normal function levels, and post-incident activities. (A#4)
3. Exercise scenario - Obtain and inspect a sample of exercise scenarios. Assess whether:
- They are the most likely scenarios for this organisation. (A#1)
- Their content allows the organisation to effectively test how they manage the impacts of the scenarios. (A#2)
4. Exercise scenario testing - Obtain and inspect the outputs of a sample of the exercises scenarios that were run in the last 12 months, and verify that:
- The outputs were discussed and approved by a relevant authority, with responsibility for updating policies and processes being assigned to named owners with clear timelines (A#2).
- A lessons learned exercise was carried out to identify improvements points and findings. The outputs of this exercise should be reviewed and approved by an appropriate authority (A#3).
- Their content tests processes outlined in the organisation’s incident response plan (A#1).
- The organisation has a process for ensuring their exercise scenarios are updated over time (A#2).
5. Incident Response plan - Obtain and inspect the incident response plans and verify that those improvements and findings were incorporated in the plans, which were then approved by a relevant authority (A#3).
6. Staff communication - Ensure that the updated incident response plan was communicated to all relevant stakeholders following its update (A#3).
Suggested documentation
- threat intelligence sources
- exercise scenario documentation
- schedule for testing and exercising activities
- evidence of lessons learned and actions taken following testing and exercising activities
- procedures for updating testing and exercising activities over time
- incident response plan(s)
- evidence of updated incident response plan being communicated to all relevant stakeholders
Last edited: 2 January 2025 11:54 am