In an effort to define a process for dealing with security incident and events in Science Program's cloud tenants, these will be our repeatable steps.
A breach of government security, including but is not limited to unauthorized access to, disclosure, modification, use, interruption, removal or destruction of sensitive information or assets, causing a loss of confidentiality, integrity, availability or value an event causing a loss of integrity or availability of government services or activities
Any event, act, omission or situation that may be detrimental to government security, including threats, vulnerabilities and security incidents. Examples of cyber security events: Disclosure of a new vulnerability, intelligence that a threat actor may be planning an attack against a GC information system (for example, a distributed denial of service (DDoS) attack, attempts to breach the network perimeter)
Any event (or collection of events), act, omission or situation that has resulted in a compromise.
Every cyber security incident is a cyber security event (or collection of cyber security events), but not every cyber security event is a cyber security incident (see Figure 1)
Examples of cyber security incidents: Active exploitation of one or more identified vulnerabilities, exfiltration of data, failure of a security control, breach of a cloud-hosted or managed GC service
Any potential event or act, deliberate or unintentional, or natural hazard that could result in a compromise.
A factor that could increase susceptibility to compromise.
None of these automatic remediations are currently implemented except blocking a user, but could be at any time.
SSC Science Programs' cloud tenants are innovation sandboxes, but secure innovation is still a goal of the Science program.
We will be implimenting a 3 strike system for those who don't take action.