ZanReal Labs ("ZanReal Labs", "we", "us", or "our") has established comprehensive incident response procedures to ensure rapid detection, containment, investigation, and recovery from information security incidents. These procedures support our commitment to maintaining the confidentiality, integrity, and availability of all information assets.
Purpose and Scope
These procedures apply to all information security incidents affecting:
ZanReal Labs systems, networks, and applications
Customer data and personal information
Third-party services and cloud infrastructure
Physical and virtual assets
Personnel and contractors
Incident Classification
Severity Levels
Critical (P1) - Immediate Response Required
Major data breach or unauthorized access to sensitive data
Complete system or service outage affecting critical business operations
Ransomware or destructive malware affecting core systems
Confirmed advanced persistent threat (APT) activity
Regulatory notification required
High (P2) - Response within 2 hours
Partial system compromise or unauthorized access
Significant service degradation affecting customers
Suspected data exfiltration or unauthorized data access
DDoS attacks affecting service availability
Privileged account compromise
Medium (P3) - Response within 8 hours
Malware detected and contained
Minor unauthorized access attempts
Policy violations with security impact
Suspicious network activity
Vendor security incidents affecting our environment
Low (P4) - Response within 24 hours
Security tool alerts requiring investigation
Minor policy violations
Potential security vulnerabilities
Informational security events
Incident Categories
Data Breach : Unauthorized access, use, or disclosure of personal or sensitive data
System Compromise : Unauthorized access to systems or applications
Malware : Detection of malicious software or code
Network Intrusion : Unauthorized network access or suspicious network activity
DDoS Attack : Distributed denial of service attacks
Insider Threat : Malicious or negligent actions by authorized users
Physical Security : Unauthorized physical access or equipment theft
Third-Party Incident : Security incidents at vendors or service providers
Regulatory Violation : Non-compliance with security regulations or standards
Incident Response Team
Core Team Members
Incident Commander
Overall incident response coordination
Communication with executive leadership
Decision-making authority for response actions
External communication coordination
Security Lead
Technical investigation and analysis
Evidence collection and preservation
Security tool coordination (Wazuh SIEM, Nessus, Bitdefender)
Threat intelligence analysis
IT Operations Lead
System containment and isolation
Service restoration and recovery
Infrastructure changes and updates
Cloud platform coordination (AWS, Azure, GCP)
Legal/Compliance Officer
Regulatory notification requirements
Legal implications assessment
Evidence handling oversight
Customer notification coordination
Communications Lead
Internal communications
Customer communications
Media relations (if required)
Stakeholder updates
Extended Team (As Required)
Human Resources
Business Unit Leaders
External Legal Counsel
Forensics Specialists
Law Enforcement Liaisons
Incident Response Process
Phase 1: Detection and Analysis
Detection Sources
Wazuh SIEM : Automated threat detection and alerting
Cloudflare Security : Network-level threat detection
Bitdefender GravityZone : Endpoint protection alerts
Nessus Professional : Vulnerability scan findings
User Reports : Employee and customer incident reports
Third-Party Notifications : Vendor security alerts
Threat Intelligence : External threat feeds and indicators
Initial Analysis Steps
Verify Incident : Confirm legitimate security incident vs. false positive
Initial Classification : Assign preliminary severity and category
Scope Assessment : Determine affected systems, data, and users
Timeline Establishment : Identify when incident likely began
Evidence Preservation : Secure logs and system state information
Documentation Requirements
Incident ticket creation with unique identifier
Initial incident report with timeline
Evidence collection log
Communication log
Decision log
Phase 2: Containment, Eradication, and Recovery
Short-term Containment
Immediate Actions : Isolate affected systems using Cloudflare Zero Trust controls
Account Security : Disable compromised accounts and force password resets
Network Isolation : Segment affected network segments
System Isolation : Quarantine compromised endpoints using Bitdefender
Service Shutdown : Temporarily disable affected services if necessary
Evidence Collection
System Images : Create forensic images of affected systems
Log Collection : Gather logs from Wazuh SIEM and all relevant systems
Network Captures : Collect network traffic data
Memory Dumps : Capture system memory for analysis
Documentation : Record all evidence collection activities
Long-term Containment
System Rebuilding : Rebuild compromised systems from clean backups
Configuration Updates : Apply security patches and configuration changes
Monitoring Enhancement : Increase monitoring on affected systems
Access Review : Review and update access controls
Eradication
Malware Removal : Remove malicious software using Bitdefender and manual methods
Vulnerability Patching : Address vulnerabilities identified by Nessus
Configuration Hardening : Implement additional security controls
Account Cleanup : Remove unauthorized accounts and access
Recovery
System Restoration : Restore systems from clean backups
Service Testing : Verify system functionality and security
Monitoring : Enhanced monitoring during recovery period
User Communication : Notify users of service restoration
Phase 3: Post-Incident Activities
Lessons Learned
Incident Review Meeting : Conduct post-incident review within 5 business days
Timeline Analysis : Create detailed incident timeline
Response Evaluation : Assess response effectiveness
Improvement Identification : Identify process and technology improvements
Documentation Updates
Procedure Updates : Revise incident response procedures
Playbook Updates : Update incident-specific playbooks
Training Updates : Modify training materials based on lessons learned
Technology Updates : Implement security tool improvements
Regulatory and Legal Requirements
Notification Timeline : Meet regulatory notification deadlines
Documentation Retention : Preserve incident documentation per legal requirements
Audit Preparation : Prepare documentation for potential audits
Insurance Claims : Coordinate with cyber insurance providers
Communication Procedures
Internal Communications
Executive Notification
Critical incidents: Immediate notification
High severity incidents: Within 1 hour
Medium severity incidents: Within 4 hours
Low severity incidents: Daily summary report
Customer Communications
Data breach notifications per regulatory requirements
Service outage notifications via status page
Security improvement communications
Incident resolution notifications
Regulatory Notifications
GDPR: Within 72 hours of awareness
CCPA: Without unreasonable delay
Sector-specific regulations as applicable
Law enforcement as required
External Communications
Template Communications
Customer breach notification templates
Regulatory notification templates
Media response templates
Vendor notification templates
Approval Process
Legal review for all external communications
Executive approval for regulatory notifications
Communications team approval for customer notifications
Training and Awareness
Regular Training Requirements
Annual incident response training for all personnel
Quarterly tabletop exercises
Annual full-scale incident simulation
Role-specific training for incident response team members
Awareness Programs
Security incident reporting procedures
Phishing and social engineering awareness
Insider threat indicators
Customer security education
Technology and Tools
Primary Tools
Wazuh SIEM : Central logging, monitoring, and alerting
Cloudflare Zero Trust : Network security and access control
Bitdefender GravityZone : Endpoint protection and response
Nessus Professional : Vulnerability management
AWS/Azure/GCP Security Tools : Cloud-specific security monitoring
Forensics Tools
Specialized forensics software for evidence analysis
Network analysis tools for traffic examination
Memory analysis tools for malware investigation
Mobile device forensics tools
Communication Tools
Secure incident communication channels
Emergency notification systems
Video conferencing for remote coordination
Encrypted messaging for sensitive communications
Quality Assurance and Continuous Improvement
Metrics and KPIs
Mean time to detection (MTTD)
Mean time to containment (MTTC)
Mean time to recovery (MTTR)
Incident volume and trends
Customer impact metrics
Regulatory compliance metrics
Regular Reviews
Monthly incident trend analysis
Quarterly procedure reviews
Annual tabletop exercises
Continuous threat landscape monitoring
Process Improvements
Technology capability enhancements
Training program updates
Communication process refinements
Cross-functional coordination improvements
Incident Response Playbooks
Data Breach Response Playbook
Immediate Actions (0-1 hours)
Activate incident response team
Assess scope of data potentially affected
Contain the breach source
Preserve evidence
Begin preliminary impact assessment
Short-term Actions (1-24 hours)
Complete detailed impact assessment
Determine personal data categories affected
Identify affected individuals
Assess regulatory notification requirements
Begin customer impact analysis
Recovery Actions (24-72 hours)
Implement containment measures
Begin system restoration
Prepare regulatory notifications
Draft customer communications
Coordinate with legal counsel
Ransomware Response Playbook
Immediate Actions (0-30 minutes)
Isolate affected systems immediately
Preserve system state for forensics
Assess backup integrity
Document ransom demands
Coordinate with law enforcement
Short-term Actions (30 minutes - 4 hours)
Complete network isolation
Assess backup recovery options
Determine business impact
Coordinate with cyber insurance
Develop recovery timeline
Recovery Actions (4+ hours)
Begin system restoration from backups
Implement additional security controls
Verify system integrity
Resume business operations
Conduct post-incident review
Previous Versions
The previous versions of our Policies and other documents can be seen at GitHub