Incident Notification
This document provides guidance to Texas A&M University System members for submitting incident notifications to Texas A&M System Cybersecurity.
Title 1 Texas Administrative Code § 202.1 defines "security incident" as "an event which results in the accidental or deliberate unauthorized access, loss, disclosure, modification, disruption, or destruction of information or information resources."1 Texas A&M System security control standard IR-6 requires system members to notify Texas A&M System Cybersecurity and consult with the System Chief Information Security Officer regarding incidents involving their information and information systems, whether managed by the member, contractor, or other source. This includes privacy incidents that do not impact information systems and any incidents involving industrial control systems or operational technology.
These guidelines support Texas A&M System Cybersecurity in executing its mission objectives and provide the following benefits:
-
Greater quality of information – Alignment with incident reporting and handling guidance from NIST 800-61 Revision 22 to introduce functional, informational, and recoverability impact classifications
-
Improved information sharing and situational awareness – Establishing an 12-hour notification timeframe for all incidents to improve Texas A&M System Cybersecurity’s ability to understand cybersecurity events affecting the system and make timely required notifications to other system offices
-
Faster incident response times – Moving cause analysis to the closing phase of the incident handling process to expedite initial notification
Notification Requirement
Users of information resources at Texas A&M System members must report information security incidents to their institution's information security office following local published procedures. Only member CIOs, ISOs or designees should submit an incident notification to Texas A&M System Cybersecurity.
System members must report incidents where the confidentiality, integrity, or availability of a member high-impact information system, or a system processing confidential information, is potentially compromised.
System members shall notify Texas A&M System Cybersecurity with the required data elements, as well as any other available information, within 12 hours of being identified by the member or Texas A&M System Cyber Operations. A&M System Cybersecurity will ensure notifications are made to the pertinent system offices.
System members determine which officials of the member institution are to be notified of an incident, but must include the following notifications within 24 hours of being identified by the member or Texas A&M System Cyber Operations:
-
Agency Director/University President or designee
-
Chief Information Officer (CIO) / Information Resources Manager (IRM)
-
Chief Information Security Officer (CISO) / Information Security Officer (ISO)
-
Chief Research Officer (CRO) (when the compromised/potentially compromised information includes research data)
-
Department Head / Information Resource Custodian of affected information resources
Notifications to affected third parties (e.g., vendors, partners) and affected individuals shall be made in accordance with Tex. Bus. & Comm. Code § 521.0023 and with the guidance and concurrence of the System Office of General Counsel.
In some cases, it may not be feasible to have complete and validated information for Submitting Incident Notifications prior to reporting. System members should provide their best estimate at the time of notification and report updated information as it becomes available. Events that have been found by the reporting system member not to impact confidentiality, integrity or availability may be reported voluntarily.
Submitting Incident Notifications
The information elements described in steps 1-8 below are required when initially notifying Texas A&M System Cybersecurity of an incident:
-
Identify the system member(s) affected by the incident
-
Provide the date/time when the activity was first detected
-
Provide a brief description of the incident
-
Determine whether the confidentiality, integrity, and/or availability of organizational information systems were potentially compromised
-
Identify the currently known level of impact on system member functions or services
-
Identify the location and most severe characterization of observed activity
-
Identify the currently known level of impact to organizational information
-
Estimate the scope of time and resources needed to recover from the incident
Submit the notification to Texas A&M System Cybersecurity via the Incident Notification Reporting Form.
Any threat indicators, including signatures, IPs, emails, domains, etc. developed in relationship to the incident may be provided by replying to the acknowledgement email you receive after submitting the Incident Reporting Form. Any confidential information may be encrypted via PGP/GPG key before submission.
If more information is needed once the Incident Reporting Form is reviewed, A&M System Cybersecurity will follow-up with the point of contact indicated on the form. The original reporting person will also be included in all communications.
Impact Category Descriptions
The table below defines each impact category description and its associated severity levels. Use the tables below to identify impact levels and incident details.
Note: Incidents may affect multiple types of data; therefore, system members may select multiple options when identifying the information impact. The security categorization of information and information systems must be determined in accordance with Federal Information Processing Standards (FIPS) Publication 199.4 Specific thresholds for loss-of-service availability (e.g., all, subset, loss of efficiency) must be defined by the reporting organization. Contact the System Research Security Office for guidance on responding to classified and research controlled unclassified information data spillage.
Impact Category | Category Severity Levels |
---|---|
Functional Impact - A measure of the impact to business functionality or ability to provide the services | DENIAL OF CRITICAL SERVICES/LOSS OF CONTROL – A critical system has been rendered unavailable DENIAL OF NON-CRITICAL SERVICES – A non-critical system is denied or destroyed SIGNIFICANT IMPACT TO CRITICAL SERVICES – A critical system has a significant impact, such as local administrative account compromise SIGNIFICANT IMPACT TO NON-CRITICAL SERVICES – A non-critical service or system has a significant impact MINIMAL IMPACT TO CRITICAL SERVICES – Minimal impact but to a critical system or service, such as email or active directory MINIMAL IMPACT TO NON-CRITICAL SERVICES – Some small level of impact to non-critical systems and services NO IMPACT TO SERVICES - Event has no impact to any business or Industrial Control Systems (ICS) services or delivery to entity customers NO IMPACT - Event has no impact |
Information Impact – Describes the type of information lost, compromised, or corrupted | DESTRUCTION OF CRITICAL SYSTEM – Destructive techniques, such as MBR overwrite; have been used against a critical system DESTRUCTION OF NON-CRITICAL SYSTEMS – Destructive techniques, such as master boot record (MBR) overwrite; have been used against a non-critical system CORE CREDENTIAL COMPROMISE – Core system credentials (such as domain or enterprise administrative credentials) or credentials for critical systems have been exfiltrated CRITICAL SYSTEMS DATA BREACH - Data pertaining to a critical system has been exfiltrated PRIVACY DATA BREACH – The confidentiality of personally identifiable information (PII) or sensitive personal information (SPI) was compromised PROPRIETARY INFORMATION BREACH – The confidentiality of unclassified proprietary information, such as protected critical infrastructure information (PCII), intellectual property, or trade secrets was compromised SUSPECTED BUT NOT IDENTIFIED – A data loss or impact to availability is suspected, but no direct confirmation exists NO IMPACT – No known data impact |
Recoverability – Identifies the scope of resources needed to recover from the incident | NOT RECOVERABLE – Recovery from the incident is not possible (e.g., sensitive data exfiltrated and posted publicly) EXTENDED – Time to recovery is unpredictable; additional resources and outside help are needed SUPPLEMENTED – Time to recovery is predictable with additional resources REGULAR – Time to recovery is predictable with existing resources |
Reporting Contact Information
-
Supplemental Info / Indicator of Compromise Details: contact@cyber.tamus.edu (PGP/GPG Key for Encrypted Email)
-
Cyber Operations Hotline: (979) 234-0030 Opt. 3
Footnotes
-
Title 1 Texas Administrative Code § 202.76, Security Control Standards Catalog. ↩
-
NIST Special Publication 800-61 Rev 2, Computer Security Incident Handling Guide, August 2012. ↩
-
Texas Business and Commerce Code § 521.002, Unauthorized Use of Identifying Information. ↩
-
Federal Information Processing Standard Publication 199, Standards for Security Categorization of Federal Information and Information Systems. ↩