-
Introduction
- Net Onboard Sdn Bhd is committed to maintaining a proactive and structured approach to detecting, managing, and mitigating security incidents.
-
This Incident Response Policy aligns with:
- ISO 27001 (Information Security Management System)
- NIST Incident Response Framework
- Malaysia’s Personal Data Protection Act (PDPA) 2010
- General Data Protection Regulation (GDPR) (if applicable to EU users)
- This policy outlines the steps, roles, and responsibilities in responding to cybersecurity incidents, data breaches, and system disruptions.
-
Scope & Applicability
-
This policy applies to:
- All users, employees, vendors, and third-party service providers handling Net Onboard’s IT systems and cloud services.
- All IT infrastructure, networks, applications, and databases under Net Onboard’s control.
-
It covers:
- Cybersecurity threats (malware, hacking, phishing, ransomware).
- Unauthorized access (data breaches, account compromises, insider threats).
- Service disruptions (DDoS attacks, system failures, infrastructure malfunctions).
-
This policy applies to:
-
Incident Classification & Severity Levels
- All incidents are categorized based on severity and impact:
-
Critical Severity
- Description: Data breach, ransomware attack, or full system outage
- Response Time: 30 minutes
- Resolution Target: Within 4 hours
-
High Severity
- Description: Major security threat or unauthorized access detected
- Response Time: 30 minutes
- Resolution Target: Within 8 hours
-
Medium Severity
- Description: Suspicious activity or partial service disruption
- Response Time: 1 hour
- Resolution Target: Within 24 hours
-
Low Severity
- Description: Minor security alerts, such as failed login attempts
- Response Time: 4 hours
- Resolution Target: By the next business day
-
Incident Response Lifecycle
-
Phase 1: Identification
- Continuous security monitoring & log analysis is performed.
- Alerts from firewalls, IDS/IPS systems, antivirus software, and AI-based anomaly detection are reviewed.
- Users must report security concerns immediately via [email protected].
-
Phase 2: Containment
- Affected systems will be isolated to prevent further damage.
- Immediate account lockout and network segmentation measures will be applied.
- Third-party cybersecurity teams may be engaged for emergency response.
-
Phase 3: Eradication
- Malicious code, unauthorized access, or compromised credentials will be removed.
- Security patches and system updates will be deployed.
- Network security policies will be reviewed to prevent recurrence.
-
Phase 4: Recovery
- Affected systems will be restored from secure backups (geo-redundant storage).
- Service functionality will be tested before reconnecting to production environments.
- Continuous monitoring for residual threats will continue.
-
Phase 5: Post-Incident Review & Reporting
- A detailed incident report will be generated, documenting findings and lessons learned.
- Root cause analysis (RCA) will be performed.
- Security policies and user awareness training will be updated accordingly.
-
Phase 1: Identification
-
Data Breach Notification & Compliance
-
If a data breach is confirmed:
- Affected users will be notified within 72 hours in accordance with PDPA & GDPR.
- Regulatory authorities will be informed based on legal requirements.
- Users will receive guidance on protective actions (e.g., password resets, account monitoring).
-
If a data breach is confirmed:
-
User Responsibilities in Security Incidents
-
Users must:
- Report any suspected security incidents or suspicious activity immediately to [email protected].
- Follow company security policies (e.g., using strong passwords, enabling MFA).
- Cooperate with the investigation team during security incidents.
-
Users must:
-
Compliance & Regulatory Standards
-
This policy ensures compliance with:
- ISO 27001 & NIST Cybersecurity Framework
- Malaysia’s Personal Data Protection Act (PDPA) 2010
- General Data Protection Regulation (GDPR) (if applicable)
-
This policy ensures compliance with:
-
Governing Law & Dispute Resolution
- This policy is governed by Malaysian law.
- Disputes regarding security incidents will be handled through mediation before proceeding to arbitration or litigation.
-
Amendments & Updates
- Net Onboard reserves the right to update this Incident Response Policy at any time.
- Users will be notified of material changes via email or system notifications.
For incident reporting and security-related inquiries, contact [email protected].