Documenting Breach Response Procedures
Response procedures define the tasks that incident handlers should complete or the guidelines or checklists they should follow when responding to a breach. Archer Cyber Incident & Breach Response allows you to maintain a library of all of your standard response procedures.
By defining response procedures, you can provide incident handlers with guidance and consistent processes for reviewing incidents and handling breaches. When a breach response team member selects impacted regulations, any response procedures that match those regulations are automatically copied from the Breach Response Procedure Library into the Breach Tasks application and linked to the breach record.
Document breach response procedures using the following steps:
-
Create a new record in Breach Response Procedure Library.
-
Provide the following information:
-
The name and description of the procedure.
-
The priority level of the breach to which this response procedure should apply.
-
If the procedure is required or optional.
-
The active status of the procedure.
-
The default user group, in the Target field, who should implement the procedure.
-
For a breach procedure, select any applicable regulations to which this procedure should apply.
-
Save the record.