IR-09 Information Spillage Response

Incident Response

Description

Respond to information spills by: Assigning [Assignment: organization-defined parameters] with responsibility for responding to information spills; Identifying the specific information involved in the system contamination; Alerting [Assignment: organization-defined parameters] of the information spill using a method of communication not associated with the spill; Isolating the contaminated system or system component; Eradicating the information from the contaminated system or component; Identifying other systems or system components that may have been subsequently contaminated; and Performing the following additional actions: [Assignment: organization-defined parameters].

Supplemental Guidance

Information spillage refers to instances where information is placed on systems that are not authorized to process such information. Information spills occur when information that is thought to be a certain classification or impact level is transmitted to a system and subsequently is determined to be of a higher classification or impact level. At that point, corrective action is required. The nature of the response is based on the classification or impact level of the spilled information, the security capabilities of the system, the specific nature of the contaminated storage media, and the access authorizations of individuals with authorized access to the contaminated system. The methods used to communicate information about the spill after the fact do not involve methods directly associated with the actual spill to minimize the risk of further spreading the contamination before such contamination is isolated and eradicated.

Changes from Rev 4

No significant title changes from Rev 4.

Compliance Mappings

ISO 27002:2022

5.26

COBIT 2019

DSS02

CIS Controls v8

CIS 17

SOC 2 TSC

CC7.4

PCI DSS v4.0.1

12.10

FINOS CCC

CCC-C15

ISO 42001:2023

A.3.3A.8.4

NIS2 Directive

Art. 21(2)(b)Art. 23

APRA CPS 234

Para 25

BSI IT-Grundschutz

DER.2.1

ANSSI

Hygiene.35Hygiene.40SecNumCloud.17.1

FINMA Circular 2023/1

IV.A(41)IV.A(43)IV.A(45)IV.A(46)IV.C(70)IV.D(71)IV.D(73)IV.D(74)

OSFI B-13

B-13.2.5B-13.3.4

EU GDPR

Art.33(2)Art.33(5)

EU DORA

Art.17(1)Art.17(2)Art.17(3)

BIO2

5.26

RBI CSF

Annex1.19

FISC Security Guidelines

FISC.O4

LGPD + BCB 4893

BCB.Art.7LGPD.Art.48

HKMA TM-E-1

TME1.5.4TME1.7.5

SAMA CSF

3.6

NCA ECC

2-13

UAE IA

T11

CBB TM

TM-13

Qatar NIA

IM

CBUAE

CR-9

CBE CSF

CD-2

SA JS2

JS2-7.4

CBN CSF

Part3.6

BoG CISD

CISD-VII

POPIA

s22

BoM CTRM

5.1

IOSCO Cyber Resilience

RR-1

CPMI-IOSCO PFMI

CG.RR

FFIEC IS

III.C

HIPAA Security Rule

ยง164.308(a)(6)(i)

ECB CROE

CROE.2.5.1

EBA ICT Guidelines

3.5(d)

SEBI CSCRF

RS.ANRS.MA

BOT Cyber Resilience

Ch4.1

CMMC 2.0

IR

Solvency II

EIOPA-ICT-4.9

Lloyd's Minimum Standards

MS8.5

HITRUST CSF v11

11.b

ISO 27799

16.2

NHS DSPT

NDG-6.2

SEC Custody (Digital Assets)

SEC-CD-11