Incident Response Procedure
University IT staff members must follow the Incident Response Procedure in the event of an information security incident impacting university infrastructure and IT assets.
Before consulting the procedure, staff must determine whether it is a high-severity or low-severity security incident.
Staff can use the following questions to assist in determining whether the incident is low-severity or high-severity:
- Is the information system involved in this security used to transmit, store or access UF Restricted Data and defined by UF’s Data Classification policy?
- Does this security incident represent more than a minor impact to the unit’s business or operational functions?
“YES” to either of these questions suggests a high-severity incident and should be escalated to the Incident Response Team (IRT) following the procedure below.
High-Severity Incident Response Procedure
- Secure the Evidence
- Do not access, log on or alter the affected IT asset.
- Do not power off or log out of the affected IT asset.
- Unplug the affected IT asset’s network cable from the network port or wall-jack.
- Physically label the IT asset, directing others not to touch or use it.
- Report the Incident
- Contact the UFIT Information Security Office by sending an email to ufirt@ufl.edu or calling (352) 273-1344
- Include documentation of the incident using the following questions:
- When and how was the incident detected?
- What actions have been taken so far? (include the date/time, location, person(s) involved)
- What type of data was the affected IT asset storing, transmitting or processing?
- Be Prepared to Assist the Incident Response Team
The IRT will collect all related system or service logs and ancillary electronic evidence. If necessary, the team will direct all incident response activities, such as containment and remediation tasks, to protect IT resources.
Incident Response Procedure PDF
Click the link below for a printable version of these steps.