This Incident Response Plan exists to ensure that we consistently handle information security events in an effective and efficient manner.
This policy offers guidance for employees, contractors, and consultants of Nested Knowledge who believe they have discovered or are responding to a security incident.
This policy applies to all computer and communication systems owned or operated by Nested Knowledge and its subsidiaries. Systems include company shared drives, purchased software, as well as access to the Nested Knowledge AutoLit review platform. Reviews developed in the AutoLit software by parties external to Nested Knowledge are not covered in this policy.
The incident response (IR) team will consist of the following personnel:
Nested Knowledge Incidence Response Team will maintain a list of security threats and vulnerabilities, classified by likelihood and consequence.
Asset | Threat/Vulnerability | Existing Controls | Likelihood | Consequence | Level of Risk |
---|---|---|---|---|---|
Workstations | Malicious files/ processes Unprotected data | Security policy dissemination and training | Highly Possible | Major | Very High |
NK Application | Injection, privilege escalation, leaks, untrustworthy dependencies | Runtime environment restrictions, mandated code review, dependency locking, developer education, penetration testing | Possible | Major | High |
Databases | Compromised access, through brute force or leaks | Network Isolation, key-based authentication, regular off-site backups | Possible | Major | High |
Servers | Compromised access, through brute force or leaks | Network Isolation, key-based authentication | Possible | Minor | Low |
When an incident is detected, Nested Knowledge personnel should behave as if they reporting a crime and include lots of specific details about what they have discovered.
Nested Knowledge has prepared an incident response form for use while investigating an incident. Nested Knowledge Employees and contractors will be provided with access to the form and instructed to utilize it for all suspected incidents. The IR team will monitor responses and react immediately upon receipt.
In addition to submitting details via the form, Nested Knowledge personnel must email karl.holub@nested-knowledge.com or send a message to #incident-response to notify the security team of suspected issues.
For breachs likely to result in a risk to users or employees, Nseted Knowledge will notify a Supervisory Authority within 72 hours with:
You can report scams, phishing attempts, and other cyber incidents to:
Issues where the malicious actor is an internal employee, contractor, vendor, or partner requires sensitive handling. Please contact the CEO and CTO directly. These are critical issues and must be pushed to follow up.
We categorize incidents by severity and scope of control.
Issues meeting this severity are simply suspicions or odd behaviors. They are not verified and require further investigation. There is no clear indicator that systems have tangible risk and do not require emergency response. This includes suspicious emails, outages, strange activity on a laptop.
High severity issues relate to problems where an active exploitation hasn’t been proven, but is likely to happen. This include vulnerabilities with direct risk of exploitation, threats with risk or adversarial persistence on our systems (eg: backdoors, malware), malicious access of business data (eg: passwords, vulnerability data, payments information), or threats that put any individual at risk of physical harm.
High severity issues should include an email to karl.holub@nested-knowledge.com with “Urgent” in the subject line, or a message to #info-sec with “@channel” in the message to alert incident responders.
Critical issues relate to actively exploited risks and involve a malicious actor. Critical severity issues should involve a message to “@channel” in #info-sec. Continue escalation until you receive acknowledgement. Involvement of a crisis lead and a lawyer are highly recommended.
Incidents may be triggered by events that are inside or outside our scope of control.
We primarily use Slack to coordinate our response to cyber security events. We also use Google Meets call for response update calls. If an issue is classified as Critical Severity we will create a channel in Slack specifically for that issue and include the relevant individuals and assign roles at that time. Phone numbers, email and other details on individuals and our key suppliers can be found in Key Contacts.
For critical issues, the incidence response team will follow an iterative response process designed to investigate, contain exploitation, remediate our vulnerability, and document a post-mortem with the lessons of an incident.
The Technical Lead and Investigators are responsible for capturing and collating data that support the investigation of a security incident.Data and logs should be sourced from Data Sources relevant to the investigation
Data lost or stolen must be taken into account, complying with state and federal laws mentioned in Part 1.
Name | Function | Contact |
---|---|---|
Kevin Kallmes | CEO - critical decisions, public relations | kevinkallmes@supedit.com |
Karl Holub | CTO - technical lead | karl.holub@nested-knowledge.com |
Kathryn Cowie | COO - coordination, documenting response an decisions | kathryn.cowie@nested-knowledge.com |
John Fallone | Lawyer - legal assistance | john@fallonesv.com |
Timestamp | Event | Description | Reported By | Status |
---|---|---|---|---|
01-17-2023 10:34 ET | Phishing email | Fraudulent email requesting payroll: moved to SPAM, blocked sender, and deleted. | Kathryn Cowie | Resolved 01-17-2023 10:37 ET |
Author | Date of Revision/Review | Comments |
---|---|---|
K. Cowie | 11/15/2021 | Initial draft in progress; risk register needs technical review. |
K. Kallmes | 11/19/2021 | Draft approved |
K. Holub | 03/11/2024 | Review and updates |
P. Olaniran | 9/29/2022 | Minor revisions |
Nested Knowledge Incidence Response Team will maintain a list of security threats and vulnerabilities, classified by likelihood and consequence.
Asset | Threat/Vulnerability | Existing Controls | Likelihood | Consequence | Level of Risk |
---|---|---|---|---|---|
Workstations | Malicious files/ processes Unprotected data | Security policy dissemination and training | Highly Possible | Major | Very High |
NK Application | Injection, privilege escalation, leaks, untrustworthy dependencies | Runtime environment restrictions, mandated code review, dependency locking, developer education, penetration testing | Possible | Major | High |
Databases | Compromised access, through brute force or leaks | Network Isolation, key-based authentication, regular off-site backups | Possible | Major | High |
Servers | Compromised access, through brute force or leaks | Network Isolation, key-based authentication | Possible | Minor | Low |
When an incident is detected, Nested Knowledge personnel should behave as if they reporting a crime and include lots of specific details about what they have discovered.
Nested Knowledge has prepared an incident response form for use while investigating an incident. Nested Knowledge Employees and contractors will be provided with access to the form and instructed to utilize it for all suspected incidents. The IR team will monitor responses and react immediately upon receipt.
In addition to submitting details via the form, Nested Knowledge personnel must email karl.holub@nested-knowledge.com or send a message to #incident-response to notify the security team of suspected issues.
For breachs likely to result in a risk to users or employees, Nseted Knowledge will notify a Supervisory Authority within 72 hours with:
You can report scams, phishing attempts, and other cyber incidents to:
Issues where the malicious actor is an internal employee, contractor, vendor, or partner requires sensitive handling. Please contact the CEO and CTO directly. These are critical issues and must be pushed to follow up.
We categorize incidents by severity and scope of control.
Issues meeting this severity are simply suspicions or odd behaviors. They are not verified and require further investigation. There is no clear indicator that systems have tangible risk and do not require emergency response. This includes suspicious emails, outages, strange activity on a laptop.
High severity issues relate to problems where an active exploitation hasn’t been proven, but is likely to happen. This include vulnerabilities with direct risk of exploitation, threats with risk or adversarial persistence on our systems (eg: backdoors, malware), malicious access of business data (eg: passwords, vulnerability data, payments information), or threats that put any individual at risk of physical harm.
High severity issues should include an email to karl.holub@nested-knowledge.com with “Urgent” in the subject line, or a message to #info-sec with “@channel” in the message to alert incident responders.
Critical issues relate to actively exploited risks and involve a malicious actor. Critical severity issues should involve a message to “@channel” in #info-sec. Continue escalation until you receive acknowledgement. Involvement of a crisis lead and a lawyer are highly recommended.
Incidents may be triggered by events that are inside or outside our scope of control.
We primarily use Slack to coordinate our response to cyber security events. We also use Google Meets call for response update calls. If an issue is classified as Critical Severity we will create a channel in Slack specifically for that issue and include the relevant individuals and assign roles at that time. Phone numbers, email and other details on individuals and our key suppliers can be found in Key Contacts.
For critical issues, the incidence response team will follow an iterative response process designed to investigate, contain exploitation, remediate our vulnerability, and document a post-mortem with the lessons of an incident.
The Technical Lead and Investigators are responsible for capturing and collating data that support the investigation of a security incident.Data and logs should be sourced from Data Sources relevant to the investigation
Data lost or stolen must be taken into account, complying with state and federal laws mentioned in Part 1.
Name | Function | Contact |
---|---|---|
Kevin Kallmes | CEO - critical decisions, public relations | kevinkallmes@supedit.com |
Karl Holub | CTO - technical lead | karl.holub@nested-knowledge.com |
Kathryn Cowie | COO - coordination, documenting response an decisions | kathryn.cowie@nested-knowledge.com |
John Fallone | Lawyer - legal assistance | john@fallonesv.com |
Timestamp | Event | Description | Reported By | Status |
---|---|---|---|---|
01-17-2023 10:34 ET | Phishing email [Example] | Fraudulent email requesting payroll: moved to SPAM, blocked sender, and deleted. | Kathryn Cowie | Resolved 01-17-2023 10:37 ET |
Author | Date of Revision/Review | Comments |
---|---|---|
K. Cowie | 11/15/2021 | Initial draft in progress; risk register needs technical review. |
K. Kallmes | 11/19/2021 | Draft approved |
K. Holub | 03/11/2024 | Review and updates |
P. Olaniran | 9/29/2022 | Minor revisions |