Virtus Group logo

Virtus Group - Breach Response Procedure

v1.2 FINAL • Standardised 2025-09-04
Owner: Virtus Group Ltd • Audience: Clients, Reviewers & Operations • Classification: Public • Next Review: 2026-09-04

Executive Summary

This document describes Virtus Group’s standard for this area and how it is applied in practice. It is derived from our internal policies and standards and is intended for both reviewers and operations.

Scope & Assumptions

Requirements (Key Controls)

Procedures / Playbooks

TriggerActionOwner
Suspected personal-data breachEscalate to Privacy Officer; start incident logIncident Commander
Confirmed breach with risk to individualsNotify affected data subjects; consult regulator as required by lawPrivacy Officer
Evidence handlingPreserve logs & records per Document & Record ControlComms Lead / Forensics

Roles & RACI

RoleResponsibility
Incident CommanderOwns decisions, comms, and timeline
Core Infra LeadIdentity, directory, DNS/DHCP, virtualization
Network LeadWAN/SD-WAN, firewalls, VPN
Apps/Data LeadDB/app restores, file services, integrity
Comms/Privacy OfficerStakeholder & regulatory notifications

Baseline Targets

  • Internal decision on notification ≤ 72 hours with Privacy Officer
  • Evidence handling per Document & Record Control; chain‑of‑custody maintained
  • Third‑party breach notice window: ≤ 48 hours (contractual)

KPIs & Reporting

Thresholds & contacts (NZ‑centric)

  • Privacy Act 2020 — serious harm test: If a breach is likely to cause serious harm, consult counsel and the Privacy Officer; consider notifying the Office of the Privacy Commissioner (OPC) and affected individuals.
  • Cyber incidents: Engage CERT NZ for guidance and coordination where appropriate.
  • Agency heads‑up: Provide an initial notification to the Agency contact within 24 hours, even if facts are preliminary; follow with updates (e.g., T+48h, T+72h).

Decision aid (record answers in the Breach Assessment form)

  1. What happened? (loss/theft/unauthorised access/malware/misdelivery)
  2. What data and how sensitive? Was it encrypted?
  3. Who accessed/exposed it, and for how long?
  4. Can we contain or recall it? (e.g., link recall, OAuth revoke, inbox rule purge)
  5. Potential impacts on individuals/Agency? (financial, safety, identity, trust)
  6. Regulatory/contract triggers (OPC, contractual notice windows)?

Outcome: Notify OPC/individuals / Notify Agency only / Monitor — record rationale, approvers, and timestamps.

Notification & Decision

Third‑party & SaaS (incl. Microsoft 365) micro‑runbook

  1. Containment: purge/ZAP malicious mail; disable/risk revoke OAuth consents; remove malicious inbox rules; quarantine compromised sessions; isolate affected endpoints via EDR.
  2. Identity: enforce password reset & MFA; check Conditional Access and break‑glass accounts; review recent sign‑ins and risky users.
  3. Data exposure: recall external links (SharePoint/OneDrive); tighten external sharing; review DLP hits; snapshot access logs.
  4. Backup/DR: verify immutability and identify clean restore points before any restore; record RTO/RPO.
  5. Vendors: invoke supplier notification (≤48h); request incident ticket/summary; align on joint notice language.

Third‑party / SaaS Micro‑Runbook

Safety gate: If any risk to health & safety is suspected (e.g., field/OT/visitor impact), pause technical actions that could worsen safety, and invoke PCBU procedures.

Follow the PCBU H&S Policy, log an H&S incident if applicable, and coordinate with the Agency’s safety contacts.

Safety Gate (PCBU/H&S)

Forensics & Evidence Handling

  • Synchronise time sources; capture volatile data where needed; do not wipe affected assets before capture.
  • Maintain chain‑of‑custody; record hashes; store artefacts in the designated evidence repository.
  • Retain logs, tickets, approvals, meeting minutes, exports (e.g., KQL results) per the retention schedule; mark sensitive records.
  • Document every action with actor, timestamp, and reason; attach screenshots where helpful.

Post‑incident review: complete within 10 business days for SEV1/SEV2; capture actions into the Service Improvement backlog with owners and due dates.

Appendix A — Communications Templates

Exercises & Aftercare

  • Conduct at least one annual tabletop exercise and after any SEV1/SEV2 incident.
  • Track corrective actions to closure; report progress in service reviews.

Appendix B — Forensics & Evidence

Communication Templates (snippets)

  • Agency heads‑up (initial ≤24h): “We are investigating a suspected security incident discovered on <date/time>. Affected systems/data: <summary>. Containment actions: <summary>. Next update: <T+48h>. Contacts: Incident Commander & Privacy Officer.”
  • OPC notice (if serious harm likely): facts known/unknown, categories of data, affected individuals, containment, remediation, contact for follow‑up.
  • Individuals (if required): what happened, what we’re doing, recommended actions, support channels.

Customise per Agency contract; legal review as appropriate.

Exercises & Aftercare

Evidence & Records

Records are maintained per the VGL Document & Record Control guidelines, including logs, approvals, test outputs, meeting minutes, and reports.

© Virtus Group Ltd