Thresholds & contacts (NZ‑centric)
- Privacy Act 2020 — serious harm test: If a breach is likely to cause serious harm, consult counsel and the Privacy Officer; consider notifying the Office of the Privacy Commissioner (OPC) and affected individuals.
- Cyber incidents: Engage CERT NZ for guidance and coordination where appropriate.
- Agency heads‑up: Provide an initial notification to the Agency contact within 24 hours, even if facts are preliminary; follow with updates (e.g., T+48h, T+72h).
Decision aid (record answers in the Breach Assessment form)
- What happened? (loss/theft/unauthorised access/malware/misdelivery)
- What data and how sensitive? Was it encrypted?
- Who accessed/exposed it, and for how long?
- Can we contain or recall it? (e.g., link recall, OAuth revoke, inbox rule purge)
- Potential impacts on individuals/Agency? (financial, safety, identity, trust)
- Regulatory/contract triggers (OPC, contractual notice windows)?
Outcome: Notify OPC/individuals / Notify Agency only / Monitor — record rationale, approvers, and timestamps.
Notification & Decision
Third‑party & SaaS (incl. Microsoft 365) micro‑runbook
- Containment: purge/ZAP malicious mail; disable/risk revoke OAuth consents; remove malicious inbox rules; quarantine compromised sessions; isolate affected endpoints via EDR.
- Identity: enforce password reset & MFA; check Conditional Access and break‑glass accounts; review recent sign‑ins and risky users.
- Data exposure: recall external links (SharePoint/OneDrive); tighten external sharing; review DLP hits; snapshot access logs.
- Backup/DR: verify immutability and identify clean restore points before any restore; record RTO/RPO.
- Vendors: invoke supplier notification (≤48h); request incident ticket/summary; align on joint notice language.
Third‑party / SaaS Micro‑Runbook
Safety gate: If any risk to health & safety is suspected (e.g., field/OT/visitor impact), pause technical actions that could worsen safety, and invoke PCBU procedures.
Follow the PCBU H&S Policy, log an H&S incident if applicable, and coordinate with the Agency’s safety contacts.
Safety Gate (PCBU/H&S)
Forensics & Evidence Handling
- Synchronise time sources; capture volatile data where needed; do not wipe affected assets before capture.
- Maintain chain‑of‑custody; record hashes; store artefacts in the designated evidence repository.
- Retain logs, tickets, approvals, meeting minutes, exports (e.g., KQL results) per the retention schedule; mark sensitive records.
- Document every action with actor, timestamp, and reason; attach screenshots where helpful.
Post‑incident review: complete within 10 business days for SEV1/SEV2; capture actions into the Service Improvement backlog with owners and due dates.
Appendix A — Communications Templates
Exercises & Aftercare
- Conduct at least one annual tabletop exercise and after any SEV1/SEV2 incident.
- Track corrective actions to closure; report progress in service reviews.
Appendix B — Forensics & Evidence
Communication Templates (snippets)
- Agency heads‑up (initial ≤24h): “We are investigating a suspected security incident discovered on <date/time>. Affected systems/data: <summary>. Containment actions: <summary>. Next update: <T+48h>. Contacts: Incident Commander & Privacy Officer.”
- OPC notice (if serious harm likely): facts known/unknown, categories of data, affected individuals, containment, remediation, contact for follow‑up.
- Individuals (if required): what happened, what we’re doing, recommended actions, support channels.
Customise per Agency contract; legal review as appropriate.
Exercises & Aftercare
Evidence & Records
Records are maintained per the VGL Document & Record Control guidelines, including logs, approvals, test outputs, meeting minutes, and reports.