Skip to main content

Incident Response

Last Updated: 2025-02-17 Status: Complete

Security incidents and data breaches require rapid, coordinated response. For PayFac platforms handling cardholder data, incident response is not optional—it's a PCI-DSS requirement with specific notification timelines.

Quick Reference

NotificationTimelineRecipient
Card networksImmediateVisa, Mastercard
Acquiring bankImmediateSponsor bank
State AG (CA)30 daysAttorney General
Affected customers30-60 daysVaries by state
PCI Forensic InvestigationIf requiredWithin 60 days

Incident vs. Breach

Definitions

TermDefinition
Security IncidentAny event that potentially compromises security
Data BreachConfirmed unauthorized access to sensitive data
Cardholder Data BreachBreach involving PAN, cardholder name, expiration, or service code
Suspected CompromiseIndicators suggest breach may have occurred

Section Contents

Breach Notification

  • Notification timelines by jurisdiction
  • Card network notification requirements
  • Customer notification procedures

Quiz

  • Self-assessment questions

PCI-DSS Incident Response Requirements

PCI-DSS Requirement 12.10 mandates incident response capabilities:

RequirementDescription
12.10.1Incident response plan in place
12.10.2Plan reviewed and tested annually
12.10.3Designated personnel available 24/7
12.10.4Staff trained on response procedures
12.10.5Alerts from security systems monitored
12.10.6Process to modify plan based on lessons learned

Incident Response Team

Team Structure

Roles and Responsibilities

RoleResponsibilities
Incident CommanderOverall coordination, decisions, escalation
Security LeadTechnical investigation, containment
IT OperationsSystem access, logs, remediation
Legal CounselNotification requirements, liability
CommunicationsInternal and external messaging
HREmployee-related incidents
Executive SponsorResource authorization, board updates

Incident Response Phases

Phase Details

PhaseKey ActivitiesTimeline
DetectionAlert triage, initial assessmentMinutes to hours
ContainmentIsolate affected systems, preserve evidenceHours
EradicationRemove threat, patch vulnerabilitiesDays
RecoveryRestore systems, validate securityDays to weeks
Post-IncidentDocument, improve, reportWeeks

Incident Classification

Severity Levels

LevelDescriptionResponse TimeExample
CriticalActive breach, data exfiltrationImmediatePAN database accessed
HighPotential breach, significant risk< 4 hoursMalware on CDE system
MediumSecurity event, limited impact< 24 hoursFailed login attempts
LowMinor event, no immediate risk< 72 hoursPolicy violation

Classification Criteria

FactorCriticalHighMediumLow
Data exposureConfirmedLikelyPossibleNone
Systems affectedCDEConnectedNon-CDEIsolated
Active threatYesPossiblyNoNo
Business impactSevereSignificantLimitedMinimal

Immediate Response Checklist

First 60 Minutes

StepActionOwner
1Alert incident response teamFirst responder
2Activate incident commanderOn-call lead
3Initial assessmentSecurity team
4Classify severityIncident commander
5Begin containment if criticalSecurity team
6Notify legal counselIncident commander
7Start incident logAll

Containment Actions

ActionWhen to Use
Isolate affected systemsConfirmed malware, active threat
Disable compromised accountsCredential theft
Block malicious IPsActive attack
Preserve logs and evidenceAll incidents
Engage forensicsConfirmed breach

Evidence Preservation

What to Preserve

Evidence TypeHow to Preserve
System logsCopy to secure storage
Network logsExport from SIEM
Memory dumpsForensic imaging
Disk imagesFull forensic copy
Access logsExport immediately

Chain of Custody

RequirementImplementation
Document collectionWho, what, when, where
Secure storageEncrypted, access controlled
Hash verificationMD5/SHA256 of files
Access loggingWho accessed evidence

Communication During Incidents

Internal Communication

AudienceInformationTiming
IR TeamFull detailsContinuous
Executive teamStatus, impact, actionsHourly (critical)
Affected departmentsNeed-to-knowAs needed
All employeesGeneral awarenessIf appropriate

External Communication

AudienceInformationTiming
Acquiring bankIncident detailsImmediate
Card networksPer their requirementsImmediate
RegulatorsPer jurisdictionPer timeline
Affected customersPer notification lawPer timeline
MediaPrepared statement onlyIf necessary

References

Share: