Incident Communication Policy

Control 17
Applicable Safeguards: 17.1 17.2 17.7

1. Purpose

Establish requirements for internal and external communications during and after cybersecurity incidents to ensure accurate, timely, and coordinated messaging.

2. Scope

This policy applies to all communications related to cybersecurity incidents at [ORGANIZATION], including internal notifications, external disclosures, regulatory notifications, and media communications.

3. Policy

3.1 Internal Communications

3.1.1

Internal incident communications shall be coordinated by the Incident Commander and Communications Lead as defined in the Incident Response Policy.

3.1.2

Internal stakeholder notification shall follow this escalation path: P1 incidents (CEO, executive team, board as appropriate, all within [CUSTOMIZE: 1 hour] of confirmation), P2 incidents (CISO, CIO, affected department heads within [CUSTOMIZE: 4 hours]), P3/P4 incidents (security management within standard workflow).

3.1.3

All internal communications shall use pre-approved templates where available and shall be factual without speculation.

3.1.4

Incident communications shall use secure channels (encrypted email, secure messaging) and shall not include technical indicators of compromise that could aid an attacker.

3.2 External Communications

3.2.1

All external communications regarding security incidents shall be approved by [CUSTOMIZE: Legal/CISO/CEO] before release.

3.2.2

Only designated spokespersons may communicate with media regarding security incidents. All media inquiries shall be directed to [CUSTOMIZE: Communications/PR team].

3.2.3

Customer notifications shall be clear, actionable, and include: description of the incident, data or services affected, steps [ORGANIZATION] is taking, steps the customer should take, and contact information for questions.

3.2.4

Law enforcement notification shall be coordinated by [CUSTOMIZE: Legal/CISO] when the incident involves criminal activity.

3.3 Regulatory Notifications

3.3.1

[ORGANIZATION] shall maintain a register of all applicable breach notification requirements by jurisdiction and regulation.

3.3.2

Regulatory notifications shall be submitted within required timeframes and shall include all information required by the applicable regulation.

3.3.3

Copies of all regulatory notifications shall be retained by [CUSTOMIZE: Legal Department] for at least [CUSTOMIZE: 7 years].

4. Compliance

4.1

Compliance with this policy is mandatory for all personnel within its scope. Compliance will be monitored through periodic audits, automated controls, and management review.

4.2

Exceptions to this policy must be documented with a business justification, approved by [CUSTOMIZE: CISO/Security Team], and reviewed at least annually.

5. Enforcement

5.1

Violations of this policy may result in disciplinary action up to and including termination of employment or contract, and may result in civil or criminal penalties where applicable law has been violated.

5.2

[ORGANIZATION] reserves the right to audit compliance with this policy at any time, with or without notice.

6. Review and Revision

6.1

This policy shall be reviewed at least annually by [CUSTOMIZE: CISO/Policy Owner] and updated as necessary to reflect changes in the threat landscape, regulatory requirements, or organizational structure.

6.2

All revisions shall be documented with version number, date, author, and description of changes.

Policy Approval

Approved By

[CUSTOMIZE]

Title

[CUSTOMIZE]

Date

[CUSTOMIZE]

Document Control

Version: [CUSTOMIZE: 1.0]
Effective Date: [CUSTOMIZE]
Last Reviewed: [CUSTOMIZE]
Next Review: [CUSTOMIZE]
Classification: Internal