The Cyber Security Agency of Singapore (CSA) and the Personal Data Protection Commission (PDPC) jointly developed a cyber incident response checklist to guide organisations through stressful, high-pressure Singapore PDPA data breach situations. This checklist follows the C.A.R.E. framework and is designed to improve response time and minimise damages. Organisations should integrate this checklist into their data breach management plan and use it both during active Singapore PDPA data breach incidents and when developing or testing incident response procedures.
During the Contain phase of a Singapore PDPA data breach, the checklist requires organisations to alert the incident response team (including the incident response handler, incident response service provider, and product or service vendors), consider alerting regulatory bodies, law enforcement agencies, SingCERT, and business clients. Organisations must identify investigation resources: a list of key assets and data with their locations, network diagrams, the current baseline of IT systems activities, documentation of IT systems and software versions, and backups of important data. Recognise possible attack vectors: poorly designed web applications, misconfigured systems, internet downloads, poor cyber hygiene practices (such as use of weak or default passwords and outdated software), human lapses, and authorised third parties.
The checklist also covers reviewing possible sources of precursors and indicators for the Singapore PDPA data breach: security software (Intrusion Detection Systems, Security Information and Events Management Systems, anti-virus software, third-party monitoring services), logs (operating system, service and application, network device, netflow), publicly available information (SingCERT alerts and advisories, vendor vulnerability advisories), and reports from people within your organisation. Correlate events against the baseline to determine if an incident has occurred. Check incidents against known threat precursors and indicators. Make an initial assessment of the scope and nature of the incident, particularly whether it is a malicious act or a technological glitch. Prioritise incident handling activities, including whether to activate crisis management and communications plans.
During the Assess phase of the Singapore PDPA data breach, gather evidence for both incident resolution and potential legal proceedings: incident summary, incident indicators, system events, actions taken during the incident, logs of affected systems, and forensic copies of affected systems. Eradicate the threat: wipe malware, disable breached user accounts, and patch exploited vulnerabilities across all affected hosts within the organisation. Take recovery steps: restore systems from backups, rebuild systems from scratch, install patches, change all passwords (both administrators and users), tighten network perimeter security, and confirm the integrity of business systems and controls.
During the Report phase, notify relevant stakeholders and affected parties: the Board of Directors, regulators and law enforcement (SPF, PDPC, CSA, SGX), clients, and media as appropriate. During the Evaluate phase, continue monitoring the network for any anomalous activity or signs of intrusion. Depending on the incident, consider higher levels of system logging or network monitoring. Conduct a post-incident review: identify and resolve deficiencies in systems and processes that led to the incident, identify and resolve deficiencies in the incident response plan, assess if additional security measures are needed, and communicate lessons learned. Revise all related plans: prevention and detection plans, containment and recovery plans, crisis management and communications plans, and business continuity plans.