Skip to content

NIST 800-53 Incident Response Policy (IR)

Document ID: PLCY-NIST-IR-001
Version: 1.0
Effective Date: December 30, 2025
Last Review: December 30, 2025
Owner: Hop And Haul Team


CONFIDENTIAL

This document is CONFIDENTIAL and for internal use only. Do not distribute outside the organization.

1. Purpose

This document defines Hop And Haul' implementation of the NIST 800-53 Incident Response (IR) family for FedRAMP Moderate authorization. It establishes procedures for detecting, responding to, and recovering from security incidents while meeting federal reporting requirements.


2. Scope

This policy applies to:

  • All security incidents affecting Hop And Haul systems
  • All safety incidents involving platform users
  • All data breaches or suspected breaches
  • All denial-of-service or availability incidents
  • All compliance violations

3. Incident Response Policy and Procedures (IR-1)

3.1 Policy Statement

Hop And Haul maintains incident response capabilities that:

  • Enable rapid detection and response to security incidents
  • Minimize impact through effective containment
  • Preserve evidence for investigation and legal proceedings
  • Meet federal reporting requirements (US-CERT, FedRAMP PMO)
  • Support continuous improvement through lessons learned

3.2 Responsibilities

RoleResponsibilities
Security TeamLead incident response, coordinate activities
Safety OperationsLead physical safety incidents, coordinate with authorities
Development TeamTechnical containment and remediation
Legal/ComplianceNotification requirements, legal coordination
Executive TeamCrisis management, external communications

3.3 Incident Response Team (IRT)

PositionPrimaryBackupContact Method
IR LeadSecurity ManagerSenior Security AnalystPagerDuty
Technical LeadSenior DeveloperDevOps LeadPagerDuty
Safety LeadSafety Operations ManagerFleet Safety SpecialistPagerDuty
Legal ContactGeneral CounselOutside CounselPhone
CommunicationsCEOVP OperationsPhone

4. Incident Response Training (IR-2)

4.1 Training Requirements

RoleTraining TypeFrequency
All staffSecurity awarenessAnnual
Security teamIR procedures, forensicsSemi-annual
Safety operationsSafety incident handlingQuarterly
DevelopersSecure coding, incident supportAnnual
ExecutivesCrisis managementAnnual

4.2 Training Topics

TopicAudienceMethod
Incident identificationAll staffOnline course
Escalation proceduresAll staffDocumentation review
Evidence preservationSecurity, DevOpsHands-on workshop
Federal reportingSecurity, LegalInstructor-led
Media handlingExecutivesTabletop exercise

5. Incident Response Testing (IR-3)

5.1 Testing Schedule

Test TypeFrequencyScope
Tabletop exercisesQuarterlyFull IRT
Technical drillsMonthlySecurity team
Full simulationAnnualOrganization-wide
Recovery testingSemi-annualDR/BC integration

5.2 Exercise Scenarios

ScenarioTypeObjectives
Data breachTabletopNotification procedures, containment
RansomwareTechnical drillIsolation, recovery
Safety incident (kidnapping)TabletopLaw enforcement coordination
API compromiseTechnical drillKey rotation, access revocation
Insider threatTabletopInvestigation, evidence preservation
DDoS attackTechnical drillMitigation, failover

5.3 Post-Exercise Activities

  • Document lessons learned within 5 business days
  • Update procedures based on findings within 30 days
  • Track corrective actions to completion
  • Brief leadership on exercise results

6. Incident Handling (IR-4)

6.1 Incident Categories

CategoryDescriptionSeverityResponse SLA
Safety CriticalPhysical harm risk, SOS, kidnappingCriticalImmediate
Data BreachPII exposure, unauthorized accessCritical1 hour
System CompromiseMalware, unauthorized accessHigh2 hours
AvailabilityService outage, DDoSHigh15 minutes
Policy ViolationCompliance breach, misuseMedium4 hours
Suspicious ActivityAnomaly, potential threatLow24 hours

6.2 Incident Response Phases

Phase 1: Detection and Analysis

ActivityResponsibleDeliverable
Alert triageSecurity analystInitial assessment
Severity determinationIR LeadSeverity classification
Scope assessmentTechnical teamAffected systems list
Evidence collectionSecurity teamForensic snapshot

Phase 2: Containment

ActivityResponsibleTimeline
Short-term containmentTechnical teamWithin response SLA
Evidence preservationSecurity teamBefore any changes
System isolationOperationsAs needed
Account suspensionSecurity teamAs needed

Containment Strategies by Incident Type:

Incident TypePrimary ContainmentSecondary Containment
Data breachRevoke compromised accessIsolate affected systems
MalwareNetwork isolationEndpoint quarantine
Account compromiseDisable accountForce session termination
API key leakRotate keyBlock suspicious IPs
DDoSEnable mitigationFailover to backup

Phase 3: Eradication and Recovery

ActivityResponsibleVerification
Root cause analysisSecurity teamDocumented findings
Threat removalTechnical teamScan verification
System hardeningOperationsConfiguration review
Service restorationOperationsFunctional testing
Monitoring enhancementSecurity teamAlert verification

Phase 4: Post-Incident Activity

ActivityTimelineOwner
Incident documentation24 hoursIR Lead
Lessons learned meeting5 business daysIR Lead
Procedure updates30 daysSecurity team
External reportingPer requirementsLegal/Compliance

6.3 Automated Incident Handling (IR-4(1))

AutomationTriggerAction
Account lockout5 failed loginsAutomatic 15-min lock
Session terminationSecurity alertKill all user sessions
IP blockingAttack patternAutomatic block (WAF)
Key rotationAnomaly detectionScheduled rotation
Alert escalationSLA breachPagerDuty escalation

7. Incident Monitoring (IR-5)

7.1 Monitoring Sources

SourceEvents MonitoredAlert Threshold
SIEMSecurity events, correlationsRule-based
WAFAttack patterns, anomaliesSignature match
Application logsBusiness logic violationsCustom rules
InfrastructureResource anomaliesBaseline deviation
User reportsSuspicious activityAll reports reviewed

7.2 Incident Tracking

MetricTargetReview Frequency
Mean time to detect (MTTD)<15 minutesMonthly
Mean time to respond (MTTR)Per SLAMonthly
Incidents by categoryTrend analysisMonthly
False positive rate<10%Quarterly

8. Incident Reporting (IR-6)

8.1 Internal Reporting

SeverityNotifyTimeline
CriticalExecutive team, LegalImmediate
HighSecurity Manager, affected stakeholders1 hour
MediumSecurity team lead4 hours
LowSecurity team (ticket)24 hours

8.2 External Reporting Requirements

Federal Reporting (FedRAMP)

Incident TypeReport ToTimelineMethod
Data breach (PII)US-CERT, FedRAMP PMO1 hourUS-CERT portal
System compromiseUS-CERT, FedRAMP PMO1 hourUS-CERT portal
Significant changeFedRAMP PMO30 daysSignificant change form
Monthly summaryFedRAMP PMOMonthlyConMon report

Regulatory Reporting

RegulationTriggerTimelineReport To
State breach lawsPII breach72 hoursState AG
FMCSASafety incidentPer regulationDOT
Law enforcementCriminal activityImmediateLocal/Federal LE

8.3 Automated Reporting (IR-6(1))

ReportTriggerRecipientMethod
Incident summaryIncident closedStakeholdersEmail
Daily security briefScheduledSecurity teamDashboard
Weekly summaryScheduledManagementEmail
ConMon dataMonthlyFedRAMP PMOPortal upload

9. Incident Response Assistance (IR-7)

9.1 Internal Resources

ResourceAvailabilityContact
Security team24/7 on-callPagerDuty
DevOps team24/7 on-callPagerDuty
Legal counselBusiness hours + emergencyPhone

9.2 External Resources

ResourcePurposeContact Method
AWS SupportInfrastructure incidentsAWS Support Portal
CloudflareWAF/DDoS incidentsCloudflare Dashboard
Forensics firmMajor investigationsPre-established contract
Law enforcementCriminal mattersLocal FBI field office
US-CERTFederal incidentsus-cert.cisa.gov

10. Incident Response Plan (IR-8)

10.1 Plan Components

ComponentDescriptionLocation
Contact listIRT members, stakeholdersSecure wiki
Escalation matrixDecision tree for escalationThis document
PlaybooksStep-by-step proceduresRunbook repository
Communication templatesPre-approved messagesSecure wiki
Legal requirementsNotification obligationsLegal repository

10.2 Plan Maintenance

ActivityFrequencyOwner
Contact list updateMonthlySecurity team
Playbook reviewQuarterlySecurity team
Full plan reviewAnnualSecurity Manager
Post-incident updatesAfter each incidentIR Lead

11. Hop And Haul Safety Incident Response

11.1 Safety-Specific Procedures

IncidentInitial ResponseEscalation
SOS triggerSafety ops immediate reviewLocal 911 if no response
Route deviationAutomated check-in promptSafety ops contact
Driver mismatchBlock ride, alert safety opsLaw enforcement if needed
Duress codeSilent alert to safety opsLaw enforcement dispatch

11.2 Safety Incident Timeline

TimeAction
0:00SOS/alert received
0:02Safety ops attempts contact
0:05If no response, escalate to supervisor
0:10If no response, contact emergency contacts
0:15If no response, notify law enforcement

11.3 Evidence Preservation (Safety)

EvidenceRetentionStorage
GPS trail (5 min before)7 yearsImmutable S3
Communication logs7 yearsImmutable S3
Device state snapshot7 yearsImmutable S3
Witness statements7 yearsLegal repository

12. POA&M Process for Security Incidents

12.1 Finding Documentation

FieldDescription
Finding IDUnique identifier
Discovery dateWhen finding was identified
SourceIncident, assessment, audit
DescriptionDetailed finding description
Risk ratingCritical, High, Medium, Low
Remediation planSteps to address finding
Target datePlanned remediation completion
StatusOpen, In Progress, Closed

12.2 Remediation Tracking

Risk LevelRemediation TimelineReview Frequency
Critical30 daysWeekly
High90 daysBi-weekly
Medium180 daysMonthly
Low365 daysQuarterly

DocumentRelationship
PLCY-INC-001Incident response procedures
PLCY-RSK-001Risk assessment and tabletop exercises
PLCY-DRP-001Recovery procedures
PLCY-FED-003Federal risk register
PLCY-FED-005NIST control mapping

14. Document Control

VersionDateAuthorChanges
1.0December 30, 2025Hop And Haul TeamInitial release

CONFIDENTIAL - Internal Use Only - Hop And Haul Policy Documentation