National Cybersecurity Incident Response Plan
Introduction
The National Cyber Security Center’s (“NCSC”) has created this framework to defines
its role in cybersecurity incidents in the Kingdom of Bahrain. Cybersecurity
incidents vary greatly in nature; thus, this plan focuses on the elements that are
common among most incidents. This plan is divided into multiple sections to address
each phase of incident response separately.
For the purposes of this document, a cybersecurity incident is defined as event that
adversely affects an IT asset’s (data, a system, an application, etc…)
confidentiality, integrity or availability. It is possible that a cybersecurity
incident comes as a result of human error.

Roles and Responsibilities
This section addresses the roles and responsibilities of the NCSC’s staff and external entities during a cybersecurity incident:
-
National Cyber Security Center
-
Incident Manager
Receive external alert notifications, delegate alerts to analysts, coordinate with victims during incidents when needed.
-
Security Analyst
Analyze and validate security alerts.
-
Artefact Analyst
Respond to security incidents. Support security analysts.
-
-
Affected Entity
Report cybersecurity incidents, give the NCSC’s access to data needed to analyze the incident, and once the incident is closed, adequately address any security issues that have caused or contributed to the incident.
-
Sectoral Regulator
Report incidents and define sector-specific objectives for the response of an incident.
Threat Alerts
Typically, threat alerts are generated from the NCSC’s security infrastructure, however, external alerts could also be received. Internal alerts are validated to eliminate false positives while external alerts are scrutinized to determine their credibility.
Threat Assessment
Once an incident has been declared, a risk assessment is done to determine the threat level of the incident. The two main factors of threat assessment are the importance of the effected entity and the impact (or anticipated impact) of the incident.
The threat level of an incident can change as more information is discovered about the incident and the response to the incident shall be changed accordingly. Factors that may elevate the threat level are: the number of affected entities/individuals, potential social and economic impact, the threat actor involved, time-sensitivity, and visibility to the public.
The assessment and classification of an incident is handled by the NCSC.
The NCSC prioritizes incidents affecting Government entities and Critical National Infrastructure. Critical National infrastructure are entities that manage assets (e.g., facilities, equipment, processes, information) necessary for the country to function and upon which daily life depends. Within this infrastructure, there are certain elements so critical to the country that their loss or compromise could directly result in loss of life, cause a debilitating effect on the delivery of essential services, or otherwise cause widespread economic or social impact.
C1 - National Cybersecurity Emergency
THREAT
Threat to human life.
Threat to national security.
RESPONSE
Coordinated response from the NCSC and its partners, onsite.
C2 - Very Critical Incident
THREAT
High threat to Government entity or CNI.
RESPONSE
Incident response from NCSC, typically onsite.
C3 - Critical Incident
THREAT
Moderate threat to Government entity or CNI.
High threat to large businesses.
RESPONSE
Incident response from NCSC, typically remotely
C4 - Moderate Incident
THREAT
Low threat to Government entity or CNI.
Low to Moderate threat to large businesses.
Any threat to medium businesses.
RESPONSE
Alert notification from the NCSC and/or incident response from NCSC where needed.
Engagement of Affected Entities
Once an incident has been declared, the affected entity shall be contacted by the NCSC. Experience has proven that maintaining a relationship with the entity based on mutual trust is produces the best possible outcome.
Leadership
During C1 and C2 incidents, it is beneficial to have all concerned parties meet regularly for efficient communication and response. Forming two groups is optimal:
Tactical leadership group
-
National Cyber Security Center
-
NCSC Partner’s
-
Affected Entity’s Technical Lead
This group meets to identify operational challenges and discusses potential solutions.
Strategic leadership group
-
National Cyber Security Center
-
Affected Entity’s Technical Lead
-
Other Stakeholders
This group meets to agree on objectives, achieve situation awareness, align policy and operational responses, consult with subject matter experts (depending on the nature of the incident and the affected sector), and develop a mitigation plan. These groups may meet not only during the incident response phase but also during the recovery process.
Closing Incidents
Since incidents vary greatly, the conditions for closing each incident are different. Typically, the incident is considered closed if:
-
The security threat is identified.
-
All threats are contained and eradicated.
-
The root cause is identified.
After closing the incident, the NCSC may provide guidance to the affected entity on how to recover from the incident. For C3 incidents and above, an incident report shall be shared with the affected entity with a proposed plan to address the root cause of the incident and advice on how to improve their security posture. An incident handler may make follow-up calls to support incident recovery.