Incident Response
This plan defines how DDSign detects, responds to, contains, and recovers from security incidents affecting the E-CSP's services, Subscriber data, or cryptographic key material.
Document Reference: CENT-ECSP-IRP-001 · Version 1.0
1. Purpose and Scope
This plan establishes the procedures, roles, and responsibilities for detecting, responding to, containing, and recovering from security incidents that may affect the confidentiality, integrity, or availability of the ddsign E-CSP's services.
This plan applies to all security incidents affecting:
- The ddsign Certification Authority, including the Issuing CA and all associated key material.
- The Registration Authority systems and identity verification processes.
- Subscriber data, including personal data, transactional records, and historical usage records.
- The ddsign platform infrastructure (backend, frontend, database, HSM, network).
- Certificate status services (CRL distribution, OCSP responder).
- Supporting systems (Sentry monitoring, CRM, email infrastructure).
Regulatory Basis
- Kenya Information and Communications Act (KICA): Requires E-CSPs to notify the Communications Authority within 24 hours of confirmed security incidents.
- Kenya Data Protection Act, 2019: Requires notification of the Data Protection Commissioner within 72 hours of a personal data breach.
- ETSI EN 319 401: Requires Trust Service Providers to maintain incident management procedures.
- CPS Section 5.7: Mandates compromise and disaster recovery procedures for the ddsign CA.
2. Incident Response Team
| Role | Name | Responsibility |
|---|---|---|
| Incident Commander | Margret Mumbi MD, Innovation |
Overall authority. Declares severity. Co-authorises CA key revocation. Approves external communications. Sole public spokesperson. |
| Technical Lead | Arnold Wamae | Leads technical investigation and containment. Co-authorises CA key revocation. Manages Sentry monitoring and triage. |
| CA Operations Lead | Joseph Kang'ethe | Executes certificate revocation. Manages HSM operations, CRL and OCSP updates. Isolates HSM in key compromise scenarios. |
| Network/Security Lead | Denis Kipkemboi | Network containment and isolation. Firewall rules. IDS monitoring. Infrastructure forensics. |
| Systems/Audit Lead | Levy Ochieng' | Audit log preservation and analysis. RBAC emergency changes. System backup/restore. Chain of custody for evidence. |
Escalation Path
- Alert raised via Sentry (sentry.centricltd.co.ke), Subscriber report (support@ddsign.ae via CRM), or internal observation.
- Technical Lead performs initial triage and assigns severity.
- Medium and above: Incident Commander notified immediately.
- Critical: all IRT members mobilised. Incident Commander assumes control.
- External notifications issued per timelines in Section 7.
3. Incident Classification
| Severity | Definition | Examples | Response Time |
|---|---|---|---|
| Critical (S1) | CA key compromise or complete service loss | CA private key compromise. HSM tamper event. Complete platform outage. Mass data breach. | Immediate. Full IRT. |
| High (S2) | Data breach or significant degradation, no CA key compromise | Unauthorised access to Subscriber records. OCSP responder down. RA system intrusion. | Within 1 hour |
| Medium (S3) | Limited impact, no data breach confirmed | Failed intrusion attempt. Unusual Sentry error rate. Suspicious admin login attempt. | Within 4 hours |
| Low (S4) | Minor event, informational | Routine vulnerability scan findings. Unsuccessful phishing. Minor bug. | Next business day |
4. Incident Response Procedures
4.1 Detection and Reporting
- Sentry monitoring: Self-hosted at sentry.centricltd.co.ke. Monitors application errors, exceptions, and performance across all ddsign components. Alerts via dashboard and email.
- Subscriber reports: Via support@ddsign.ae, tracked in the sand-social.com CRM.
- Internal observation: Any staff member reports suspicious activity to the Technical Lead.
- External notification: The Communications Authority, KE-RCA, or security researchers may notify the E-CSP.
4.2 Assessment and Classification
- Confirm whether the report is a genuine incident or false positive.
- Assign severity (S1-S4) per Section 3.
- Notify Incident Commander if Medium or above.
- Mobilise appropriate IRT members.
- Open formal incident record.
4.3 Containment
- Network isolation: Denis Kipkemboi modifies firewall rules or disables interfaces.
- Service suspension: Technical Lead suspends certificate issuance while maintaining read-only status services.
- Account lockout: Levy Ochieng' disables compromised accounts or revokes privileges.
- HSM isolation: Joseph Kang'ethe disconnects the HSM from the application layer (requires Technical Lead confirmation).
- Key ceremony halt: All pending key ceremonies suspended.
4.4 Eradication and Recovery
- Root cause identified through log analysis and forensic investigation.
- Vulnerability or attack vector eliminated.
- Systems restored from verified clean backups.
- CRL/OCSP verified as operational and accurate.
- Technical Lead confirms readiness for normal operations.
- Incident Commander authorises return to normal operations.
4.5 Post-Incident Review
Within five (5) business days of closure:
- Post-incident review meeting with all involved IRT members.
- Root cause analysis (RCA) report produced.
- Corrective actions identified, assigned, and tracked.
- This plan updated if a gap was revealed.
- RCA report filed and made available to the auditor.
5. Compromise Control
5.1 CA Private Key Compromise
The most severe scenario. Procedure:
- Isolate: Joseph Kang'ethe immediately disconnects the HSM from all application connections.
- Dual authorisation: Arnold Wamae and Margret Mumbi both authorise revocation of the Issuing CA certificate. Neither may authorise alone.
- Revoke and publish: Joseph Kang'ethe executes revocation and publishes an emergency CRL within one (1) hour.
- Notify KE-RCA: Arnold Wamae notifies the Kenya Root CA (ICTA) to revoke the cross-signed certificate.
- Notify CA of Kenya: Margret Mumbi notifies the Communications Authority within 24 hours.
- Subscriber notification: All Subscribers notified via email, SMS, and in-app that their certificates are no longer valid.
- Public notice: Website banner posted on ddsign.app.
- Media: Margret Mumbi issues a prepared holding statement if enquiries are received.
- Recovery: New Issuing CA key generated in a witnessed key ceremony, cross-signed by KE-RCA, new Subscriber certificates issued.
5.2 Subscriber Key Compromise
- RA verifies identity of the person requesting revocation.
- Joseph Kang'ethe revokes the affected certificate.
- Updated CRL published within one (1) hour. OCSP reflects revocation in real-time.
- Subscriber notified via email and in-app.
- Subscriber may apply for a new certificate.
5.3 RA System Compromise
- Certificate issuance immediately suspended.
- All identity records since last known-clean state flagged for re-verification.
- Certificates issued on fraudulent data revoked.
- RA system rebuilt from verified clean state.
5.4 Subscriber Data Breach
- Levy Ochieng' preserves all relevant logs and evidence.
- Scope assessed: data categories, Subscribers impacted, likelihood of harm.
- Data Protection Commissioner notified within 72 hours if risk to Subscriber rights.
- Affected Subscribers notified without undue delay.
- All breach communications tracked in CRM (sand-social.com).
6. Revocation Conditions and Procedures
6.1 Conditions Triggering Revocation
| Condition | Scope | Authorised By |
|---|---|---|
| CA key compromise | Issuing CA + all Subscriber certs | Dual: Arnold Wamae + Margret Mumbi |
| Subscriber key compromise | Individual certificate | Joseph Kang'ethe |
| Information inaccurate or fraudulent | Individual certificate | Joseph Kang'ethe (on RA instruction) |
| Subscriber Agreement breach | Individual certificate | Joseph Kang'ethe (on Technical Lead instruction) |
| Court order or regulatory directive | As specified | Margret Mumbi |
| Certificate issued in error | Individual certificate | Joseph Kang'ethe |
| E-CSP cessation of operations | All certificates | Margret Mumbi |
6.2 Execution
- Authorised person issues revocation instruction with serial number(s) and reason code.
- Joseph Kang'ethe executes revocation in the CA system.
- Updated CRL published within one (1) hour.
- OCSP reflects new status in real-time.
- Subscriber notified via email and in-app, including reason.
7. Notification Parties and Procedures
| Party | Trigger | Notified By | Time-Interval |
|---|---|---|---|
| Communications Authority of Kenya | Any confirmed security incident | Margret Mumbi | Within 24 hours |
| Kenya Root CA (KE-RCA / ICTA) | CA key compromise | Arnold Wamae | Immediately |
| Data Protection Commissioner | Personal data breach with risk to subjects | Margret Mumbi | Within 72 hours |
| Affected Subscribers | Incident affecting their cert or data | Automated + IRT | Without undue delay |
| All Subscribers | CA key compromise, mass revocation | Automated + Commander | Within 24 hours |
| Relying Parties | Revocation, CA compromise | CRL/OCSP + website | CRL within 1 hour |
| Media / Public | Major incident with public impact | Margret Mumbi ONLY | As required |
8. Service Disruption Procedures
8.1 Planned Disruptions
- Maintenance window approved at least one (1) week in advance.
- Subscribers notified at least 72 hours before via email, in-app, and website banner.
- CRL/OCSP remain available where possible; CRL refreshed before window opens.
- Rollback plan prepared.
- All-clear notification sent upon completion.
8.2 Unplanned Disruptions
- Sentry raises alert via dashboard and email.
- Technical Lead assesses scope and assigns severity.
- If issuance affected: suspended; existing certs remain valid, status services prioritised.
- If CRL/OCSP affected: last valid CRL cached; status service restoration is highest priority.
- Subscribers notified within one (1) hour. Updates every two (2) hours until resolved.
- Post-disruption review per Section 4.5.
8.3 Degraded Mode
If partial restoration is possible, the E-CSP may operate in degraded mode: certificate status services (CRL/OCSP) available, issuance suspended. Communicated via website banner and in-app notification. Incident Commander authorises return to full operations.
9. Audit Trail Protection and Analysis
9.1 Log Sources
- Sentry: Application errors, exceptions, performance (sentry.centricltd.co.ke).
- Application logs: Backend/frontend access, certificate lifecycle, authentication.
- Database audit logs: Query logs, change data capture.
- HSM audit logs: Key usage events, tamper alerts.
- Network logs: Firewall, IDS/IPS, VPN access.
- System logs: OS authentication, privilege escalation, file integrity.
- CRM logs: Subscriber correspondence (sand-social.com).
9.2 Integrity and Tamper Protection
- Logs written to append-only storage.
- Shipped to separate, access-restricted storage within 15 minutes.
- Access restricted to Systems/Audit Lead and Technical Lead; access is logged.
- Checksums computed at collection for forensic integrity verification.
9.3 Forensic Preservation
For High (S2) and Critical (S1) incidents:
- Forensic snapshot of all relevant logs taken immediately.
- System memory and disk images captured where feasible.
- Evidence labelled with incident ID, timestamp, source, and collector.
- Chain-of-custody log maintained.
- Evidence retained for minimum seven (7) years.
10. Media and Public Relations
10.1 Designated Spokesperson
Margret Mumbi (MD, Innovation) is the sole authorised spokesperson. No other IRT member or Centric employee may make public statements, respond to media, or post on social media about an incident.
10.2 Procedure
- All media enquiries directed to Margret Mumbi.
- Responses use pre-approved holding statement templates or are drafted by Technical Lead and approved by Commander.
- Statements are factual and concise; no speculation on root cause.
- No internal details (logs, vulnerability specifics) disclosed.
- Social media monitored; only Commander may authorise posts.
10.3 No-Comment Policy
All staff who are not the designated spokesperson shall respond to media with: "Please direct your enquiry to our management team." Staff shall not confirm, deny, or speculate on personal social media.
11. Testing and Training Programme
11.1 Training Requirements
- All IRT members complete incident response training within 30 days of appointment and annually thereafter.
- Familiarity with this plan, escalation path, role responsibilities, and communication procedures.
- Understanding of severity classification and response timelines.
- Ability to access and interpret Sentry alerts, audit logs, and the incident register.
11.2 Tabletop Exercises
- Frequency: At least once per year, or after significant plan/team/infrastructure changes.
- Scenarios: Each exercise covers a different scenario. Over a three-year cycle, all major types (CA compromise, data breach, outage, RA intrusion) shall be exercised.
- Documentation: Date, participants, scenario, actions taken, lessons learned, and corrective actions.
11.3 Exercise Record
| Date | Scenario | Participants | Outcome |
|---|---|---|---|
| April 2026 | Tabletop exercise covering incident response procedures | Full IRT | Plan validated. Training requirements confirmed. Corrective actions integrated into v1.0. |
12. Cross-References
| Document | Relevance |
|---|---|
| CPS | Section 5.7 mandates compromise and disaster recovery procedures. |
| Subscriber Agreement | Revocation grounds and Subscriber notification obligations. |
| Data Privacy Policy | Breach management procedures cross-reference this plan. |
| Publication & Communication Policy | Communication channels and time-intervals for incident notifications. |
| Audit Logging Policy | Logging infrastructure referenced in Section 9. |
| BCP / DR Plan | Continuity and recovery during and after incidents. |