Skip to content
GitHubLinkedIn

Information Security Incident Response Procedure

This procedure describes how LEF identifies, responds to, and learns from security incidents.

OwnerInformation Security Officer
Contactinfra@lef.tec.br
Version1.1
Last updated2025-03-26
Review cadenceAnnual (or after major incidents)
  • Report immediately to infra@lef.tec.br and include what happened, when, and what systems/accounts may be involved.
  • Preserve evidence: don’t delete messages, logs, or files; take screenshots if useful.
  • Contain safely: if you suspect a device/account is compromised, disconnect from VPN and stop using the affected account until guided.
  • If client data may be involved, notify the project lead as soon as possible.

Establish guidelines and responsibilities to identify, classify, contain, communicate, mitigate, and review information security incidents that may affect LEF, its systems, data, or clients.

Applies to all LEF employees, service providers, and systems that handle corporate or third-party information.

  • Security incident: Confirmed or suspected event that compromises the confidentiality, integrity, or availability of information.
  • Sensitive data: Personal data, access credentials, financial or regulated information under LGPD, GDPR, or contractual obligations.
  • Information Security Officer: Coordinates the response process, performs technical investigation, applies containment and remediation measures, and communicates with stakeholders.
  • Incidents can be reported via email to infra@lef.tec.br.
  • Events are assessed within 1 working day to determine severity.
  • Access to affected systems is immediately restricted.
  • Backups are activated as needed.
  • Vulnerabilities are prioritized and corrected.
  • Incidents involving personal or third-party data must be reported to the affected party within 24 hours after assessment.
  • Communication is official and includes:
    • Incident description
    • Impact and data involved
    • Actions taken and remediation plan
  • Conducted within 14 days after the event.
  • Generates a root cause and improvement report.
  • Corrective measures are recorded and tracked.
  • All incidents must be recorded with date, responsible person, type, and impact.
  • Logs must be kept for at least 12 months.
  • Updates are made as required by legal or contractual obligations.

For urgent reporting: infra@lef.tec.br

  • Incident log (date, type, impact, actions):
  • Evidence collected (screenshots, logs, emails):
  • Post-incident review / lessons learned: