Skip to content

Incident Response Plan

Document ID: IRP-001 | Version: 1.0 | Effective: January 2026


1. Purpose

Establishes procedures for detecting, responding to, and recovering from security incidents affecting Keshless systems and data.

Scope: Security breaches, system compromises, fraud, AML violations, service disruptions


2. Incident Classification

Severity Levels

SeverityResponse TimeExamples
CRITICAL< 15 minSystem compromise, active breach, sanctions match
HIGH< 1 hourFraud detected, AML violation, service degradation
MEDIUM< 4 hoursSuspicious activity, failed intrusion
LOW< 24 hoursPhishing blocked, policy reminder

Incident Categories

CategoryDescription
Data BreachUnauthorized access to data
System CompromiseMalware, unauthorized access
Financial FraudTransaction fraud, account takeover
AML ViolationSanctions match, suspicious patterns
Service DisruptionDDoS, system failure
Insider ThreatEmployee misconduct

3. Detection Sources

Automated Detection

SourceDetects
AML Rules EngineSuspicious transaction patterns
Transaction MonitoringHigh suspicion scores (≥80)
Rate LimitingBrute force, DDoS attempts
Sanctions ScreeningUN sanctions list matches
PEP MatchingPolitically Exposed Persons

Manual Detection

SourceExamples
User reportsUnauthorized transactions
Employee observationsSuspicious behavior
Vendor notificationsThird-party breaches
Regulatory noticesRegulator-identified issues

4. Emergency Controls (Kill Switches)

Available Controls

ControlSeverityImpact
SYSTEM_SHUTDOWNCriticalAll API requests blocked
DISABLE_ALL_TRANSACTIONSCriticalNo payments or transfers
READ_ONLY_MODEHighView only, no updates
DISABLE_WITHDRAWALSHighFraud protection
DISABLE_P2P_TRANSFERSMediumBlock user-to-user
DISABLE_BILL_PAYMENTSMediumBlock bill payments
DISABLE_TOPUPSMediumBlock fund additions
RATE_LIMIT_EXTREMEMediumDDoS protection

Control Decision Matrix

Incident TypeRecommended Control
Active data breachSYSTEM_SHUTDOWN
Widespread fraudDISABLE_ALL_TRANSACTIONS
Withdrawal fraudDISABLE_WITHDRAWALS
P2P fraud schemeDISABLE_P2P_TRANSFERS
DDoS attackRATE_LIMIT_EXTREME
Database compromiseREAD_ONLY_MODE + DISABLE_ALL_TRANSACTIONS

Activation/Deactivation

Activate: POST /api/admin/emergency/activate

  • Provide controlType and reason

Deactivate: POST /api/admin/emergency/deactivate

  • Provide controlId and resolution

Status: GET /api/admin/emergency/status


5. Response Phases

Phase 1: Identification

Objective: Confirm incident and assess impact

  1. Verify alert is genuine
  2. Gather initial information (what, when, what systems)
  3. Classify severity
  4. Notify IR Team Lead

Phase 2: Containment

Objective: Prevent further damage

Immediate:

  • Activate emergency controls
  • Isolate affected systems
  • Block compromised accounts
  • Preserve logs/evidence

Short-term:

  • Apply temporary fixes
  • Implement additional monitoring
  • Brief stakeholders

Phase 3: Eradication

Objective: Remove threat and fix vulnerabilities

  1. Identify root cause
  2. Remove malware/unauthorized access
  3. Patch vulnerabilities
  4. Verify threat eliminated

Phase 4: Recovery

Objective: Restore normal operations safely

  1. Restore from clean backups (if needed)
  2. Deactivate emergency controls (one at a time)
  3. Verify systems functioning
  4. Monitor for recurrence

Phase 5: Lessons Learned

Objective: Improve future response

  1. Post-incident review (within 5 days)
  2. Document timeline and actions
  3. Update procedures
  4. Share findings

6. AML-Specific Response

Sanctions Match Response

  1. Transaction automatically blocked
  2. Account flagged for review
  3. Investigate match accuracy
  4. If true positive: Freeze account, file SAR, report to FIU
  5. If false positive: Document, unblock, mark resolved

Tipping-Off Prohibition

CRITICAL

DO NOT inform the customer that:

  • They are under investigation
  • A SAR has been filed
  • Their transactions are being monitored
  • They matched a sanctions list

Tipping-off is a criminal offense.


7. Communication Plan

Internal Communication

SeverityWhoWhenMethod
CRITICALCEO, CTO, All ITImmediatePhone + Slack
HIGHCTO, Security Team< 1 hourSlack + Email
MEDIUMSecurity Lead< 4 hoursEmail
LOWSecurity TeamNext dayEmail

Regulatory Communication

RegulatorRequirementTimeframe
Central BankSecurity incidentsWithin 72 hours
FIUSAR filing, sanctionsImmediately
Data ProtectionData breachesWithin 72 hours

Customer Communication

ScenarioRequired?Notes
Data breachYesAfter containment
Service disruptionYesStatus page
Account frozen (non-AML)YesSMS/Email
Account frozen (AML)NOTipping-off prohibition

8. Roles and Responsibilities

RoleResponsibilities
Incident CommanderOverall coordination (CTO)
Technical LeadInvestigation, containment
Security AnalystForensics, evidence
Compliance OfficerRegulatory notification, SAR
Communications LeadInternal/external comms

Escalation

CRITICAL → Security → CTO → CEO → Board
HIGH     → Security → CTO
MEDIUM   → Security Lead
LOW      → Security Team (no escalation)

9. Evidence Preservation

Evidence TypeSourceAction
System logsCloud LoggingExport to secure storage
Audit logsPostgreSQLDatabase snapshot
Affected dataApplicationSnapshot
User sessionsApplicationJWT tokens, session data

Chain of Custody:

  1. Document collector and timestamp
  2. Store in access-controlled location
  3. Calculate SHA-256 hash
  4. Log all access

10. Testing

Drill TypeFrequency
Tabletop exerciseQuarterly
Technical drillSemi-annually
Full simulationAnnually

Drill Scenarios

  • Data breach simulation
  • Fraud ring response
  • Sanctions match handling
  • DDoS attack response

Quick Reference Cards

Critical Incident Response

┌─────────────────────────────────────────────────┐
│           CRITICAL INCIDENT RESPONSE            │
├─────────────────────────────────────────────────┤
│ 1. CONFIRM incident (not false positive)        │
│ 2. ACTIVATE emergency control                   │
│    - Data breach → SYSTEM_SHUTDOWN              │
│    - Fraud → DISABLE_ALL_TRANSACTIONS           │
│ 3. NOTIFY CTO immediately (phone)               │
│ 4. PRESERVE evidence                            │
│ 5. BEGIN investigation                          │
│ 6. NOTIFY regulators within 72 hours            │
└─────────────────────────────────────────────────┘

AML Alert Response

┌─────────────────────────────────────────────────┐
│              AML ALERT RESPONSE                 │
├─────────────────────────────────────────────────┤
│ 1. REVIEW alert in dashboard                    │
│ 2. INVESTIGATE transactions and customer        │
│ 3. DO NOT contact customer (tipping-off)        │
│ 4. If TRUE POSITIVE:                            │
│    - Freeze account                             │
│    - Draft and file SAR                         │
│ 5. If FALSE POSITIVE:                           │
│    - Document rationale                         │
│    - Mark as RESOLVED_FALSE_POSITIVE            │
└─────────────────────────────────────────────────┘

Document Control: Version 1.0 | January 2026 | Security Team

Internal use only - Keshless Payment Platform