Incident Response

Our process for detecting, responding to, and recovering from security incidents with transparent communication.

Incident Response Philosophy

Impact Suite takes security incidents seriously and maintains a comprehensive, tested incident response program designed to rapidly detect, contain, investigate, and remediate security events while maintaining transparent communication with affected educational agencies.

Our incident response program is:

  • Documented: Written procedures maintained in our Thoropass compliance platform

  • Tested: Annual tabletop exercises to validate effectiveness

  • Transparent: Clear notification timelines and communication procedures

  • Continuously Improving: Post-incident reviews to strengthen our defenses


How We Detect Security Incidents

Early detection is critical to minimizing the impact of security incidents. Impact Suite employs multiple detection methods operating 24/7:

Automated Monitoring:

  • AWS CloudWatch: 24/7 monitoring of infrastructure including:

    • Unusual access patterns or failed authentication attempts

    • Unexpected changes to security configurations

    • Resource utilization anomalies indicating potential compromise

    • Application errors or system failures

    • Network traffic anomalies

Security Event Monitoring:

  • Authentication logs (successful and failed login attempts)

  • Privileged account activity

  • Data access and modification patterns

  • Administrative actions and configuration changes

  • API usage and integration activities

Anomaly Detection:

  • Abnormal login locations or times

  • Excessive failed authentication attempts

  • Unusual data access volumes or patterns

  • Unauthorized privilege escalation attempts

  • Suspicious database queries

Real-Time Alerting:

  • Automated alerts for critical security events

  • Immediate notification to security team via multiple channels

  • Escalation procedures ensuring rapid response

  • On-call rotation for 24/7 coverage

Human Reporting:

  • Employees trained to report suspected security incidents

  • Multiple reporting channels (Slack, direct contact, anonymous)

  • Customer and user reports of suspicious activity

  • Security researchers and external notifications


Incident Response Team

Impact Suite maintains a cross-functional incident response team with clearly defined roles and responsibilities:

Incident Commander: Kris Kofoed, Compliance Officer

  • Overall incident coordination and decision-making authority

  • Primary point of contact for external communications

  • Authorization for escalation and resource allocation

  • Ensures compliance with notification requirements

Security Officer: Zach Johnson, VP of Product & Safety Officer

  • Technical incident investigation and analysis

  • Security containment and remediation activities

  • Forensic analysis and evidence preservation

  • Coordination with engineering team

Engineering Team: Thane Tyler, Director of Engineering

  • Technical response and system remediation

  • Log analysis and vulnerability assessment

  • Implementation of security controls and patches

  • System restoration and recovery activities

Executive Leadership:

  • Strategic decision-making for significant incidents

  • Resource allocation and external communications approval

  • Legal and regulatory notification decisions

Legal Counsel:

  • Legal compliance and regulatory requirements

  • Review of notifications and external communications

  • Coordination with law enforcement if necessary

  • Assessment of legal obligations and liabilities


Incident Response Process

Our incident response follows a structured, four-phase approach:

Phase 1: Detection & Initial Response (0-2 Hours)

Immediate Actions:

  • Notification to Incident Commander and Security Officer

  • Preliminary assessment to confirm incident

  • Initial classification of incident type and severity

  • Activation of response team based on severity

  • Documentation of incident details in tracking system

Severity Classification:

  • Critical: Confirmed breach of PII or PHI, active intrusion, significant service disruption

  • High: Potential breach, elevated security events, service degradation

  • Medium: Security events requiring investigation, no confirmed breach

  • Low: Minor security anomalies, policy violations

Phase 2: Containment (2-24 Hours)

Containment Actions:

  • Immediate actions to prevent further unauthorized access or data exposure

  • Isolation of affected systems or accounts

  • Preservation of evidence for investigation

  • Implementation of temporary security controls

  • Enhanced monitoring of related systems

Impact Assessment:

  • What data was accessed or potentially compromised?

  • How many individuals or educational agencies affected?

  • Duration of unauthorized access?

  • Method of compromise or attack vector?

  • Current threat status and ongoing risk?

Phase 3: Investigation & Eradication

Investigation Activities:

  • Forensic Analysis:

    • Detailed review of audit logs, access records, and system logs

    • Timeline reconstruction of incident events

    • Root cause identification

    • Extent of data access or exfiltration

    • Identification of vulnerabilities exploited

  • Evidence Preservation:

    • Secure collection of system logs and audit trails

    • Network traffic captures where applicable

    • Affected system images for detailed analysis

    • Documentation for potential legal proceedings

Eradication:

  • Removal of threat actor access

  • Elimination of malicious code or unauthorized changes

  • Patching of vulnerabilities that enabled incident

  • Implementation of enhanced security controls

  • Validation that threat has been completely eliminated

Phase 4: Recovery & Post-Incident Activities

Recovery:

  • System restoration from secure backups if necessary

  • Gradual restoration of services with enhanced monitoring

  • Validation of security control effectiveness

  • Return to normal operations with lessons learned implemented

Post-Incident Review:

  • Comprehensive post-mortem within 30 days

  • Timeline analysis and response evaluation

  • Root cause analysis

  • Identification of improvements needed

  • Documentation of lessons learned

  • Implementation of security enhancements


Notification Procedures & Timeline

72-Hour Notification: Impact Suite will notify affected educational agencies within seventy-two (72) hours of confirming a security incident that involves personally identifiable information or student data.

Notification Includes:

  • Incident Description: What happened and how it occurred

  • Date and Time: When the incident occurred and was discovered

  • Type of Data Affected: Categories of PII or student data involved

  • Number of Affected Individuals: Approximate number of students, staff, or families impacted

  • Impact Assessment: Potential risk or harm to affected individuals

  • Containment Actions: Steps taken to contain and remediate the incident

  • Preventive Measures: Enhanced security controls implemented

  • Point of Contact: Kris Kofoed, Compliance Officer (kris.kofoed@impactsuite.com)

  • Recommended Actions: Guidance for educational agency response

  • Timeline: Estimated timeline for complete remediation

Who Gets Notified:

  • Affected Educational Agencies: Designated security/compliance contacts

  • Affected Individuals: Students, parents, staff (when required by law)

  • Regulatory Authorities: State education agencies, HHS (for HIPAA breaches), as required

  • Law Enforcement: When criminal activity is suspected

Communication Method:

  • Email to designated contacts

  • Follow-up telephone call for significant incidents

  • Secure portal access for detailed incident information

  • Regular status updates throughout incident response


Recovery & Business Continuity

Backup & Restoration:

  • Daily automated backups (30-day retention)

  • Geographically distributed backup storage

  • Encrypted backups with access controls

  • Regular backup integrity testing

  • Documented restoration procedures

High Availability Architecture:

  • 99.9% uptime SLA

  • Redundant infrastructure for resilience

  • Multi-region AWS architecture

  • Automated failover capabilities

  • Load balancing for scalability

Recovery Time:

  • Recovery Time Objective (RTO): 4 hours for critical systems

  • Recovery Point Objective (RPO): 24 hours (maximum data loss)

  • Prioritized restoration of educational agency access

  • Communication during extended outages


Incident Response Testing

Annual Tabletop Exercises:

  • Simulation of various incident scenarios

  • Participation by entire response team

  • Testing of communication procedures

  • Validation of response times and processes

  • Identification of gaps or improvement areas

What We Test:

  • Detection capabilities and alerting

  • Team coordination and communication

  • Notification procedures and timelines

  • Technical response and remediation

  • Documentation and evidence collection

  • Recovery procedures

Continuous Improvement:

  • Test results documented in Thoropass

  • Action items tracked with assigned ownership

  • Incident response plan updated based on findings

  • Team training enhanced to address gaps

  • New threats and scenarios incorporated


Incident History

Current Status: Impact Suite has not experienced any confirmed security breaches involving unauthorized access to, or disclosure of, student data or personally identifiable information.

Transparency Commitment: In the event of a security incident, we will:

  • Update this page with anonymized incident summary

  • Share lessons learned with educational agency partners

  • Document preventive measures implemented

  • Maintain incident history for transparency


Educational Agency Responsibilities

Help Us Protect Your Data:

Secure Your Access:

  • Use strong, unique passwords

  • Enable multi-factor authentication

  • Don't share login credentials

  • Report suspicious emails or login attempts

  • Keep contact information current

Report Suspicious Activity:

  • Unusual access patterns

  • Unexpected data exports

  • Suspicious emails claiming to be from Impact Suite

  • Unauthorized users or access requests

  • Any potential security concerns

Maintain Current Contacts:

  • Ensure we have current compliance officer contact information

  • Provide after-hours emergency contacts

  • Update contact information when personnel changes occur

  • Designate backup contacts for notifications

Participate in Incident Response:

  • Respond promptly to incident notifications

  • Provide information needed for investigation

  • Coordinate student/parent notifications as needed

  • Participate in post-incident reviews


Report a Security Incident

If you suspect a security incident involving your data:

Primary Contact: Kris Kofoed, Compliance Officer kris.kofoed@impactsuite.com [Phone Number]

Secondary Contact: Zach Johnson, VP of Product & Safety Officer zach@impactsuite.com [Phone Number]

Include in Your Report:

  • Your organization name and contact information

  • Description of the suspected incident

  • Date/time you discovered the issue

  • Any relevant details (affected users, unusual activity, etc.)

  • Your contact information for follow-up

We will respond within 2 hours of receiving your report.