Security Incident Response Plan

Purpose and Scope

The Security Incident Response Plan provides a systematic incident response process for all Information Security Incident(s) (defined below) that affect any of Troops's information technology systems, network, or data, including Troops data held or services provided by third-party vendors or other service providers. From time to time, Troops may update this policy and implement different levels of security controls for different information assets, based on risk and other considerations.

This plan applies to all Troops assets utilized by personnel acting on behalf of Troops or accessing its applications, infrastructure, systems or data. All personnel are required to read, accept and follow all Troops policies and plans.

For Troops facilities, the scope of this plan is focused on localized disasters such as fires, floods, and other localized natural or man-made disasters. This plan is not intended to cover major regional or national disasters such as regional earthquakes or war.

Troops intends for this plan to:

Define the Troops security incident response process and provide step-by-step guidelines for establishing a timely, consistent, and repeatable incident response process. Assist Troops and any applicable third parties (including vendors and partners) in quickly and efficiently responding to and recovering from different levels of information security incidents.

Mitigate or minimize the effects of any information security incident on Troops, its customers, employees, and others. Help Troops consistently document the actions it takes in response to information security incidents.

“Information Security Incident” means an actual or reasonably suspected unauthorized use, disclosure, acquisition of or access to, or other unauthorized processing of confidential or personal information that reasonably may compromise the privacy or confidentiality, integrity, or availability of confidential or personal information.


Troops has a Security Response Team (SRT) consisting of predetermined employees from key departments at Troops to manage security incidents. The SRT provides timely, organized, informed, and effective response to information security incidents to (a) avoid loss of or damage to the Troops systems, network, and data; (b) minimize economic, reputational, or other harms to Troops and its customers, employees, contractors and partners; and (c) manage litigation, enforcement, and other risks.

The SRT also oversees and coordinates the development, maintenance and testing of the plan, its distribution, and on-going updates of the plan. The SRT is activated or enabled when a security incident occurs and is responsible for evaluating the situation and responding accordingly. Depending on the severity of an incident the SRT may request engagement from various support teams to assist with the mitigation of the incident. The SRT meets on a periodic basis for training, education, and review of the documented plan, or as required due to a security incident.

The SRT consists of a core team with representatives from key Troops groups and stakeholders. The current SRT roster may be contacted at

Incident Response Process

The process outlined below should be followed by the appropriate Staff at Troops in the event of an Information Security Incident. Troops shall assign resources and adopt procedures to timely assess automated detection results, screen internal and external reports, and identify actual information security events. Troops shall document each identified Information Security Incident.

Detection and Reporting Automated Detection

Troops may utilize automated detection means and other technical safeguards to automatically alert the Troops of incidents or potential incidents.

Report from Troops Personnel

All Troops personnel must report potential security incidents to as follows:

1. If you believe an incident occurred or may occur or may have identified a threat, vulnerability, or other security weakness, please report it to the following email immediately:;

2. Provide all available information and data regarding the potential incident; and 3. Once an incident has been submitted, please stop using the affected system, or any other potentially affected device until being given

the okay from the SRT.

Report from External Source

External sources, including our customers, who claim to have information regarding an actual or alleged information security incident should be directed to

Employees who receive emails or other communications from external sources regarding information security incidents that may affect Troops or others, security vulnerabilities, or related issues should immediately report those communications to and should not interact with the source unless authorized.

Response Procedures Overview

Responding to a data breach typically involves the following stages:

1. verification 2. assessment 3. containment and mitigation 4. post-breach response

All of the steps must be documented in an incident log and/or corrective action plan.

The data breach response is not purely linear, as these stages and the activities associated with these stages frequently overlap. Troops may keep a record of any actions the organization takes in responding to the incident and preserve any evidence that may be relevant to any potential regulatory investigation or litigation including through use of an incident log, corrective action plan or other applicable documentation.

(1) Verification

The SRT will work with Troops employees and contractors to identify the affected systems or hardware (such as a lost laptop or USB drive) and determine the nature of the data maintained in those systems or on the hardware.

(2) Assessment

Following verification of an Information Security Incident, the SRT will determine the level of response required based on the incident's characteristics, including affected systems and data, and potential risks and impact to Troops and its customers, employees, or others.

Such assessment may include what employees or contractors were affected, what customers were affected, and what data was potentially exfiltrated, modified, deleted or compromised.

The SRT will work together to assess a priority with respect to the incident based on factors such as whether:

1. the incident exposed or is reasonably likely to have exposed data; or 2. personally identifiable information was affected and the data elements possibly at risk, such as name or date of birth.

In addition, the SRT will consider whether the disclosure was:

1. internal or external; 2. caused by a company insider or outside actor; and/or 3. the result of a malicious attack or an accident.

(3) Containment and Mitigation

As soon as Troops has verified and assessed the breach, the SRT may take all necessary steps to contain the incident and return the Troops systems back to their original state and limit further data loss or intrusion.

Such steps may include:

  1. Acting to stop the source or entity responsible, for example by:

  2. taking affected machines offline;

  3. segregating affected systems; or

  4. immediately securing the area if the breach involves a physical security breach.

  5. Determining whether other systems are under threat of immediate or future danger.

  6. Determining whether to implement additional technical measures to contain the data breach, such as changing locks, passwords,

    administrative rights, access codes, or passwords.

(4) Post-Breach Response

Any post-breach response including external and internal communications, notifications, and further inquiries will depend on the assessment and priority of the data breach.

As part of the final response, Troops will review applicable access controls, policies and procedures and determine whether to take any actions to strengthen the organization’s information security program.

Key Learnings

As soon as possible, Troops senior management should meet with the SRT and other relevant team members of the Troops for a post-mortem to better understand the disaster event that took place and how it and others may be prevented in the future.

The retrospective should be documented and key learnings from the retrospective should be presented to all appropriate team members in a timely manner.


Testing the plan annually is critical to ensuring the plan is effective and practical. Any gaps in the plan that are discovered during the testing phase will be addressed by Troops management. All tests must be thoroughly documented.

Testing of this plan may be performed using the following methods:


Team members walk through the steps documented in this plan to confirm effectiveness, identify gaps, bottlenecks or other weaknesses. This walkthrough provides the opportunity to review the plan with a larger subset of people, allowing the team to draw upon an increased pool of knowledge and experiences. Team members should be familiar with procedures, equipment, and offsite facilities.

Table Top Exercises

A disaster is simulated so normal operations will not be interrupted. Scenarios of various security incidents are used and this plan is put into action to determine its use and effectiveness.

Validated checklists can provide a reasonable level of assurance for many of these scenarios. Analyze the output of the previous tests carefully before the proposed simulation to ensure the lessons learned during the previous phases of the cycle have been applied.


Troops business needs, local situations, laws and regulations may occasionally call for an exception to this policy or any other Troops policy. If an exception is needed, Troops management will determine an acceptable alternative approach.


Any violation of this policy or any other Troops policy or procedure may result in disciplinary action, up to and including termination of employment. Troops reserves the right to notify the appropriate law enforcement authorities of any unlawful activity and to cooperate in any investigation of such activity. Troops does not consider conduct in violation of this policy to be within an employee’s or contractor’s course and scope of work.

Any employee or contractor who is requested to undertake an activity that he or she believes is in violation of this policy must provide a written or verbal complaint to his or her manager or any other manager of Troops as soon as possible.

Responsibility, Review, and Audit

This plan will be reviewed and tested on an annual basis. Ensuring that the plan reflects ongoing changes to resources is crucial. This task includes updating the plan and revising this document to reflect updates; testing the updates; and training personnel. Test results will be documented and signed off by Troops management. The results are shared with appropriate parties internally and findings are tracked to resolution. Any changes are communicated across the organization.

This document is tested, maintained and enforced by Jean-Etienne Durand. This document was last updated on 10/07/2021.