← Back to ordica.ai

Incident Response Plan

Last updated: March 29, 2026 · DFARS 252.204-7012 Compliant

This document defines Ordica LLC's procedures for identifying, responding to, and reporting cybersecurity incidents. This plan satisfies the incident response requirements of NIST SP 800-171 (Section 3.6) and DFARS 252.204-7012.

1. Scope

This plan covers all Ordica systems that process, store, or transmit data on behalf of customers, including:

2. Incident Classification

SeverityDefinitionResponse TimeExamples
CriticalActive breach, data exfiltration, or system compromiseImmediateUnauthorized access to customer data, key compromise, active exploit
HighAttempted breach, vulnerability with known exploit< 4 hoursFailed intrusion attempts, critical CVE in production dependency
MediumAnomalous activity, policy violation< 24 hoursUnusual traffic patterns, access control misconfiguration
LowInformational, minor policy deviation< 72 hoursFailed login attempts, non-critical software update needed

3. Incident Response Team

RoleResponsibilityContact
Incident CommanderDecision authority, customer communication, regulatory reportingJacob Schargus, CEO
Technical LeadInvestigation, containment, remediationEngineering team
CommunicationsCustomer notification, public disclosure if requiredsupport@ordica.ai

4. Response Phases

Phase 1: Detection & Identification

Phase 2: Containment

Phase 3: Eradication

Phase 4: Recovery

Phase 5: Post-Incident

5. DoD Reporting Requirements (DFARS 252.204-7012)

For incidents involving Covered Defense Information (CDI) or systems that process CDI:

  1. 72-hour reporting: Report to the DoD Cyber Crime Center (DC3) at dibnet.dod.mil within 72 hours of discovery
  2. Report contents: Company name, point of contact, contract numbers affected, date discovered, location of compromise, type of compromise, description of techniques used, incident identification number
  3. Evidence preservation: Preserve and protect images of affected systems and all relevant monitoring/packet capture data for at least 90 days
  4. Cooperation: Provide DoD access to additional information or equipment as necessary for forensic analysis
  5. Subcontractor flow-down: Ensure subcontractors report incidents to Ordica immediately; Ordica reports to DC3

6. Customer Notification

Affected customers will be notified within:

Notification will include: nature of the incident, data potentially affected, actions taken, and recommended steps for the customer.

7. Data Preservation Architecture

Ordica's architecture inherently limits incident scope:

8. Testing

This incident response plan is tested annually through:

9. Contact

To report a security incident or vulnerability:

support@ordica.ai
ordica.ai/.well-known/security.txt