Glossary
The terms a CAO actually needs in the first hour.
Plain-language definitions of the acronyms, roles, and concepts you'll hear from your insurance carrier, IR firm, and MS-ISAC contact — and why each one matters.
People & roles
- CAO (Chief Administrative Officer)
- The senior non-elected staff officer of a municipality — sometimes called the City Manager, Town Manager, or Clerk-Treasurer depending on jurisdiction.
- Why it matters: In most municipal incidents the CAO is the single decision-maker who can authorize spend, sign the insurance claim, and speak to council. The incident bridge starts with them.
- Incident Commander (IC)
- The named person running an active incident response, with authority to make decisions without polling a committee.
- Why it matters: In a small municipality the IC is almost always the CAO or a delegate. Naming one before the incident — and writing it down — is the highest-leverage preparation step.
- IR firm (Incident Response firm)
- An external cybersecurity firm engaged to investigate, contain, and remediate a confirmed or suspected breach.
- Why it matters: Insurance carriers maintain panels of IR firms with pre-negotiated rates. Calling the carrier first lets them assign a panel firm — calling an IR firm first often means paying out-of-pocket for hours the carrier won't reimburse.
- MSP (Managed Service Provider)
- A contracted external IT provider that runs day-to-day technology operations for the municipality.
- Why it matters: Most small municipalities don't have in-house IT — the MSP is the technical hands. Confirm in advance whether the MSP's contract covers after-hours incident work and what the rate is.
Incident types
- Ransomware
- Malware that encrypts data and demands payment for a decryption key. Modern variants also exfiltrate data and threaten public release.
- Why it matters: The dominant municipal incident type by impact. Isolation — not power-off — preserves forensic evidence and often preserves decryptable state.
- BEC (Business Email Compromise)
- An attacker uses a compromised or spoofed business email account to redirect a legitimate payment to an attacker-controlled bank account.
- Why it matters: The most common cause of direct financial loss in municipal incidents. Almost always defeated by an out-of-band paper countersign on banking changes.
- Credential stuffing
- An attacker tries username/password pairs leaked from one breach against unrelated accounts, exploiting password reuse.
- Why it matters: The most common entry vector for municipal CMS, vendor portal, and email account compromise. MFA breaks the attack; password rotation alone does not.
- Defacement
- Unauthorized alteration of a public-facing page — usually the homepage or a high-traffic section.
- Why it matters: High visibility, usually low data impact, but the response window is publicly measured in minutes. Pre-drafted holding statements matter more than fast technical remediation.
- OAuth consent grant
- A user-approved permission that gives a third-party app access to mailbox, files, or calendar data using a token instead of a password.
- Why it matters: Survives password resets and MFA. Always audit consent grants after any account compromise — resetting the password alone does not revoke them.
Response & technical concepts
- Isolation (network containment)
- Disconnecting an affected machine from the network while leaving it powered on, to stop spread without destroying memory-resident evidence.
- Why it matters: Pulling the network cable preserves evidence the IR firm needs; powering off destroys it. Train counter staff and MSP techs to isolate, not shut down.
- Indicators of Compromise (IoCs)
- Specific technical fingerprints of an attack — file hashes, IP addresses, domains, ransomware note text.
- Why it matters: MS-ISAC and IR firms share IoCs that let the MSP search the rest of the environment for related activity. Capture and share them early.
- MFA (Multi-Factor Authentication)
- Login that requires two or more verification factors — typically a password plus a code, app, or hardware key.
- Why it matters: Hardware-key MFA defeats the most common municipal attacks (credential stuffing, BEC, MFA fatigue). SMS-based MFA is the weakest form and is bypassable via SIM-swap.
- Continuity binder
- A printed binder with paper forms, phone trees, vendor contacts, and manual procedures for keeping the municipality running when systems are down.
- Why it matters: When permitting, billing, and email are encrypted, the binder is what counter staff actually use. Refresh it every council term — five years is the practical limit.
- Holding statement
- A pre-drafted short public statement used in the first hour of an incident — confirms the situation, says what is and isn't known, and names a next update time.
- Why it matters: Speed and discipline matter more than completeness. Three sentences from the CAO at 9:40 beats a press release at 4pm.