The entity responds to identified security incidents by executing a defined incident response program to understand, contain, remediate, and communicate security incidents, as appropriate.
Points of focus:
- Assigns Roles and Responsibilities
- Contains Security Incidents
- Mitigates Ongoing Security Incidents
- Ends Threats Posed by Security Incidents
- Restores Operations
- Develops and Implements Communication Protocols for Security Incidents
- Obtains Understanding of Nature of Incident and Determines Containment Strategy
- Remediates Identified Vulnerabilities
- Communicates Remediation Activities
- Evaluates the Effectiveness of Incident Response
- Periodically Evaluates Incidents
- Communicates Unauthorized Use and Disclosure
- Application of Sanctions
All security incidents are addressed in a consistent manner to improve security based on what has happened.
In the incident treatment process:
The organization shall ensure that clear persons are assigned to incident management responsibilities, e.g. handling the first response for incidents.
Incident management personnel need to be instructed and trained to understand the organization's priorities in dealing with security incidents.
A process for reporting incidents is maintained to help staff report incidents efficiently and consistently.
Things to report as an incident include e.g.:
The personnel guidelines emphasize the obligation to report security incidents as soon as possible in accordance with the agreed process. The instructions also describe other operations in the event of an incident (e.g. recording seen error messages and other details).
The organization shall establish a incident response plan for security incidents to critical information systems. Response plans should also be tested by the necessary organizational elements. The plan should take into account at least:
In addition, the plan should at least:
Restorability refers to how quickly personal data are restored to be available and accessible in the event of a physical or technical failure.
The knowledge gained from analyzing and resolving security incidents should be used to reduce the likelihood of future incidents and their impact.
The organization regularly analyzes incidents as a whole. This process examines the type, amount and cost of incidents with the aim of identifying recurrent and significant incidents that need more action.
If recurrent incidents requiring response are identified, based on them:
The organization has defined procedures to ensure that the original reporter and other personnel involved in the incident are informed of the outcome of the incident management.
Linked personnel can be documented on an optional field on the incident documentation template.
In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.