16.04.2014 Views

vPLfv

vPLfv

vPLfv

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Abstract<br />

This report presents a prototype best practice model for performing incident management<br />

processes and functions. It defines the model through five high-level incident management<br />

processes: Prepare/Sustain/Improve, Protect Infrastructure, Detect Events, Triage Events, and<br />

Respond. Workflow diagrams and descriptions are provided for each of these processes.<br />

One advantage of the model is that it enables examination of incident management processes<br />

that cross organizational boundaries, both internally and externally. This can help computer<br />

security incident response teams (CSIRTs) improve their ability to collaborate with other<br />

business units and other organizations when responding to incidents.<br />

Future reports will extend this work and provide additional guidance to enable both newly<br />

forming and existing incident management capabilities to use the model to determine where<br />

gaps exist in their current processes and to develop plans for creating, improving, or restructuring<br />

their incident management processes.<br />

Although the processes defined in this document were originally developed for internal<br />

CSIRTs, the models and information presented here are applicable to other types of CSIRTs<br />

and other types of incident management and security management capabilities.<br />

CMU/SEI-2004-TR-015<br />

xv

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!