16.04.2014 Views

vPLfv

vPLfv

vPLfv

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The scope of this report is the draft set of process flows that exist at the time of this report’s<br />

publication. Future publications will document the final version of this work and all the corresponding<br />

subprocess mappings.<br />

It must also be pointed out that in documenting the processes we focused on what were considered<br />

common best practices. We did not include exceptions or customized approaches or<br />

processes. Our intent is to provide this best practice set of materials to organizations in a way<br />

that they can modify or adapt to fit any specific needs, requirements, or considerations they<br />

may have.<br />

The majority of the discussion throughout the rest of the report will be primarily geared to<br />

organizations in the commercial, educational, military, or government areas where an internal<br />

CSIRT model would be most appropriate. Not all of the processes detailed here may be applicable<br />

to other CSIRT models, particularly coordinating CSIRTs. However, many of the<br />

processes will indeed be appropriate. Future work may take a separate look at the set of processes<br />

for performing incident management activities in a coordinating CSIRT.<br />

1.7 Intended Audience<br />

The primary audience for this report is individuals tasked with creating, operating, benchmarking,<br />

or evaluating a CSIRT or incident management capability, including<br />

• CSIRT development project team members<br />

• CSIRT managers<br />

• CSIRT staff<br />

• internal, external, and third-party evaluators<br />

• MSSPs<br />

• regional or national initiatives seeking to build CSIRTs or incident management capabilities<br />

• incident handling communities such as the Forum for Incident Response and Security<br />

Teams (FIRST)<br />

Although the processes here are more aligned with functions performed by an internal<br />

CSIRT, the concepts, ideas, and framework defined will be applicable and of interest to all<br />

types of CSIRTs and incident management capabilities.<br />

This report will also be of benefit to others who may want to gain a better understanding of<br />

incident management and CSIRT processes, functions, and interactions, including<br />

• chief information officers (CIOs)<br />

• chief security officers (CSOs)<br />

• other C-level managers such as chief financial officers (CFOs) and chief risk officers<br />

(CROs)<br />

• business function managers<br />

CMU/SEI-2004-TR-015 11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!