12.07.2015 Views

CERT Resilience Management Model, Version 1.0

CERT Resilience Management Model, Version 1.0

CERT Resilience Management Model, Version 1.0

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

them to determine if breakdowns in other organizational processes are resulting in exposure.This knowledge is translated into improved strategies for protecting and sustaining assetsand services as well as improvements in the processes.Vulnerabilities may result in events and incidents that the organization must manage. TheIncident <strong>Management</strong> and Control process area addresses the processes for identifying,analyzing, handling, and responding to incidents.Vulnerability identification and analysis is an important source of potential risks to theorganization. Risks are identified, analyzed, and mitigated (through vulnerability reductionactivities) in the Risk <strong>Management</strong> process area.Related Process AreasThe risk management cycle for organizational services, processes, and assets is addressedin the Risk <strong>Management</strong> process area.Monitoring for events, incidents, and vulnerabilities is addressed in the Monitoring processarea.Summary of Specific Goals and PracticesGoalsVAR:SG1 Prepare for Vulnerability Analysisand ResolutionVAR:SG2 Identify and Analyze VulnerabilitiesVAR:SG3 Manage Exposure to VulnerabilitiesVAR:SG4 Identify Root CausesPracticesVAR:SG1.SP1 Establish ScopeVAR:SG1.SP2 Establish a Vulnerability Analysis and ResolutionStrategyVAR:SG2.SP1 Identify Sources of Vulnerability InformationVAR:SG2.SP2 Discover VulnerabilitiesVAR:SG2.SP3 Analyze VulnerabilitiesVAR:SG3.SP1 Manage Exposure to VulnerabilitiesVAR:SG4.SP1 Perform Root-Cause AnalysisSpecific Practices by GoalVAR:SG1 Prepare for Vulnerability Analysis and ResolutionPreparation for vulnerability analysis and resolution activities is conducted.VAR:SG1.SP1 Establish ScopeThe assets and operational environments that must be examinedfor vulnerabilities are identified.VAR:SG1.SP2 Establish a Vulnerability Analysis and Resolution StrategyEstablish and maintain an operational vulnerability analysis andresolution strategy.193 | CMU/SEI-2010-TR-012

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!