19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>IT</strong> <strong>Baseline</strong> <strong>Protection</strong> of Generic Components Handling of security incidents<br />

_________________________________________________________________________________________<br />

Recommended Countermeasures (S)<br />

For the implementation of <strong>IT</strong> baseline protection, selection of the required packages of safeguards<br />

("modules"), as described in Sections 2.3 and 2.4, is recommended.<br />

To establish an effective system for handling security incidents, a number of steps must be taken.<br />

<strong>The</strong>se steps are described in safeguard S 6.58 Establishment of a management system for handling<br />

security incidents and are explained in the safeguards which follow it. Hence it is best to start with<br />

implementation of safeguard S 6.58.<br />

<strong>The</strong> safeguards relating to the area of "Handling of security incidents" are listed below.<br />

Contingency Planning<br />

- S 6.58 (1) Establishment of a management system for handling security incidents<br />

- S 6.59 (1) Specification of responsibilities for dealing with security incidents<br />

- S 6.60 (1) Procedural rules and reporting channels for security incidents<br />

- S 6.61 (1) Escalation strategy for security incidents<br />

- S 6.62 (1) Specifying priorities for handling security incidents<br />

- S 6.63 (1) Investigation and assessment of a security incident<br />

- S 6.64 (1) Remedial action in connection with security incidents<br />

- S 6.65 (1) Notification of parties affected<br />

- S 6.66 (2) Evaluation of security incidents<br />

- S 6.67 (2) Use of detection measures for security incidents (optional)<br />

- S 6.68 (2) Testing the effectiveness of the management system for the handling of security<br />

incidents<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!