19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 6.58 Establishment of a management system for<br />

handling security incidents<br />

Initiation responsibility: Agency/Company management<br />

Implementation responsibility: <strong>IT</strong> Security Management<br />

As <strong>IT</strong> is increasingly integrated into every area of an agency's or company's<br />

operations, its correct functioning is becoming ever more critical. A major<br />

function of <strong>IT</strong> Security Management is therefore to take sufficient proactive<br />

measures to deal with security incidents of all kinds. Security incidents can be<br />

triggered by many different events and, for example, result in loss of<br />

availability, integrity and/or the confidentiality of data, individual <strong>IT</strong> systems<br />

or the entire network.<br />

<strong>The</strong> security incidents which require special handling by <strong>IT</strong> Security<br />

Management are those which have the potential to cause significant damage.<br />

Security problems which cause or can cause only minor damage which is<br />

locally confined should be resolved locally so as to avoid overloading <strong>IT</strong><br />

Security Management.<br />

Handling of security incidents is ultimately the responsibility of <strong>IT</strong> Security<br />

Management and should be aimed at ensuring the following:<br />

- the ability to respond so that security incidents and security problems are<br />

detected and reported to the appropriate responsible person(s) promptly;<br />

- the ability to decide whether it is a local security problem or constitutes a<br />

security incident;<br />

- the ability to take action so that in the event of a security incident the<br />

necessary measures can be taken and implemented at short notice;<br />

- minimisation of damage - this is achieved through prompt notification of<br />

any other parts of the organisation which could be affected, and<br />

- effectiveness - this is achieved by practising and monitoring the capability<br />

to handle security incidents.<br />

To achieve these objectives, a management system must be established for<br />

dealing with security incidents. It is essential here that Management is<br />

involved and ultimately puts the management system into effect so as to<br />

ensure that the necessary awareness of <strong>IT</strong> security issues is generated,<br />

decision-making responsibilities are assigned and the security objectives are<br />

supported.<br />

<strong>The</strong> steps described below provide a suggested approach as to how to establish<br />

a management system handling security incidents.<br />

Step 1: Inclusion in the security guidelines<br />

<strong>The</strong> handling of security incidents is one aspect of <strong>IT</strong> security management<br />

and, as such, should be spelt out in the security guidelines and/or <strong>IT</strong> security<br />

policy of the agency or company. <strong>The</strong>se documents must specify that security<br />

incidents and security problems are to be reported by users and those affected<br />

to the responsible security officer. In addition, the decision-making process<br />

must be described and staff must be motivated as to the necessity of following<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Objectives in the<br />

handling of security<br />

incidents<br />

Involvement of<br />

Management

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!