19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

the stipulated procedures. At the same time, inclusion in the security<br />

guidelines is a way of demonstrating Management's support for <strong>IT</strong> security.<br />

Step 2: Specification of responsibilities<br />

This step entails specifying who has what responsibility in the event of<br />

security incidents occurring. For example, the following groups might have<br />

these responsibilities:<br />

- <strong>IT</strong> users: report security problems and security incidents.<br />

- <strong>IT</strong> Administrators: receive reports, take initial steps enabling decision as to<br />

whether the occurrence is a security problem or a security incident, initiate<br />

escalation.<br />

- Person responsible for <strong>IT</strong> application: participate in decision process and<br />

selection of measures in the light of own assessment of the degree of<br />

protection required by the <strong>IT</strong> application.<br />

- <strong>IT</strong> Security Officer or <strong>IT</strong> Security Management: receive reports, decide<br />

whether it is a case of a security problem or a security incident, set<br />

escalation in motion, implement necessary measures.<br />

- Security Incident Team: a team composed of <strong>IT</strong> administrators, <strong>IT</strong> users,<br />

<strong>IT</strong> Security Officers concerned, together with Public Relations staff and<br />

possibly Management, for handling a security incident.<br />

- Public Relations staff or Press Office: prepare information policy regarding<br />

the security incident as required.<br />

- <strong>IT</strong> Security Auditor: review management system and evaluate security<br />

incident.<br />

- Management: make final decisions<br />

<strong>The</strong> responsibilities must be defined and put into effect. For further<br />

information, see safeguard S 6.59 Specification of responsibilities for dealing<br />

with security incidents.<br />

Step 3: Procedural rules and reporting channel for handling security<br />

incidents<br />

To deal with security incidents effectively, it is essential that those affected<br />

behave in a correct and level-headed manner and report the incident<br />

immediately. <strong>The</strong> necessary procedural rules (keep calm, reporting obligation,<br />

duty to provide information on attendant circumstances etc.) must be defined<br />

and <strong>IT</strong> users trained accordingly. In particular, the person to whom <strong>IT</strong> security<br />

problems or incidents should be reported must be determined.<br />

Instructions on actions to be taken in the event of security incidents which<br />

may typically be expected (e.g. appearance of a computer virus, manipulation<br />

of data by insiders, hacking attempts by outsiders etc.) can be drawn up in<br />

advance. If an emergency occurs, people will then be able to respond more<br />

quickly so that the damage can be reduced. Since the effort required to prepare<br />

these action options is not inconsiderable, it should be restricted to the<br />

relevant areas in which it is possible to make plans.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Consider typical security<br />

incidents in advance

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!