19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

This topic is covered in detailed in safeguard S 6.60 Procedural rules and<br />

reporting channels in the event of security incidents.<br />

Step 4: Escalation strategy for security incidents<br />

<strong>The</strong> more critical a security incident is, the greater the authority that is<br />

required as a rule to deal with the security incident. In the extreme this can<br />

mean that Management has to be informed and involved early in order that<br />

necessary measures such as a ban on divulging any information, calling in the<br />

police, taking costly alternative measures can be implemented. However, this<br />

requires that an escalation strategy specifying who should be consulted in<br />

what cases is drawn up in advance. Further information on this is provided in<br />

safeguard S 6.61 Escalation strategy for security incidents.<br />

Step 5: Setting priorities<br />

Because security incidents are generally the culmination of a chain of different<br />

causes and affect different <strong>IT</strong> application areas, the measures to be adopted<br />

should be implemented with the aid of a priority list. This setting of priorities<br />

depends on the protection requirement, the range of <strong>IT</strong> applications and the<br />

individual dependencies of the agency/company. Just as is necessary when<br />

determining the protection requirements, a list of priorities must be drawn up<br />

in advance for the purpose of specifying the order in which damage resulting<br />

from a security incident should be tackled (see S 6.62 Specifying priorities for<br />

handling security incidents).<br />

Step 6: Methodology for investigating and assessing security<br />

incidents<br />

Once a security-relevant irregularity has been reported, a decision must be<br />

made initially as to whether it can be regarded as a local security problem or<br />

constitutes a potentially more damaging security incident. A number of factors<br />

have to be ascertained and assessed before this decision can be made (the<br />

extent of the potential damage and consequential damage, the cause, which <strong>IT</strong><br />

systems are affected, what immediate measures are required). If necessary, the<br />

next levels of management should be consulted, as specified in an escalation<br />

strategy. Further details will be found in safeguard S 6.63 Investigation and<br />

assessment of a security incident.<br />

Step 7: Implementation of measures for taking remedial action in<br />

connection with security incidents<br />

When implementing the measures necessary to remedy security incidents, it<br />

should be borne in mind that these measures will generally have to be<br />

implemented under time pressure. <strong>The</strong>refore it is not inconceivable that the<br />

measures taken could themselves create new problems. Consequently it is<br />

important to document implementation of the measures adequately.<br />

Furthermore, assuming that the incident is the result of wilful action, the<br />

question of how the "perpetrator" should be dealt with should also be thought<br />

about. In some circumstances there may be personnel implications. For further<br />

information, see S 6.64 Remedial action in connection with security incidents.<br />

Step 8: Notification of the parties affected<br />

If it transpires that the impact of a security incident is not confined to the<br />

agency/company or individual organisational unit(s) concerned, to contain the<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!