19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

damage all the other internal departments and external agencies affected must<br />

be notified. To accelerate notification, the communication channels should be<br />

ascertained and a dependency analysis should be carried out in advance (see<br />

S 6.65 Notification of the parties affected).<br />

Step 9: Evaluation of a security incident<br />

To ensure that the appropriate lessons are learnt from a security incident<br />

which has occurred, the procedure to be adopted for evaluating the handling of<br />

security incidents should be specified. Often this will result in improvements<br />

in dealing with security incidents or permit conclusions to be drawn as to the<br />

effectiveness of the <strong>IT</strong> security concept. <strong>The</strong> aspects to be considered here<br />

include the following:<br />

- Time taken to react<br />

- Extent of awareness of the reporting channel<br />

- Effectiveness of the escalation strategy<br />

- Effectiveness of the investigation<br />

- Means for notifying affected parties<br />

This subject is addressed in detailed in safeguard S 6.66 Evaluation of security<br />

incidents.<br />

Step 10: Use of detection measures for security incidents<br />

<strong>The</strong> sooner a security incident is detected and reported, the more effectively<br />

can countermeasures be taken. Any automated detection measures available<br />

should be used so as to reduce any delays induced by reliance on human<br />

actions. Examples of such measures are anti-virus programs, analysis of<br />

logged data and intrusion detection systems. Identification and activation of<br />

these measures and the related communication channels are described in<br />

safeguard S 6.67 Use of detection measures for security incidents.<br />

Step 11: Effectiveness testing<br />

In order to be able to measure the effectiveness of a management system for<br />

the handling of security incidents and promote the necessary practice at these<br />

management tasks, exercises and gaming should be performed. As these may<br />

require considerable personnel resources and can interfere with normal<br />

operations, they should be confined to important areas. Further suggestions<br />

will be found in safeguard S 6.68 Testing the effectiveness of the management<br />

system for the handling of security incidents.<br />

<strong>The</strong> results of these steps should be documented appropriately in a "Concept<br />

for handling security incidents" paper. This concept should be updated at<br />

regular intervals and be notified to those affected in a suitable way.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Develop concepts and<br />

update regularly

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!