19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 6.60 Procedural rules and reporting channels for<br />

security incidents<br />

Initiation responsibility: Agency/company Management, <strong>IT</strong> Security<br />

Management<br />

Implementation responsibility: <strong>IT</strong> Security Management<br />

Many security incidents only turn into serious problems because inappropriate<br />

action was taken in response to them as a result of hasty decisions, for<br />

example, resulting in the spontaneous deletion of data which was needed to<br />

understand the event.<br />

A distinction should be made here between generally applicable procedural<br />

rules which apply to all imaginable security incidents and <strong>IT</strong>-specific<br />

procedural rules. <strong>The</strong> following general procedural rules can be specified for<br />

all types of security-relevant irregularities:<br />

- All those involved should remain calm and desist from taking hasty<br />

measures.<br />

- Irregularities should be reported immediately in accordance with a<br />

reporting plan.<br />

- Countermeasures must not be taken until or unless they have been<br />

requested by authorised persons.<br />

- All the attendant circumstances must be explained frankly and<br />

transparently and without any glossing over, so that the damage can be<br />

minimised.<br />

- Based on personal experience, an initial assessment of the potential extent<br />

of the damage, the consequential damage, the parties both within and<br />

without the organisation who are potentially affected and the possible<br />

consequences should be performed.<br />

- <strong>Information</strong> regarding the security incident should not be passed to third<br />

parties without authorisation.<br />

All staff in the agency/company who are potentially affected must be notified<br />

of these general procedural rules in a suitable fashion.<br />

In addition, specific procedural rules can be provided to those affected,<br />

especially those in positions which are notified in cases of security incidents<br />

and are expected to take the first decisions and/or initiate the first measures.<br />

This includes <strong>IT</strong> Administrators, those responsible for <strong>IT</strong> applications and <strong>IT</strong><br />

Security Management. <strong>The</strong>se procedural rules should cover the measures<br />

described in<br />

- S 6.23 Procedure in the event of computer virus infection<br />

- S 6.31 Procedural patterns following a loss of system integrity<br />

- S 6.48 Procedures in case of a loss of database integrity<br />

- S 6.54 Procedures in case of a loss of network integrity<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Do not panic!<br />

Proceed in an orderly<br />

manner!<br />

No covering up!<br />

Damage assessment<br />

Make procedural rules<br />

known

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!