19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

Under what other circumstances escalation is required should then be<br />

specified. Possible grounds for escalation are as follows:<br />

- <strong>The</strong> expected level of damage exceeds the area of responsibility of the<br />

person who received the report.<br />

- <strong>The</strong> costs and resources required to control the damage exceed his area of<br />

competence.<br />

- <strong>The</strong> complexity of the security incident exceeds his competence or area of<br />

responsibility.<br />

Stage 3: Manner of escalation<br />

It is now necessary to specify how the next level up in the escalation chain<br />

should be informed. <strong>The</strong> options are:<br />

- in person<br />

- written report<br />

- E mail<br />

- telephone, mobile phone<br />

- messenger with sealed envelope<br />

<strong>The</strong> timescale within which notification should occur must also be specified.<br />

Examples are:<br />

- events which require immediate escalation: within one hour;<br />

- events which require immediate measures: within one hour;<br />

- events which may be under control but still require that the next escalation<br />

level is notified: the next working day.<br />

This escalation strategy should be notified to all possible recipients of reports<br />

of security incidents so as to ensure a prompt response.<br />

To contain a security incident, it is usually necessary to take action promptly.<br />

It may be necessary to recall staff from other projects or to call them in out of<br />

working hours. Procedures must therefore be defined as to how the necessary<br />

additional work is to be handled and how to ensure that staff are on call (see<br />

also S6.59 Specification of responsibilities for dealing with security incidents).<br />

Additional controls:<br />

- When was the escalation strategy last updated?<br />

- Have the escalation channels been tried out in exercises/practice runs?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

How should the alerting<br />

be done?<br />

Procedures regarding<br />

overtime

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!