19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 6.63 Investigation and assessment of a security<br />

incident<br />

Initiation responsibility: <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management, <strong>IT</strong> Administrator,<br />

<strong>IT</strong> Application Manager, Security Incident<br />

Team<br />

Not every security incident is recognised as such immediately. Especially<br />

where targeted and wilful attacks are aimed at <strong>IT</strong> systems, many security<br />

incidents only come to light days or weeks after the event. False alarms are<br />

also a common occurrence, e.g. because hardware or software problems have<br />

been wrongly interpreted as cases of infection with computer viruses.<br />

However, in order to be able to investigate and assess a security-relevant<br />

irregularity, it is necessary that certain preliminary assessments have already<br />

been carried out. <strong>The</strong>se include:<br />

- ascertaining the existing <strong>IT</strong> structure and <strong>IT</strong> network,<br />

- ascertaining the point of contacts and users of the <strong>IT</strong> systems,<br />

- ascertaining the <strong>IT</strong> applications on the <strong>IT</strong> systems concerned, and<br />

- defining the protection requirements of the <strong>IT</strong> systems.<br />

<strong>The</strong>se investigations are carried out as the first stage of using the <strong>IT</strong> <strong>Baseline</strong><br />

<strong>Protection</strong> <strong>Manual</strong> (see Section 2.2) and the results should therefore be<br />

available to <strong>IT</strong> Security Management.<br />

Following receipt of an incoming report, the above information can be used to<br />

decide quickly which <strong>IT</strong> system is affected, and what <strong>IT</strong> applications and<br />

protection requirements are involved. At the same time, since the point of<br />

contact is known, this person can be called in quickly to assist with making<br />

the appropriate decisions.<br />

Should it transpire that an <strong>IT</strong> system or an <strong>IT</strong> application with a high-level<br />

protection requirement is affected, then the matter should be regarded as a<br />

security incident and the predefined steps required to handle it must be<br />

implemented. On the other hand, if only <strong>IT</strong> applications and <strong>IT</strong> systems<br />

having a low protection requirement are affected, an attempt can be made to<br />

resolve the security problem locally.<br />

If it appears that the security incident could have serious consequences and is<br />

sufficiently complex, it may be appropriate to call in the Security Incident<br />

Team without delay (see S 6.59 Specification of responsibilities for dealing<br />

with security incidents).<br />

<strong>The</strong> following factors should be ascertained as a first step to investigating and<br />

assessing the security incident:<br />

- What additional <strong>IT</strong> systems and <strong>IT</strong> applications could be affected by the<br />

security incident?<br />

- Could any consequential damage also occur through networking of the <strong>IT</strong><br />

systems?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

How much is affected?<br />

Mobilising the Security<br />

Incident Team

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!