19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

correct reporting in order to bring home to staff just how important it is to<br />

report security incidents.<br />

Motivation of perpetrator<br />

If it turns out that the security incident was due to deliberate action, the<br />

perpetrator's motivation should be investigated. <strong>The</strong> motivation is especially<br />

important when an insider is involved. If it transpires that the cause lies in the<br />

organisation environment, this should be notified to Management as it can<br />

then be expected that mistakes and/or deliberate action will occur again.<br />

Depending on the relevance of the evaluation results, Management should be<br />

informed so that it can arrange for improvements. It can therefore be sensible<br />

to have this evaluation performed by an organisational unit which is not part<br />

of the reporting plan.<br />

Development of instructions on actions to be taken<br />

As part of the evaluation of a security incident it is useful to use the results to<br />

prepare instructions on actions to be taken or to review the procedures to be<br />

followed in the event that a similar security incident occurs again. Once<br />

practical experience of the problems is available, instructions on actions to be<br />

taken can be developed more efficiently than when the authors are working<br />

purely on a theoretical basis. <strong>The</strong> security incident which occurred also shows<br />

that there is a specific need for instructions on the actions to be taken for this<br />

type of security incident. Instructions so prepared should be notified to the<br />

relevant groups of persons in an appropriate manner.<br />

Additional controls:<br />

- Were the most recent security incidents evaluated?<br />

- Is Management informed once a year about the security incidents?<br />

- How are the specific instructions on actions to be taken updated and<br />

communicated?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!