SlideShare a Scribd company logo
1 of 10
iFour ConsultancyAnnexure A Control: 16 – Information security incident
management
A16.1 Management of IS incidents & improvements
 Objective: To ensure a consistent & effective approach to the management of IS
incidents, including
Communication on security events
Weaknesses
 Incident management life cycle
Software solution company in Indiahttp://www.ifourtechnolab.com
A 16.1.1 Responsibilities and procedures
ISO for Software Outsourcing Companies in India
 Control: Management responsibilities and procedures shall be established to
ensure a quick effective and orderly response to information security incidents.
 Preparation involves identification of resources needed for incident handling and
having trained individuals ready to respond, and by developing and communicating
a formal detection and reporting process.
 Incident responders should preserve digital evidence relating to computer crimes,
which provides the foundation for conclusions and decisions relating to an incident.
Configure systems with evidence preservation in mind
 Purchase the necessary equipment, and train at least one individual to handle the
incidents and use tools for recovering and examining data.
Software solution company in Indiahttp://www.ifourtechnolab.com
A16.1.2 Reporting information security events
ISO for Software Outsourcing Companies in India
 Control: Information security events shall be reported through appropriate
management channels as quickly as possible.
 Detection and Reporting are the important phases in information security incident
handling.
 All members of the community should be trained for:
Procedures for reporting failures, weaknesses, and suspected incidents
How to escalate reporting appropriately
 The process should provide clear ways for users to communicate events (e.g., in the
form of the organization’s Intranet, a phone line, etc.).
Software solution company in Indiahttp://www.ifourtechnolab.com
 Control: Employees and contractors using the organization’s information systems
and services shall be required to note and report any observed or suspected
information security weaknesses in systems or services.
 An effective approach is to use analysis tools to help manage intrusion detection
systems and summarize the data.
 Both these types of intrusion detection systems should be used:
 HIDS – Host intrusion detection system
 NIDS – Network intrusion detection system
 Communicating security alerts through an interface that system administrators use to
monitor:
 Status
 Performance of their systems
increases the likelihood that they will notice problems quickly.
A 16.1.3 Reporting information security weaknesses
ISO for Software Outsourcing Companies in India Software solution company in Indiahttp://www.ifourtechnolab.com
A 16.1.4 Assessment of and decision on IS events
Control: Information security events shall be assessed and it shall be decided
if they are to be classified as information security incidents.
Identification and prioritization of incident stage involves timely assessment of
the situation which can classified into simple steps:
Determine the scope/impact.
Assess the severity
Assess the urgency of event
 In the containment stage assessment of the following needs to be done:
Does the system need to be removed from the network?
Are there user accounts or system-level accounts that need to be disabled or changed?
ISO for Software Outsourcing Companies in India Software solution company in Indiahttp://www.ifourtechnolab.com
A 16.1.5 Response to IS incidents
 Control: Information security incidents shall be responded to in accordance with the
documented procedures.
 Eradication of the problem, and associated changes to the system need to be
applied. This includes technical actions such as
Operating system and application software installed
New or changed firewall rules
Custom configurations applied
Databases created
Backup data restored
Accounts created and access controls applied
Software solution company in Indiahttp://www.ifourtechnolab.com
 Control: Knowledge gained from analyzing and resolving information security
incidents shall be used to reduce the likelihood or impact of future incidents.
 To learn from incidents and improve the response process, incidents must be
recorded and a Post Incident Review must be conducted. The following details must
be retained:
Types of incidents
Volumes of incidents and malfunctions
Costs incurred during the incidents
 Incident Management Reporting is a clear source for providing continual
improvement to the ISMS.
A 16.1.6 Learning from information security incidents
ISO for Software Outsourcing Companies in India
 Control: The organization shall define and apply procedures for the identification,
collection, acquisition and preservation of information, which can serve as
evidence.
 The collection of evidence for a potential investigation must be approached with
care.
 Internal Audit must be contacted immediately for guidance and strict processes
must be followed for the collection of forensic evidence.
A 16.1.7 Collection of evidence
Software solution company in Indiahttp://www.ifourtechnolab.com
References
http://advisera.com/27001academy/blog/2015/11/10/using-itil-to-
implement-iso-27001-incident-management/
https://spaces.internet2.edu/display/2014infosecurityguide/Information+Sec
urity+Incident+Management
www.ne-derbyshire.gov.uk/EasysiteWeb
Software solution company in Indiahttp://www.ifourtechnolab.com

More Related Content

Recently uploaded

%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 

Recently uploaded (20)

%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Annex A control 16 - IS incident management - by Software development company in india

  • 1. iFour ConsultancyAnnexure A Control: 16 – Information security incident management
  • 2. A16.1 Management of IS incidents & improvements  Objective: To ensure a consistent & effective approach to the management of IS incidents, including Communication on security events Weaknesses  Incident management life cycle Software solution company in Indiahttp://www.ifourtechnolab.com
  • 3. A 16.1.1 Responsibilities and procedures ISO for Software Outsourcing Companies in India  Control: Management responsibilities and procedures shall be established to ensure a quick effective and orderly response to information security incidents.  Preparation involves identification of resources needed for incident handling and having trained individuals ready to respond, and by developing and communicating a formal detection and reporting process.  Incident responders should preserve digital evidence relating to computer crimes, which provides the foundation for conclusions and decisions relating to an incident. Configure systems with evidence preservation in mind  Purchase the necessary equipment, and train at least one individual to handle the incidents and use tools for recovering and examining data. Software solution company in Indiahttp://www.ifourtechnolab.com
  • 4. A16.1.2 Reporting information security events ISO for Software Outsourcing Companies in India  Control: Information security events shall be reported through appropriate management channels as quickly as possible.  Detection and Reporting are the important phases in information security incident handling.  All members of the community should be trained for: Procedures for reporting failures, weaknesses, and suspected incidents How to escalate reporting appropriately  The process should provide clear ways for users to communicate events (e.g., in the form of the organization’s Intranet, a phone line, etc.). Software solution company in Indiahttp://www.ifourtechnolab.com
  • 5.  Control: Employees and contractors using the organization’s information systems and services shall be required to note and report any observed or suspected information security weaknesses in systems or services.  An effective approach is to use analysis tools to help manage intrusion detection systems and summarize the data.  Both these types of intrusion detection systems should be used:  HIDS – Host intrusion detection system  NIDS – Network intrusion detection system  Communicating security alerts through an interface that system administrators use to monitor:  Status  Performance of their systems increases the likelihood that they will notice problems quickly. A 16.1.3 Reporting information security weaknesses ISO for Software Outsourcing Companies in India Software solution company in Indiahttp://www.ifourtechnolab.com
  • 6. A 16.1.4 Assessment of and decision on IS events Control: Information security events shall be assessed and it shall be decided if they are to be classified as information security incidents. Identification and prioritization of incident stage involves timely assessment of the situation which can classified into simple steps: Determine the scope/impact. Assess the severity Assess the urgency of event  In the containment stage assessment of the following needs to be done: Does the system need to be removed from the network? Are there user accounts or system-level accounts that need to be disabled or changed? ISO for Software Outsourcing Companies in India Software solution company in Indiahttp://www.ifourtechnolab.com
  • 7. A 16.1.5 Response to IS incidents  Control: Information security incidents shall be responded to in accordance with the documented procedures.  Eradication of the problem, and associated changes to the system need to be applied. This includes technical actions such as Operating system and application software installed New or changed firewall rules Custom configurations applied Databases created Backup data restored Accounts created and access controls applied Software solution company in Indiahttp://www.ifourtechnolab.com
  • 8.  Control: Knowledge gained from analyzing and resolving information security incidents shall be used to reduce the likelihood or impact of future incidents.  To learn from incidents and improve the response process, incidents must be recorded and a Post Incident Review must be conducted. The following details must be retained: Types of incidents Volumes of incidents and malfunctions Costs incurred during the incidents  Incident Management Reporting is a clear source for providing continual improvement to the ISMS. A 16.1.6 Learning from information security incidents ISO for Software Outsourcing Companies in India
  • 9.  Control: The organization shall define and apply procedures for the identification, collection, acquisition and preservation of information, which can serve as evidence.  The collection of evidence for a potential investigation must be approached with care.  Internal Audit must be contacted immediately for guidance and strict processes must be followed for the collection of forensic evidence. A 16.1.7 Collection of evidence Software solution company in Indiahttp://www.ifourtechnolab.com

Editor's Notes

  1. Custom software company India – http://www.ifourtechnolab.com
  2. Custom software company India – http://www.ifourtechnolab.com
  3. Custom software company India – http://www.ifourtechnolab.com
  4. Custom software company India – http://www.ifourtechnolab.com/
  5. Custom software company India – http://www.ifourtechnolab.com
  6. Custom software company India – http://www.ifourtechnolab.com
  7. Custom software company India – http://www.ifourtechnolab.com
  8. Custom software company India – http://www.ifourtechnolab.com
  9. Custom software company India – http://www.ifourtechnolab.com
  10. Custom software company India – http://www.ifourtechnolab.com