The Security Incident Management Standard sets the minimum requirements for security incident management in support of the IT Risk Policy for Information Security, including requirements for analyzing, handling and reporting of security incidents.
Security Incident Management encompasses the following sequence of steps:
CONTENT
1. OVERVIEW
1.1 PROCEDURE OWNER
1.2 CLASSIFICATION
1.3 APPLICABLE REGULATIONS
1.4 RELATED [COMPANY] NORMS AND PROCEDURES
1.5 OBJECTIVES
1.6 AUDIENCE AND SCOPE
1.7 DOCUMENT SUPPORT
2. DEFINITIONS & ABBREVIATIONS
3. SECURITY INCIDENT MANAGEMENT
3.1 SECURITY INCIDENT PROCESSES
3.2 SECURITY INCIDENT PROCEDURES
4. ROLES & RESPONSIBILITIES
4.1 HELP DESK
4.2 IT RISK
4.3 IT OPERATIONS
4.4 SPECIAL ROLE: TASK FORCE
5. SECURITY INCIDENT MANAGEMENT WITH THIRD PARTIES
5.1 INVOLVEMENT OF LEGAL DEPARTMENT
6. COMPLIANCE
7. EXCEPTIONS
8. FINAL CONSIDERATIONS
8.1 DISCIPLINARY ACTIONS AGAINST PROCEDURE VIOLATION
8.2 DOCUMENT REVISION
Pages: 13
This bundle contains all the products listed in the Data Governance section. Take advantage of the 25% OFF when buying the bundle!
The objective of the Business Continuity Management Policy is to establish the framework for the proper business continuity management of the Company.
The main objective of the Data Backup Procedure is to describe the processes and controls implemented by the Company in order to ensure the availability of its systems and data.
Review Security Incident Management Standard.
You must be logged in to post a review.