HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 6.60 Procedural rules and reporting channels for security incidents

S 6.60 Procedural rules and reporting channels for security incidents

Initiation responsibility: Agency/company Management, IT Security Management

Implementation responsibility: IT Security Management

Many security incidents only turn into serious problems because inappropriate action was taken in response to them as a result of hasty decisions, for example, resulting in the spontaneous deletion of data which was needed to understand the event.

A distinction should be made here between generally applicable procedural rules which apply to all imaginable security incidents and IT-specific procedural rules. The following general procedural rules can be specified for all types of security-relevant irregularities:

All staff in the agency/company who are potentially affected must be notified of these general procedural rules in a suitable fashion.

In addition, specific procedural rules can be provided to those affected, especially those in positions which are notified in cases of security incidents and are expected to take the first decisions and/or initiate the first measures. This includes IT Administrators, those responsible for IT applications and IT Security Management. These procedural rules should cover the measures described in

Once the procedural rules have been specified, the reporting channels must also be defined. We recommend proceeding on the following lines:

It is especially important here that all employees know whom to contact and the reporting channels which apply to all types of security incident. For example, a list of names, telephone numbers and e-mail addresses of the relevant points of contact could be included in the internal telephone directory or on the Intranet. However, it must not be difficult to report one's suspicions, nor must this entail any longwinded procedure. Fast and secure communication connections must be available for this purpose. The authenticity of the communication partner must be assured and the information reported concerning the suspicious occurrences must be treated as confidential.

All staff should also be informed that information regarding the security incident may only be divulged to third parties via IT Security Management (see S 6.65 Notification of the parties affected).

Exercises or practice runs should be held sporadically to check whether the procedural rules for security incidents are appropriate and can be implemented and whether all staff are aware of them (see also S 6.68 Testing the effectiveness of the management system for the handling of security incidents).

Experience of security incidents shows how important a good operating environment and a healthy communications culture are for the prompt and frank reporting of security incidents (see also S 3.8 Avoidance of factors impairing the organisation climate).

One possible way of informing all employees affected of the procedural rules and reporting plan is to issue an information sheet signed by the Management, on which the most important information is summarised. This can be held at the workplace and additionally on the Intranet. An example of such an information sheet can be found in the help available on the IT Baseline Protection Manual CD-ROM (directory ...\HILFSMI\15VERHAL.DOC). To ensure that the information is actually available when the real thing happens, we do not advise distributing this information sheet only in electronic form as the electronic version itself could then be affected by the security incident.

All information sheets on potential security incidents must be immediately updated whenever a relevant change takes place in the organisation, in order that the procedural rules described in them remain applicable and the reporting channels are correct.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
Januar 2000
home