1.1 Security Incidents - 1
1.1 Security Incidents - 1
1.1 Security Incidents - 1
There should be procedures in place to ensure that security incidents are reviewed and
investigated:
- planning and preparation of incident response
- monitoring, detecting, analyzing and reporting security events and incidents;
- logging incident management;
- handling of forensic evidence collected;
- escalation of incidents and recovery from an incident.
Point of contact – a person or department where events are being reported and
that is the first line of response to the incident.
The reporting of events should be standardized and all staff should be advised to
report events as soon as possible
ISO/IEC 27001:2013 Information security management systems
-Management of information security incidents (1)-
All users should understand that they are required to report any weaknesses and
not try to test the weaknesses to be sure or exploit them.