SlideShare a Scribd company logo
1 of 10
iFour ConsultancyAnnexure A Control: 16 – Information security incident
management
A16.1 Management of IS incidents & improvements
 Objective: To ensure a consistent & effective approach to the management of IS
incidents, including
Communication on security events
Weaknesses
 Incident management life cycle
Software solution company in Indiahttp://www.ifourtechnolab.com
A 16.1.1 Responsibilities and procedures
ISO for Software Outsourcing Companies in India
 Control: Management responsibilities and procedures shall be established to
ensure a quick effective and orderly response to information security incidents.
 Preparation involves identification of resources needed for incident handling and
having trained individuals ready to respond, and by developing and communicating
a formal detection and reporting process.
 Incident responders should preserve digital evidence relating to computer crimes,
which provides the foundation for conclusions and decisions relating to an incident.
Configure systems with evidence preservation in mind
 Purchase the necessary equipment, and train at least one individual to handle the
incidents and use tools for recovering and examining data.
Software solution company in Indiahttp://www.ifourtechnolab.com
A16.1.2 Reporting information security events
ISO for Software Outsourcing Companies in India
 Control: Information security events shall be reported through appropriate
management channels as quickly as possible.
 Detection and Reporting are the important phases in information security incident
handling.
 All members of the community should be trained for:
Procedures for reporting failures, weaknesses, and suspected incidents
How to escalate reporting appropriately
 The process should provide clear ways for users to communicate events (e.g., in the
form of the organization’s Intranet, a phone line, etc.).
Software solution company in Indiahttp://www.ifourtechnolab.com
 Control: Employees and contractors using the organization’s information systems
and services shall be required to note and report any observed or suspected
information security weaknesses in systems or services.
 An effective approach is to use analysis tools to help manage intrusion detection
systems and summarize the data.
 Both these types of intrusion detection systems should be used:
 HIDS – Host intrusion detection system
 NIDS – Network intrusion detection system
 Communicating security alerts through an interface that system administrators use to
monitor:
 Status
 Performance of their systems
increases the likelihood that they will notice problems quickly.
A 16.1.3 Reporting information security weaknesses
ISO for Software Outsourcing Companies in India Software solution company in Indiahttp://www.ifourtechnolab.com
A 16.1.4 Assessment of and decision on IS events
Control: Information security events shall be assessed and it shall be decided
if they are to be classified as information security incidents.
Identification and prioritization of incident stage involves timely assessment of
the situation which can classified into simple steps:
Determine the scope/impact.
Assess the severity
Assess the urgency of event
 In the containment stage assessment of the following needs to be done:
Does the system need to be removed from the network?
Are there user accounts or system-level accounts that need to be disabled or changed?
ISO for Software Outsourcing Companies in India Software solution company in Indiahttp://www.ifourtechnolab.com
A 16.1.5 Response to IS incidents
 Control: Information security incidents shall be responded to in accordance with the
documented procedures.
 Eradication of the problem, and associated changes to the system need to be
applied. This includes technical actions such as
Operating system and application software installed
New or changed firewall rules
Custom configurations applied
Databases created
Backup data restored
Accounts created and access controls applied
Software solution company in Indiahttp://www.ifourtechnolab.com
 Control: Knowledge gained from analyzing and resolving information security
incidents shall be used to reduce the likelihood or impact of future incidents.
 To learn from incidents and improve the response process, incidents must be
recorded and a Post Incident Review must be conducted. The following details must
be retained:
Types of incidents
Volumes of incidents and malfunctions
Costs incurred during the incidents
 Incident Management Reporting is a clear source for providing continual
improvement to the ISMS.
A 16.1.6 Learning from information security incidents
ISO for Software Outsourcing Companies in India
 Control: The organization shall define and apply procedures for the identification,
collection, acquisition and preservation of information, which can serve as
evidence.
 The collection of evidence for a potential investigation must be approached with
care.
 Internal Audit must be contacted immediately for guidance and strict processes
must be followed for the collection of forensic evidence.
A 16.1.7 Collection of evidence
Software solution company in Indiahttp://www.ifourtechnolab.com
References
http://advisera.com/27001academy/blog/2015/11/10/using-itil-to-
implement-iso-27001-incident-management/
https://spaces.internet2.edu/display/2014infosecurityguide/Information+Sec
urity+Incident+Management
www.ne-derbyshire.gov.uk/EasysiteWeb
Software solution company in Indiahttp://www.ifourtechnolab.com

More Related Content

Recently uploaded

AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAlluxio, Inc.
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...Alluxio, Inc.
 
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...naitiksharma1124
 
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdfMicrosoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdfQ-Advise
 
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Gáspár Nagy
 
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfImplementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfVictor Lopez
 
JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)Max Lee
 
OpenChain @ LF Japan Executive Briefing - May 2024
OpenChain @ LF Japan Executive Briefing - May 2024OpenChain @ LF Japan Executive Briefing - May 2024
OpenChain @ LF Japan Executive Briefing - May 2024Shane Coughlan
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...rajkumar669520
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAlluxio, Inc.
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdfkalichargn70th171
 
Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024Soroosh Khodami
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Krakówbim.edu.pl
 
Workforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdfWorkforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdfDeskTrack
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfmbmh111980
 
The Impact of PLM Software on Fashion Production
The Impact of PLM Software on Fashion ProductionThe Impact of PLM Software on Fashion Production
The Impact of PLM Software on Fashion ProductionWave PLM
 
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Andrea Goulet
 
What need to be mastered as AI-Powered Java Developers
What need to be mastered as AI-Powered Java DevelopersWhat need to be mastered as AI-Powered Java Developers
What need to be mastered as AI-Powered Java DevelopersEmilyJiang23
 

Recently uploaded (20)

AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
 
Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024Top Mobile App Development Companies 2024
Top Mobile App Development Companies 2024
 
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdfMicrosoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
 
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
Tree in the Forest - Managing Details in BDD Scenarios (live2test 2024)
 
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfImplementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
 
JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)
 
OpenChain @ LF Japan Executive Briefing - May 2024
OpenChain @ LF Japan Executive Briefing - May 2024OpenChain @ LF Japan Executive Briefing - May 2024
OpenChain @ LF Japan Executive Briefing - May 2024
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in Michelangelo
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf
 
Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024
 
Agnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in KrakówAgnieszka Andrzejewska - BIM School Course in Kraków
Agnieszka Andrzejewska - BIM School Course in Kraków
 
Workforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdfWorkforce Efficiency with Employee Time Tracking Software.pdf
Workforce Efficiency with Employee Time Tracking Software.pdf
 
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdfMastering Windows 7 A Comprehensive Guide for Power Users .pdf
Mastering Windows 7 A Comprehensive Guide for Power Users .pdf
 
5 Reasons Driving Warehouse Management Systems Demand
5 Reasons Driving Warehouse Management Systems Demand5 Reasons Driving Warehouse Management Systems Demand
5 Reasons Driving Warehouse Management Systems Demand
 
The Impact of PLM Software on Fashion Production
The Impact of PLM Software on Fashion ProductionThe Impact of PLM Software on Fashion Production
The Impact of PLM Software on Fashion Production
 
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
Entropy, Software Quality, and Innovation (presented at Princeton Plasma Phys...
 
What need to be mastered as AI-Powered Java Developers
What need to be mastered as AI-Powered Java DevelopersWhat need to be mastered as AI-Powered Java Developers
What need to be mastered as AI-Powered Java Developers
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Annex A control 16 - IS incident management - by Software development company in india

  • 1. iFour ConsultancyAnnexure A Control: 16 – Information security incident management
  • 2. A16.1 Management of IS incidents & improvements  Objective: To ensure a consistent & effective approach to the management of IS incidents, including Communication on security events Weaknesses  Incident management life cycle Software solution company in Indiahttp://www.ifourtechnolab.com
  • 3. A 16.1.1 Responsibilities and procedures ISO for Software Outsourcing Companies in India  Control: Management responsibilities and procedures shall be established to ensure a quick effective and orderly response to information security incidents.  Preparation involves identification of resources needed for incident handling and having trained individuals ready to respond, and by developing and communicating a formal detection and reporting process.  Incident responders should preserve digital evidence relating to computer crimes, which provides the foundation for conclusions and decisions relating to an incident. Configure systems with evidence preservation in mind  Purchase the necessary equipment, and train at least one individual to handle the incidents and use tools for recovering and examining data. Software solution company in Indiahttp://www.ifourtechnolab.com
  • 4. A16.1.2 Reporting information security events ISO for Software Outsourcing Companies in India  Control: Information security events shall be reported through appropriate management channels as quickly as possible.  Detection and Reporting are the important phases in information security incident handling.  All members of the community should be trained for: Procedures for reporting failures, weaknesses, and suspected incidents How to escalate reporting appropriately  The process should provide clear ways for users to communicate events (e.g., in the form of the organization’s Intranet, a phone line, etc.). Software solution company in Indiahttp://www.ifourtechnolab.com
  • 5.  Control: Employees and contractors using the organization’s information systems and services shall be required to note and report any observed or suspected information security weaknesses in systems or services.  An effective approach is to use analysis tools to help manage intrusion detection systems and summarize the data.  Both these types of intrusion detection systems should be used:  HIDS – Host intrusion detection system  NIDS – Network intrusion detection system  Communicating security alerts through an interface that system administrators use to monitor:  Status  Performance of their systems increases the likelihood that they will notice problems quickly. A 16.1.3 Reporting information security weaknesses ISO for Software Outsourcing Companies in India Software solution company in Indiahttp://www.ifourtechnolab.com
  • 6. A 16.1.4 Assessment of and decision on IS events Control: Information security events shall be assessed and it shall be decided if they are to be classified as information security incidents. Identification and prioritization of incident stage involves timely assessment of the situation which can classified into simple steps: Determine the scope/impact. Assess the severity Assess the urgency of event  In the containment stage assessment of the following needs to be done: Does the system need to be removed from the network? Are there user accounts or system-level accounts that need to be disabled or changed? ISO for Software Outsourcing Companies in India Software solution company in Indiahttp://www.ifourtechnolab.com
  • 7. A 16.1.5 Response to IS incidents  Control: Information security incidents shall be responded to in accordance with the documented procedures.  Eradication of the problem, and associated changes to the system need to be applied. This includes technical actions such as Operating system and application software installed New or changed firewall rules Custom configurations applied Databases created Backup data restored Accounts created and access controls applied Software solution company in Indiahttp://www.ifourtechnolab.com
  • 8.  Control: Knowledge gained from analyzing and resolving information security incidents shall be used to reduce the likelihood or impact of future incidents.  To learn from incidents and improve the response process, incidents must be recorded and a Post Incident Review must be conducted. The following details must be retained: Types of incidents Volumes of incidents and malfunctions Costs incurred during the incidents  Incident Management Reporting is a clear source for providing continual improvement to the ISMS. A 16.1.6 Learning from information security incidents ISO for Software Outsourcing Companies in India
  • 9.  Control: The organization shall define and apply procedures for the identification, collection, acquisition and preservation of information, which can serve as evidence.  The collection of evidence for a potential investigation must be approached with care.  Internal Audit must be contacted immediately for guidance and strict processes must be followed for the collection of forensic evidence. A 16.1.7 Collection of evidence Software solution company in Indiahttp://www.ifourtechnolab.com

Editor's Notes

  1. Custom software company India – http://www.ifourtechnolab.com
  2. Custom software company India – http://www.ifourtechnolab.com
  3. Custom software company India – http://www.ifourtechnolab.com
  4. Custom software company India – http://www.ifourtechnolab.com/
  5. Custom software company India – http://www.ifourtechnolab.com
  6. Custom software company India – http://www.ifourtechnolab.com
  7. Custom software company India – http://www.ifourtechnolab.com
  8. Custom software company India – http://www.ifourtechnolab.com
  9. Custom software company India – http://www.ifourtechnolab.com
  10. Custom software company India – http://www.ifourtechnolab.com