Antonio Jose Segovia
October 26, 2015
One of the issues that most concern managers of an organization is that their employees (although employees are not the only source of incidents, but also clients, providers, etc.) be able to work without any incident. However, this is practically impossible, because the people are not perfect, and therefore neither are information systems and technologies.
Thus, we can assume that incidents will happen in any organization, so it is necessary to establish a mechanism that will allow us to be ready when one occurs, or when someone – an employee, a contractor, third-party users of the systems – detects a weakness in the systems or services. The first step to achieve this is to establish a procedure to manage security incidents.
Before I continue with the article, let me remind you that ISO 27000 establishes the definition of a security incident in the following way: “a single or a series of unwanted or unexpected information security events that have a significant probability of compromising business operations and threatening information security.”
Now we are going to see in the following paragraphs the main things that you need to manage security incidents in accordance with ISO 27001 (Annex A.16 Information security incident management).
The management of security incidents is based on different steps, which include:
Therefore, we can see that these could be different states that an incident could have, and it is also important to inform the user about any changes in the state of the incident.
Usually, we will define the following responsibilities:
If the company is small, the technicians for level 1 and level 2 can be the same person.
There are many ways of classifying incidents, but the usual is to consider two parameters:
The intersection of these parameters will allow us to determine the priority of each incident, so in this way you can set, for example, the following table of values:
Priority matrix
So, incidents with value 1 are critical because the urgency and impact are high, so they need to be resolved before the other incidents with values 2, 3, 4, or 5 (this is the right sequence to resolve incidents).
There are many tools on the market to manage security incidents. Most of them register any type of incident, but in this case it would be appropriate to ensure that these tools allow us to differentiate a security incident from other types of incidents.
However, it is not mandatory for an organization to use a specific software tool for managing security incidents. It is equally valid to use an Excel or Word template, to register all security incidents, and to control the status of each one. A software tool can be useful, but if the incidents are few, from my point of view, Excel may be a good option.
Finally, we cannot prevent all security incidents from occurring, because it is impossible, but we can treat them, which means that the organization can be prepared for security incidents and decrease the damage.
If you are implementing ISO 27001, you can use this free ISO 27001 Lead Implementer Online Course to learn all the requirements.