S 6.60 Specification of reporting paths for security incidents

Initiation responsibility: IT Security Officer, Top Management

Implementation responsibility: IT Security Officer

In addition to specifying the roles, responsibilities, and procedures in case of security incidents, it is also necessary to define the corresponding reporting paths. The following serves as an example:

It is especially important in this context for all employees to know the contact persons and the reporting paths for all types of security incidents. This could be achieved, for example, by placing a list containing the names, telephone numbers, and e-mail addresses of the particular contact persons in the internal telephone directory or on the Intranet. It must not be difficult or time-consuming for employees to report suspected incidents. Fast and secure communication connections must be available for this purpose. The authenticity of the communication partner and the confidentiality of the information reported on the suspected incident must be ensured.

All employees should be informed that only security management is allowed to pass on information about a security incident to third parties (see also S 6.65 Notification of parties affected by security incidents).

The employees of the press office and public relations department must agree in advance to use specific terminology and phrases to ensure that no information will be released to the public without authorisation and that no false information will be released (see also S 6.59 Specification of responsibilities for dealing with security incidents).

Exercises should be conducted sporadically to check if the procedures for security incidents are adequate and feasible and if all employees are aware of these procedures (see also S 6.68 Testing the effectiveness of the management system for the handling of security incidents).

The importance of having a good working climate and a healthy communication culture has been demonstrated time and time again, especially in the case of security incidents, and they also ensure that security incidents are reported immediately and dealt with openly (see also S 3.8 Avoidance of factors impairing the organisation climate

Review questions: