S 6.130 Detection and documentation of security incidents

Initiation responsibility: IT Security Officer

Implementation responsibility: Administrator, Emergency Officer, Specialists Responsible, IT Security Officer

Not every security incident can be recognised immediately as such. Many security incidents, especially when the incident involves targeted, deliberate attacks to IT systems, are only noticed after several days or weeks. False alarms are also common because hardware or software problems are misinterpreted as computer virus infections, for example.

In order to be able to examine and evaluate a security-related irregularity, though, certain analyses need to be performed in advance. These aspects include:

These analyses are performed in the first step when applying the IT-Grundschutz methodology, so security management should already have the results of these analyses.

Security incidents can be detected in various ways:

Based on this information, it is possible to decide quickly which IT systems and IT applications with which protection requirements are affected when a report of a security incident is received. This information also always indicates, as described in the following, which business-critical information and business processes are affected without having to state them explicitly every time. At the same time, it is also possible to identify who was appointed as the contact person and can help make such decisions quickly.

If it is determined that an IT system or IT application with a high protection requirement is affected, the incident is a security incident and the steps specified for handling security incidents must be initiated. However, if only IT applications and IT systems with normal protection requirements are affected, the organisation can attempt to eliminate the security problem locally if the problem is not expected to affect other systems with higher protection requirements. However, possible cumulative effects also need to be taken into account when it is clear that a large number of IT applications and IT systems with normal protection requirements could be affected.

If it is determined that the security incident is highly complex and could have serious consequences, it may make sense to call in the security incident team promptly (see S 6.59 Specification of responsibilities for dealing with security incidents).

If special platform-specific or site-specific knowledge is needed to analyse and manage the security incident, it may help to call in the team of experts for handling security incidents (see S 6.123 Assembling a team of experts for handling security incidents).

The next step in the investigation and assessment of the security incident is to determine the following influencing factors:

If it turns out that the security incident could have serious consequences, at least the next escalation level should become involved.

After surveying the influencing factors, the courses of action resulting from the immediate safeguards and supplemental safeguards must be specified. The priorities specified must be taken into account when specifying the courses of action (see S 6.62 Specifying priorities for handling security incidents). This also includes estimating the time needed to implement these safeguards and estimating the cost and resources required to eliminate the problem and restore operations.

If the extent of the damage, time required, and resulting costs exceed a prescribed limit, the next highest escalation level and decision-making level must become involved before deciding which safeguards to select. The structured investigation and assessment of a security incident reveal the courses of action available.

Incidents reported by users are recorded in incident management by first level support. This means first level support and the service desk are involved in the incident processing cycle right from the start. Incidents detected in IT operations are usually recorded by the administrators of the systems themselves in a trouble ticket system or using similar tools. The incidents are therefore detected and recorded in a variety of different ways. This clearly shows that it is wise to have clear process controls to control the problem and process the security incident.

When an incident is recorded in incident management by first level support, there may be signs indicating that the incident is a security incident without the users even being aware of this. Incident management - in this case first level support -should note that it may be necessary to involve security management and should point this out to the person reporting the incident accordingly.

Review questions: