S 6.132 Limiting the effects of security incidents

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: IT Security Officer, Head of IT, Administrator

In addition to effectively analysing the causes of a security incident, it is also important to contain the damage resulting from the security incident. The direct effects of the security incident must be detected, estimated, and contained immediately so that the resulting damage does not reach a high or very high level or a level that threatens the existence of the organisation. For this, it is necessary for security management to have adequate information and an overview of the relationships between the IT processes and the business processes as well as an overview of the IT systems, IT applications, and other resources needed for these processes. This information may come from a structure analysis, a protection requirements determination, or business impact analysis, for example. This is the only way to make reliable statements regarding the extent and amount of eventual damage.

It is often easier to analyse a security incident when the IT systems or locations affected are isolated, and this also reduces the risk of the damage spreading to any areas not yet affected.

It will also be occasionally necessary to decide that containing the damage should take precedence over clarifying the security incident. For this reason, worst-case scenarios of selected security incident scenarios should be examined.

Review questions: