S 2.201 Documentation of the security process

Initiation responsibility: IT Security Officer

Implementation responsibility: IT Security Officer

The sequence of events in the security process, all major decisions made, and the results of the work done in each of the phases should be documented. Such documentation is an essential foundation for maintaining information security, and is therefore a decisive prerequisite for the efficient refinement of the process. It helps to find and eliminate the causes of malfunctions and failed procedures in information security. It is important not only to be able to access the current version, but also to archive the previous versions at a central location. It is only possible to follow and understand the developments and decisions made in the area of information security when continuous documentation is available.

There are other documents relevant to security management in addition to the documents on security management and the security process. The following types of documentation should be considered depending on the object and the intended purpose:

Reports to management

In order for the top management of a government agency or company to make the right decisions and ensure an adequate level of information security is available, it needs the information necessary to make these decisions. The IT Security Officer and the IS management team should produce regular management reports as well as event-based management reports on the status of information security (see also S 2.200 Management reports on information security).

Documents on the security process

The following types of documentation on the security process should be created:

Documentation of workflows and procedures

Work procedures, organisational stipulations and technical security safeguards must be documented such that security incidents caused by a lack of knowledge or mistakes can be avoided.

In the event of disruptions or security incidents, it must be possible to recover the desired target states of the business processes and of the IT. Technical details and work procedures must therefore be documented such that this can be achieved within a reasonable amount of time.

Documentation of security incidents

Security-related events must be documented so that all processes and decisions made in this regard can be understood. Likewise, the documentation should also enable improvements to be made to the contingency strategies and ensure known errors are avoided. In order to process security incidents, it is also necessary to store and archive technical documents such as logs and system reports that are particularly relevant to the incident. The data protection rules must be followed in this context.

Technical documentation

This type of security-related documentation includes the following documents:

Instructions for employees

Security safeguards must be documented so that employees can understand them. The employees need to have the following available to them for this reason:

In rare cases, it may make sense or even be necessary to violate a security policy. All such violations must be approved by an authorised body, though. Exceptions should only be allowed after thorough examination and should only be granted in extremely rare cases. Afterwards, justification for the exception should be provided in writing and signed by the person responsible.

Information flow and reporting routes

Descriptions of the reporting paths as well as prompt updating of these paths and of the procedure for ensuring the flow of information are essential to maintaining the security process.

Documentation procedure

It is the task of the IT Security Officer and the IS management team to maintain current and informative documentation on information security at all times. For this reason, there should be a standard procedure for all documentation created in the framework of the security process. This includes ensuring the following points, for example:

A document management system can help to maintain and manage the large number of security-related documents (see also S 2.259 Introduction of a high-level document management system).

Documentation does not always need to be available in paper form. The documentation medium can be selected as needed. Overview diagrams (e.g. a network plan), brief meeting minutes (of the annual management meeting in which the security strategy is discussed, for example), handwritten notes, or software tools (for documenting the security concept, for example) can be used for the purpose of documentation.

Review questions: