S 6.67 Use of detection measures for security incidents

Initiation responsibility: IT Security Officer

Implementation responsibility: IT Security Officer

It is also essential to detect security incidents in addition to preventing them. There are a number of security-related irregularities that can be detected automatically, and therefore early, using the corresponding technical aids. These detection measures usually increase the reliability of the detection and drastically reduce the time between the occurrence and the detection of an irregularity. However, the response capabilities and response time gained come in conjunction with the additional time and effort required for their implementation and monitoring, which should be estimated in advance. Such detection measures are practically indispensable in cases where a damage event has the potential to cause a great deal of damage, and possibly even personal injury.

The following are examples of such technical detection measures:

Not all security incidents can be detected quickly using technical safeguards alone. In many cases, additional organisational safeguards also need to be implemented. The reliability of technical detection measures generally depends on how up-to-date they are and how well they have been adapted to the actual conditions. The reliability of organisational detection measures is highly dependent on the reliability of the people assigned to implement them, but also on the extent to which the measures can actually be implemented in ongoing operations. The suitability of all detection measures must be checked regularly.

Typical examples of detection measures that are partially or entirely of an organisational nature include the following:

An overview of the detection measures used should be available.

The security incidents detected should be registered as incidents immediately so that they can be clearly documented from the time of their initial detection until their resolution. For this reason, the systems in which this information will be recorded must be specified. In addition, the service desk must know which information needs to be recorded when a security incident is reported (provided that it is possible to determine from the report if the incident is actually a security incident).

Review questions: