week 13

D Cyber security documentation

 

D1 Internal policies

General IT policies

• The purpose and content of general security-related IT policies and their effectiveness,

including:

o understanding the requirements to prepare a cyber security policy using the

Plan-Do-Check-Act loop derived from part of the International Organization for

Standardization (ISO) 27001:2013

o organisation policies and their application, including policies on internet and email

use, security and password procedures, staff responsibilities, staff IT security training

o security audits and their application to check compliance against policies

o backup policy – selection of data, methods (full and incremental),

frequency and storage

o data protection policy – to ensure organisational compliance with the

relevant legislation.

Incident response policy

• The purpose and content of an incident response policy and associated procedures:

o assembling the Computer Security Incident Response Team (CSIRT), roles in the

team, including team leader, incident lead, associate members

o incident reporting procedures, including what constitutes a security incident,

and how to report it and to whom

o initial assessment of the incident, including identifying if this is a real incident,

the type of attack and its severity

o communicating the incident to the CSIRT and other relevant individuals

o containing the damage and minimising the risk

o protect people’s safety:

– protect sensitive data and other data, protecting the most valuable first

– protect hardware and software

– minimise disruption to computing resources

o identifying the type and severity of the compromise, including the nature of the

attack, its intent, its origin and the systems and files that have been compromised

o protecting evidence and creating backups for evidence and data recovery, including

the removal and storage of original hard disks

o notifying external agencies, if appropriate, and discussing options with legal

representatives, contact external agencies such as law enforcement, external security

and virus experts

o recovery of systems and identification of the point in time when the compromise

occurred and restore backups from before that point in time

o compile and organise incident documentation, including documentation created by

the CSIRT identifying the details of the breach and actions taken

o know the importance of preserving and collating documentation that may be needed

to prosecute offenders

o review outcomes to update policies and improve training.

Disaster recovery policy

• Understand the topics typically covered in a disaster recovery plan and their purpose:

o identification of critical systems, definitions of recovery time objective (RTO) and

recovery point objective (RPO)

o prevention, response and recovery strategies for critical systems, including:

– people responsible

– facilities and equipment required

– data backup location and format

– network connectivity and bandwidth

– suppliers of equipment and people

o definition of recovery procedures for each critical system

o disaster recovery plan structure following ISO 27031/24762 or other relevant

international equivalents, including:

– introduction

– roles and responsibilities

– incident response procedures

– activating the disaster recovery plan

– procedures to be followed.


Last Updated
2018-08-29 14:27:34

Links to Learning Outcomes

Links to Assessment criteria

 


English


Maths







How 2's Coverage

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.

Files that support this week


| | | | |
Week 12
Prev
Week 13
Prev
Week 14
Prev

Next

Next
Webmaster Spelling Notifications