Cybersecurity's approach consists of five components:
- Identify
- Protect
- Detect
- Respond
- Recover
All elements that help the organisation achieve its business objectives, such as data, personnel, equipment, systems and facilities, are identified and managed. This is done on the basis of their relative importance to the organisation's business objectives and risk strategy.
The organisation's mission, objectives, stakeholders and activities are clearly understood and prioritised. This information is used to make informed decisions regarding cybersecurity roles, responsibilities and risk management.
The organisation understands and manages its policies, procedures and processes for complying with and overseeing regulatory, legal, risk, environmental and operational requirements. These elements form the basis for cyber security risk management.
The organisation understands the cyber security risks that may affect its operations (including mission, functions, image or reputation), assets and people.
The organisation establishes its priorities, constraints, risk tolerances and assumptions to support operational risk decisions.
Access to assets and associated facilities is restricted to authorised users, processes or devices, and only to authorised activities and transactions.
The organisation's staff and partners are informed and trained on cybersecurity so that they can perform their information security duties and responsibilities according to applicable policies, procedures and agreements.
Information and data are managed according to the organisation's risk strategy to ensure confidentiality, integrity and availability.
Security policies, processes and procedures are maintained and applied to effectively manage the protection of information systems and assets. This includes guidelines on purpose, scope, roles, responsibilities, management involvement and coordination between organisational units.
Maintenance and repairs of industrial control and information system components are carried out according to established policies and procedures.
Technical security solutions are managed to ensure the security and resilience of systems and assets, in line with policies, procedures and agreements.
Anomalies are detected in a timely manner and the potential impact of events is understood.
The information system and assets are monitored periodically to identify cyber security events and verify the effectiveness of protection measures.
Detection processes and procedures are maintained and tested to ensure timely and adequate awareness of anomalous events.
Response processes and procedures are implemented and maintained to ensure rapid response to detected cyber security events.
Response activities are coordinated with internal and external stakeholders, including external support from law enforcement agencies, as needed.
A thorough analysis is carried out to ensure that an appropriate response follows and to support recovery activities.
Measures are taken to prevent the further spread of an event, minimise its impact and eliminate the incident completely.
Organisational response activities are optimised by learning from current and previous detection and response experiences.
Recovery processes and procedures are implemented and maintained to ensure timely recovery of systems or assets affected by cyber security incidents.
Recovery planning and processes are optimised by incorporating lessons learned into future activities.
Recovery activities are coordinated with internal and external parties, including coordination centres, Internet Service Providers, owners of attacking systems, victims, other CSIRTs and vendors.
We like to get in touch
Mail to: sales@irm360.nl or fill in the contactform.