Skip to main content

๐Ÿ’ผ 27 Incident management - Information security incident stages

  • Contextual name: ๐Ÿ’ผ 27 Incident management - Information security incident stages
  • ID: /frameworks/apra-cpg-234/27
  • Located in: ๐Ÿ’ผ APRA CPG 234

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-91c1594a

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 73 Under CPS 234, an APRA-regulated entityโ€™s information security response plans must include mechanisms for managing all relevant stages of an incident.7
    ๐Ÿ’ผ 73a detection of an information security event through the use of automated sensors and manual review;99
    ๐Ÿ’ผ 73b identification and analysis to determine if it is an incident or an event;99
    ๐Ÿ’ผ 73c escalation to ensure that decision-makers are aware of the incident and to trigger incident response processes;22
    ๐Ÿ’ผ 73d containment to minimise the damage caused, and reduce the possibility of further damage;99
    ๐Ÿ’ผ 73e eradication which involves the removal of the source of the information security compromise (typically malware);99
    ๐Ÿ’ผ 73f response and recovery which involves a mixture of system restoration (where integrity and availability have been compromised) and managing sensitive data loss where confidentiality has been compromised. This allows for a return to businessas-usual processing;44
    ๐Ÿ’ผ 73g post-incident analysis and review to reduce the possibility of a similar information security incident in the future, improve incident management procedures and forensic analysis to facilitate attribution and restitution (where relevant).