Skip to main content

⭐ Repository β†’ πŸ’Ό APRA CPG 234

πŸ’Ό 27 Incident management - Information security incident stages

  • ID: /frameworks/apra-cpg-234/27

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-91c1594a

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό 73 Under CPS 234, an APRA-regulated entity’s information security response plans must include mechanisms for managing all relevant stages of an incident.71515no data
γ€€πŸ’Ό 73a detection of an information security event through the use of automated sensors and manual review;99no data
γ€€πŸ’Ό 73b identification and analysis to determine if it is an incident or an event;99no data
γ€€πŸ’Ό 73c escalation to ensure that decision-makers are aware of the incident and to trigger incident response processes;22no data
γ€€πŸ’Ό 73d containment to minimise the damage caused, and reduce the possibility of further damage;99no data
γ€€πŸ’Ό 73e eradication which involves the removal of the source of the information security compromise (typically malware);99no data
γ€€πŸ’Ό 73f response and recovery which involves a mixture of system restoration (where integrity and availability have been compromised) and managing sensitive data loss where confidentiality has been compromised. This allows for a return to businessas-usual processing;44no data
γ€€πŸ’Ό 73g post-incident analysis and review to reduce the possibility of a similar information security incident in the future, improve incident management procedures and forensic analysis to facilitate attribution and restitution (where relevant).no data