Reader small image

You're reading from  Certified Information Security Manager Exam Prep Guide - Second Edition

Product typeBook
Published inDec 2022
PublisherPackt
ISBN-139781804610633
Edition2nd Edition
Right arrow
Author (1)
Hemang Doshi
Hemang Doshi
author image
Hemang Doshi

Hemang Doshi has more than 15 years of experience in the field of system audit, IT risk and compliance, internal audit, risk management, information security audit, third-party risk management, and operational risk management. He has authored several books for certification such as CISA, CRISC, CISM, DISA, and enterprise risk management.
Read more about Hemang Doshi

Right arrow

Incident Management Readiness

This chapter provides an overview of information security incident management and the advantages of a structured and effective incident management process. CISM aspirants will be able to gain an understanding of the different aspects of incident management.

The following topics will be covered in this chapter:

  • Incident Management and Incident Response Overview
  • Incident Management and Incident Response Plans
  • Business Impact Analysis
  • Business Continuity Plans and Disaster Recovery Plans
  • Insurance
  • Incident Classification/Categorization
  • Testing Incident Response, BCP, and DRP

Incident Management and Incident Response Overview

Figure 9.1: Incident management

Incident management is defined as the process of handling disruptive events in a structured manner to minimize their impact on business processes. In most organizations, the responsibility for developing and testing incident management lies with the information security manager.

The Relationship between Incident Management and Incident Response

An information security manager needs to understand the difference between incident management and incident response. Incident management encompasses the entire process of managing any incident, which includes planning, testing, communicating, documenting, reviewing, approving, and allocating different tasks for the successful management of the incident.

Incident response includes only those activities that are performed when responding to an incident and focuses on the identification, triage, containment, eradication, and recovery...

Incident Management and Incident Response Plans

An Incident Response Plan (IRP) is one of the most important components of incident management. An IRP determines the activities to be carried out in the event of an incident. It includes different processes for handling the incident along with the assigned roles and responsibilities of staff to manage the incident.

Elements of the IRP

A security manager should understand the following stages for the development of an IRP.

Preparation

The detailed preparation of an IRP helps in smooth execution. The following activities are carried out in the preparation phase:

  • Defining processes to handle incidents
  • Developing the criteria for deciding the severity of incidents
  • Developing a communication plan for stakeholders
  • Developing processes to activate the incident management team

Identification and Triage

In this phase, the emphasis is on identification and a detailed analysis of the incident. The following...

Business Continuity and Disaster Recovery Procedures

A business continuity plan (BCP) is defined as the laid down processes used to prevent, mitigate, and recover from disruptions. A disaster recovery plan (DRP) is a subset of an overall BCP. While the goal of a BCP is to prevent and mitigate incidents, the goal of a DRP is to restore business operations if they are down due to an incident. Thus, a BCP is a continuous process of implementing various controls to prevent or mitigate the impact of incidents, whereas a DRP is activated only when preventive measures have failed and business processes have already been impacted due to an incident.

Apart from having a well-defined BCP, it is of utmost importance for the organization to ensure that both the BCP and DRP and any related documents are available at offsite locations as well.

Phases of Recovery Planning

A security manager should understand the following phases for the implementation of the BCP and the DRP:

  • Conducting...

Insurance

A security manager should consider insurance as one of the important factors to minimize the impact of loss due to incidents. Insurance can be obtained to recover losses. The following are some relevant types of insurance coverage:

  • Insurance to cover damage to IT equipment and facilities
  • Insurance to cover damage to computer-related media
  • Insurance to cover damage on account of cyberattacks
  • Insurance to cover third-party claims and liability
  • Insurance to cover loss of profits due to business disruptions
  • Insurance to cover legal liability arising from errors and omissions
  • Insurance to cover financial loss due to fraud or dishonesty committed by employees (fidelity insurance)
  • Insurance to cover damage to media in transit

Key Aspects from the CISM Exam Perspective

The following are some key aspects from the exam perspective:

...

Incident Classification/Categorization

An information security manager needs to develop a process to classify incidents based on their criticality. Classification helps the organization concentrate on areas of high risk and thus ensures optimum utilization of its limited resources.

The most effective method to deal with multiple incidents is to triage them by considering their criticality.

An information security manager needs to ensure the availability of a documented escalation process. The process should include criteria for the classification of events and the responsibility and authority for each type of event and set of actions along with the desired escalation to be implementeThe information security manager should design this process in consultation with senior management.

Help/Service Desk Processes for Identifying Security Incidents

It is of utmost importance to provide training to help desk personnel to enable them to distinguish between a normal event and a...

Testing Incident Response, BCP, and DRP

Regular testing and exercises are very important for determining the continued adequacy and effectiveness of the BCP and the DRP. It helps to validate the compatibility of the offsite facility to support the organization in the event of a disaster. Testing the BCP helps determine its effectiveness and identify any gaps therein, thereby providing an opportunity to improve the plan.

Types of Tests

The following are some of the important methods for testing the BCP and DRP:

Checklist Review

This test is performed prior to a real test. A checklist is provided to all members of the recovery team for review and for ensuring that the checklist is up to date.

Structured Walk-through

This includes a review of the BCP and DRP on paper. Team members review each step to evaluate the effectiveness of the plans. Identified gaps, deficiencies, and constraints are addressed to improve the plans.

Simulation Test

In this type of test, a...

Summary

In this chapter, you gained an overview of incident management. This chapter will help the CISM candidate determine and document incident response procedures for effective incident management. It will also help the CISM candidate define resilient business processes and determine different aspects of a BCP and DRP, and to test various plans and improve their effectiveness.

The next chapter will cover the practical aspects of incident management operations.

Revision Questions

  1. What is the primary purpose of an incident response procedure?
    1. Containing incidents to reduce the damage
    2. Determining the root cause behind the incident
    3. Implementing corrective controls to prevent re-occurrence
    4. Maintaining records of the incident
  2. What is the most important objective of incident management?
    1. To contain
    2. To conduct a root cause analysis
    3. To eradicate
    4. To control the impact
  3. A security manager is developing an incident response plan. What should their first step be?
    1. Determining the time required to respond to the incident
    2. Determining the escalation process
    3. Determining the resource requirements
    4. Determining the category of the incident based on its likelihood and impact
  4. What is the main objective of incident management and response?
    1. Restoring the disruptive processes within the defined timeframe
    2. Conducting walk-throughs to recover from an adverse event
    3. Complying with the clause of an insurance policy
    4. Addressing the incident to control the impact to an acceptable...
lock icon
The rest of the chapter is locked
You have been reading a chapter from
Certified Information Security Manager Exam Prep Guide - Second Edition
Published in: Dec 2022Publisher: PacktISBN-13: 9781804610633
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime

Author (1)

author image
Hemang Doshi

Hemang Doshi has more than 15 years of experience in the field of system audit, IT risk and compliance, internal audit, risk management, information security audit, third-party risk management, and operational risk management. He has authored several books for certification such as CISA, CRISC, CISM, DISA, and enterprise risk management.
Read more about Hemang Doshi

Question

Possible Answer