Information Security Standards


Appendix A: Information Security Incident Categories and Reporting Timeframes


Download 377.5 Kb.
bet16/16
Sana02.01.2022
Hajmi377.5 Kb.
#200822
1   ...   8   9   10   11   12   13   14   15   16
Bog'liq
isp manual

Appendix A: Information Security Incident Categories and Reporting Timeframes


Category

Name

Description

Reporting Timeframe Criteria

CAT 1

Unauthorized Disclosure of Confidential or Sensitive Information

An unauthorized deliberate or inadvertent disclosure of information classified as “confidential or sensitive.”

Immediately upon discovery / detection.

CAT 2

Unauthorized Information Resource Access

A person gains logical and / or physical access without permission to a SCO network, system, application, or other information resource.

Immediately upon discovery / detection.

CAT 3

Denial of Service

An attack that prevents or impairs the authorized use of SCO networks, systems, or applications by exhausting resources.

Within one hour of discovery / detection if the successful attack is still ongoing and the SCO or DTS (Department of Technology Services) is unable to successfully mitigate activity.

CAT 4

Malicious Code

A virus, worm, Trojan horse, or other code-based malicious entity that infects a host.

Immediately upon discovery / detection if the attack leads to a CAT 1, 2, or 3 incident; or within one hour if the attack is ongoing and spreading throughout the SCO enterprise and the SCO or DTS (Department of Technology Services) is unable to successfully mitigate activity.

CAT 5

Unauthorized Access to an SCO Facility or Work Area

A person who is not authorized by the appropriate division enters a secure work area or facility.

Immediately upon discovery / detection.

CAT 6

Theft or loss of a SCO Information Resource

The theft or loss of an SCO information resource (i.e., PC, laptop, PDA, server, Microfiche, CD-ROM, USB Drive, etc.).

Immediately upon discovery / detection if the violation leads to a CAT 1 or 2, incident; or within one day upon discovery / detection.

CAT 7

Violation of a SCO Information Security Program Standard

A person who violates any SCO Information Security Program Standard without being granted an exception by an authorized entity.

Immediately upon discovery / detection if the violation leads to a CAT 1, 2, or 3 incident; or within one day upon discovery / detection.

CAT 8

Inappropriate Usage

A person violates SCO and / or SCO Divisional acceptable information and / or information resource use policies.

Immediately upon discovery / detection if the violation leads to a CAT 1, 2, or 3 incident; or within one day upon discovery / detection.

CAT 9

Probes and Reconnaissance Scans

This category includes any activity that seeks to access or identify a SCO information resource, open ports, protocols, service, or any combination for later exploit. This activity does not directly result in a compromise or denial of service.

Monthly; if information resource stores confidential information or is classified as business critical, report within one hour of discovery.

CAT 10

Investigation

Unconfirmed incidents that are potentially malicious or anomalous activity deemed by the reporting entity to warrant further review.

Not Applicable; this category is for SCO use to categorize a potential incident that is currently being investigated.




© California State Controller’s Office, Information Security Office 2008



Download 377.5 Kb.

Do'stlaringiz bilan baham:
1   ...   8   9   10   11   12   13   14   15   16




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling