Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 12

6

Security Incident (SI) Register

Source Severity Priority Date & time


Incident # Incident Type Reference (1/2/3/4) (1/2) Raised
Date & time time/Days Status
reported to Date & time elapsed for (Closed/O
SCA Closed open SIs Duration Raised By pen)
Descriptio Resolution Corrective & Preventative Action
n Owner taken - incident handling Resolution Cause
Defect Source
Priority Levels for Incidents and Problems
Incidents a) impact ..The following table applies to all
Security Incidents.
IMPACT

Security Incident

* All of the types of information referred to in the above rows have the meaning given to them in the S

b) urgency ..(i) Security Incidents The following table


applies to all Security Incidents.
URGENCY

Security Incident

* All of the types of information referred to in the above rows have the meaning given to them in the S
HIGH

· Denial of Service (Denial of Service or distributed denial


of Service attacks.)

· Hacking (Reconnaissance or suspicious activity,


excluding malware.)

· Compromised Asset (A compromised host, network


device, application, or user account. This is inclusive of
malware infections where an attacker actively controls
the system (root access, Trojan, rootkit).)

· Compromised Information (Attempted or successful


destruction, corruption, or disclosure of Group
information or intellectual property.)

· Unlawful activity (Theft/fraud/human safety/child


exploitation. Incidents of a criminal nature or are likely to
involve law enforcement or international investigations.)

in the above rows have the meaning given to them in the SCA's Information Security Classification Guidelines.

HIGH
· Medium Protected Data or High risk systems being targeted.

Large number of targeted or vulnerable systems.

in the above rows have the meaning given to them in the SCA's Information Security Classification Guidelines
c) Priority Level Priority Levels for Incidents are determined on the basis of both the
impact and urgency, as follows:
MEDIUM

· Malware (Malicious software, such as a virus or worm, affecting


multiple devices. This excludes compromised hosts where an attacker
actively controls the system (compromised asset.)
· Acceptable Use Violations (Possession or sharing of
offensive/copyright material. Intentional violation of Information
Security policy. Inappropriate use of Group assets such as computers,
networks, or applications. )

Security Classification Guidelines.

MEDIUM
· Highly Protected Data or High risk systems being targeted.

Large number of targeted or vulnerable systems.


Externally accessible systems.
Security Classification Guidelines
PRIORITY LEVELS

Urgency
Impact
ORITY LEVELS High
High 1
Medium 2
Low 3
Medium Low
2 3
3 4
4 4

You might also like