The approach to Cybersecurity consists of 5 components:
- Identify
- Protect
- Detect
- Respond
- Recover
All elements that help the organization achieve its business objectives, such as data, personnel, equipment, systems and facilities, are identified and managed. This is done based on their relative importance to the organization's business objectives and risk strategy.
The organization's mission, objectives, stakeholders and activities are clearly understood and prioritized. This information is used to make informed decisions regarding cybersecurity roles, responsibilities and risk management.
The organization's mission, objectives, stakeholders and activities are clearly understood and prioritized. This information is used to make informed decisions regarding cybersecurity roles, responsibilities and risk management.
The organization understands the cybersecurity risks that may affect its operations (including mission, functions, image or reputation), assets and people.
The organization establishes its priorities, constraints, risk tolerances and assumptions to support operational risk decisions.
Access to assets and associated facilities is restricted to authorized users, processes or devices, and only to authorized activities and transactions.
The organization's staff and partners are informed and trained on cyber security so that they can carry out their information security duties and responsibilities according to applicable policies, procedures and agreements.
Information and data are managed according to the organization's risk strategy to ensure confidentiality, integrity and availability.
Security policies, processes and procedures are maintained and applied to effectively manage the protection of information systems and assets. This includes guidelines on purpose, scope, roles, responsibilities, management involvement and coordination among organizational units.
Maintenance and repairs of industrial control and information system components are performed according to established policies and procedures.
Technical security solutions are managed to ensure the security and resilience of systems and assets in line with policies, procedures and agreements.
Anomalies are detected in a timely manner and the potential impact of events is understood.
The information system and assets are monitored periodically to identify cyber security events and verify the effectiveness of protective measures.
Detection processes and procedures are maintained and tested to ensure timely and adequate awareness of anomalous events.
Response processes and procedures are implemented and maintained to ensure rapid response to detected cybersecurity events.
Response activities are coordinated with internal and external stakeholders, including external law enforcement support, as needed.
A thorough analysis is conducted to ensure appropriate response and to support remedial activities.
Measures are taken to prevent the further spread of an event, minimize its impact and eliminate the incident completely.
Optimize organizational response activities by learning from current and previous detection and response experiences.
Recovery processes and procedures are implemented and maintained to ensure timely recovery of systems or assets affected by cyber security incidents.
Optimize recovery planning and processes by incorporating lessons learned into future activities.
Recovery activities are coordinated with internal and external parties, including coordination centers, Internet Service Providers, owners of attacking systems, victims, other CSIRTs and vendors.
We are happy to get in touch.
Mail to: sales@irm360.nl or fill in the contact form.