Logging and Monitoring (LOG)

Define, implement and evaluate processes, procedures and technical measures for the reporting of anomalies and failures of the monitoring system and provide immediate notification to the accountable party.


Login

Security Incident Management and E-Discovery and Cloud Forensics (SEF)

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for Security Incident Management, E-Discovery, and Cloud Forensics. Review and update the policies and procedures at least annually.


Login

Security Incident Management and E-Discovery and Cloud Forensics (SEF)

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for the timely management of security incidents. Review and update the policies and procedures at least annually.


Login

Security Incident Management and E-Discovery and Cloud Forensics (SEF)

'Establish, document, approve, communicate, apply, evaluate and maintain a security incident response plan, which includes but is not limited to: relevant internal departments, impacted CSCs, and other business critical relationships (such as supply-chain) that may be impacted.'


Login

Security Incident Management and E-Discovery and Cloud Forensics (SEF)

Test and update as necessary incident response plans at planned intervals or upon significant organizational or environmental changes for effectiveness.


Login

Security Incident Management and E-Discovery and Cloud Forensics (SEF)

Establish and monitor information security incident metrics.


Login

Security Incident Management and E-Discovery and Cloud Forensics (SEF)

Define, implement and evaluate processes, procedures and technical measures supporting business processes to triage security-related events.


Login

Security Incident Management and E-Discovery and Cloud Forensics (SEF)

Define and implement, processes, procedures and technical measures for security breach notifications. Report security breaches and assumed security breaches including any relevant supply chain breaches, as per applicable SLAs, laws and regulations.


Login

Security Incident Management and E-Discovery and Cloud Forensics (SEF)

Maintain points of contact for applicable regulation authorities, national and local law enforcement, and other legal jurisdictional authorities.


Login

Supply Chain Management and Transparency and Accountability (STA)

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for the application of the Shared Security Responsibility Model (SSRM) within the organization. Review and update the policies and procedures at least annually.


Login