User's Manual

1-28 KleeYa - User Manual - Version 2
INTRODUCTION
CYBERSECURITY
This means that a multi-faceted strategy for security incident management must be
implemented to ensure the IT environment is truly secure. The ISO/IEC Standard
27035 outlines a five-step process for security incident management, including:
1. Prepare for handling incidents.
2. Identify potential security incidents through monitoring and report all
incidents.
3. Assess identified incidents to determine the appropriate next steps for
mitigating the risk.
4. Respond to the incident by containing, investigating, and resolving it
5. Learn and document key takeaways from every incident.
Once a Cybersecurity incident has been detected, STRATEC recommends to
immediately contact your legal counsel and to initiate these ten steps:
1. Record the date and time when the breach was discovered.
2. Alert and activate everyone on the response team to begin executing the
preparedness plan.
3. Secure the premises around the area where the data breach occurred to help
preserve evidence.
4. Stop additional data loss. Take affected computer systems off-line.
5. Document everything known about the breach.
6. Interview those involved in discovering the breach and anyone else who may
know about it.
7. Review protocols regarding disseminating information about the breach for
everyone involved in this early stage.
8. Assess priorities and risks based on what you know about the breach.
9. Inform the proper authorities, including your regulator and you distribution
partner.
10. Notify law enforcement, if needed, to begin an in-depth investigation.