By ITIL® from Experience©
The “Taxonomy of Operational Cyber Security Risks” (PDF 960 KB) published by the Software Engineer Institute can be used to produce a list of categories to classify the cause of IT security incidents.
Although not all ITSM Tools provide a hierarchical categorization scheme to classify the cause of incidents the taxonomy1 of cybersecurity risks provided below provides a starting point to develop categories appropriate for your organization.
More importantly, the document includes easy to understand definitions for each of the four Classes and Subclasses. Clear, unambiguous definitions are critical to ensure that people follow the process and classify the cause of IT security incidents properly to enable Problem Management.
“This report presents a taxonomy of operational cyber security risks that attempts to identify and organize the sources of operational cyber security risk into four classes: (1) actions of people, (2) systems and technology failures, (3) failed internal processes, and (4) external events. Each class is broken down into subclasses, which are described by their elements. This report discusses the harmonization of the taxonomy with other risk and security activities, particularly those described by the Federal Information Security Management Act (FISMA), the National Institute of Standards and Technology (NIST) Special Publications, and the CERT Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) method.” Source: http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=9395
Last updated on: 2016-09-02
"When working for IT Security, you are only one Incident away from being the most important group in I.T."
- How many categories do we need
- How to come up with categories for our service requests
- Should incidents be closed or kept open for monitoring
- Does an emergency change need an incident
- Should a Problem be opened for every Major Incident
From Around the Web:
Copyright 2016 - ITIL® from Experience© - D.Matte