- : Executing a Policy
- Security Incident Response
- Computer Security Incident Response Teams
- Preparing for Incident Response
- Management of Security by Teams
- Execution of an Incident Response
- Evaluation of a Security Incident
- Containing the Incident
- Eradicating the Incident
- Recovering From an Incident
- Article Series
- About the Author
- Acknowledgements
- References
- Ordering Sun Documents
- Accessing Sun Documentation Online
Security Incident Response
Every security incident response program will contain unique elements that exist and make sense only for its organization. This article discusses only a common set of elements that can be followed for security incident response. However, these elements must be treated only as a starting point for a more detailed analysis for a policy document.
In this article, we describe the essentials of executing a security incident response policy for an organization within an enterprise. The organization could span all geographic zones, or it could be based in a specific geographic area. All organizations that ship computer-based equipment and/or software to their customers need to define what a computer security incident is in relation to their own and/or customers' sites.