Skip to content

Information Security Incident Management Procedure

1. Purpose

To ensure that information security incidents are reported, handled, and improved in a timely manner.

2. Scope

This procedure applies to all events that affect the company’s information assets.

3. Procedure

  • Report – The person who discovers an incident must notify the ISMS (Information Security Management System) owner immediately.
  • Assess – Make an initial assessment of the impact of the incident.
  • Contain – Take necessary measures to reduce impact.
  • Improve – After closure, perform root cause analysis and implement improvements.

4. Example Incidents

  • Unauthorized access
  • Suspected data breach
  • System anomaly or outage

5. Records

  • Incident log – Maintain an incident log (including simulated or drill events where applicable).