NML

Security incident reporting

Posted on 13 March 2019
Charl Marais

Introduction

Security must always be of utmost importance to everybody working at NML. The success and longevity of NML as a business is inextricably tied to the appropriate implementation security policies that safeguard NML and its customers and business partners.

NML IT Management

Security Incident Categorization

Security incidents include:

Public

This information is general public knowledge. Unauthorized disclosure of this information will not cause problems for NML, and its clients/partners. Examples are marketing materials, freely downloadable content, etc.

Internal Use Only

This information is for use within NML only, or for project communication between NML and clients/partners. Unauthorized disclosure of this information to outsiders may be against laws and regulations, confidentiality agreements, or may cause problems for NML and its clients/partners. This type of information is already widely distributed within NML, or it intended for distribution within NML without advance permission from the information owner. Examples are project scope and requirements documents, billing documents, request for information, sales agreements, etc.

Restricted/Confidential (Privacy Violation)

This information is private or otherwise sensitive in nature and must be restricted to those with a legitimate business need for access. Unauthorized disclosure of this information may be against laws and regulations, confidentiality agreements, or may cause significant problems for NML and its clients/partners. Decisions about the provision of access to this information requires approval by the information owner. Examples are any data covered by POPI regulations, information specified as private by clients/partners, NML salary information, project source code, etc.

Security Incident Response

Immediate Security Incident Response

The following steps are required upon detection of a possible security incident:

  1. Notify and discuss the incident with NML IT management.
  2. Take immediate appropriate actions (based on discussion with NML IT management) to contain any further potential breaches. That includes actions like shutting down/disconnecting affected systems or components, updated firewalls or network security groups, user rights, etc. It's important to stop any further potential damage until a more clear assessment of the situation can be obtained. It's easier to explain and contain a false positive than to deal with a security breach that was made worse by inaction because an assessment was still being made.
  3. Notify the appropriate contact person(s) at the client or partner (if applicable)
  4. Fill in the IT Security Incident Reporting Form (link to be provided) and send to NML IT management.

Follow-up Security Incident Response

After an security incident has been reported and contained, follow-up actions are required:

An error has occurred. This application may no longer respond until reloaded. Reload