<section title="7.1. Detecting Information Security Incidents"><subsection title="Objective"><paragraph
    title="7.1.1."


><![CDATA[<p>Organisations have implemented tools, processes and procedures to detect information security incidents, minimise their impact and have these activities embedded as part of IT governance.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="7.1.2."


><![CDATA[<p>This section covers information relating to detecting information security incidents.&nbsp; Detecting physical and personnel security incidents is out of scope of this section, unless there is an impact on information systems. Refer to <a title="Physical Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13224">Chapter 8 - Physical Security</a>&nbsp;and&nbsp;<a title="Personnel Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 - Personnel Security</a>.&nbsp;</p>]]></paragraph>
<paragraph
    title="7.1.3."


><![CDATA[<p class="NormS7C1">It is important to note that in most cases, information systems are likely to be affected.</p>]]></paragraph>
<paragraph
    title="7.1.4."


><![CDATA[<p>Additional information relating to detecting information security incidents, and topics covered in this section, can be found in the following sections of this manual:</p><ul>
<li><a title="Vulnerability Disclosure Policy" href="http://nzism.gcsb.govt.nz/ism-document#Section-12947">Section 5.9 - Vulnerability Disclosure Policy</a>;</li>
<li><a title="Information Security Reviews" href="http://nzism.gcsb.govt.nz/ism-document#Section-13002">Section 6.1 - Information Security Reviews</a>;</li>
<li><a title="Vulnerability Analysis" href="http://nzism.gcsb.govt.nz/ism-document#Section-13027">Section 6.2 - Vulnerability Analysis</a>;</li>
<li><a title="Reporting Information Security Incidents" href="http://nzism.gcsb.govt.nz/ism-document#Section-13120">Section 7.2 – Reporting Information Security Incidents</a>;</li>
<li><a title="Managing Information Security Incidents" href="http://nzism.gcsb.govt.nz/ism-document#Section-13177">Section 7.3 – Managing Information Security Incidents</a>;</li>
<li><a title="Information Security Awareness and Training" href="http://nzism.gcsb.govt.nz/ism-document#Section-13361">Section 9.1 - Information Security Awareness and Training</a>;</li>
<li><a title="Event logging and auditing" href="http://nzism.gcsb.govt.nz/ism-document#Section-15629">Section 16.6 - Event Logging and Auditing;</a></li>
<li><a title="Key Management" href="http://nzism.gcsb.govt.nz/ism-document#Section-16086">Section 17.9 – Key Management</a>; and</li>
<li><a title="Intrusion Detection and Prevention" href="http://nzism.gcsb.govt.nz/ism-document#Section-16436">Section 18.4 - Intrusion Detection and Prevention</a>.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="7.1.5."


><![CDATA[<p class="NormS7C1">Standards and guidance published by Standards Bodies and industry groups include:</p>
<table class="table-main" style="width: 131.424%;">
<tbody>
<tr>
<td style="width: 11.2404%;"><strong>Reference&nbsp;</strong></td>
<td style="width: 13.4885%;"><strong>Title</strong></td>
<td style="text-align: center; width: 12.8273%;"><strong>Publisher</strong></td>
<td style="width: 62.4173%;"><strong>Source</strong></td>
</tr>
<tr>
<td style="width: 11.2404%;"><strong>ISO/IEC 27035-1:2023</strong></td>
<td style="width: 13.4885%;"><strong>&nbsp;Information technology — Security techniques — Information security incident management — Part 1: Principles and Process</strong></td>
<td style="text-align: center; width: 12.8273%;">ISO</td>
<td style="width: 62.4173%;"><a title="Part 1" rel="noopener noreferrer" href="https://www.iso.org/standard/78973.html" target="_blank">ISO/IEC 27035-1:2023 - Information technology — Information security incident management — Part 1: Principles and process</a>&nbsp;</td>
</tr>
<tr>
<td style="width: 11.2404%;"><strong>ISO/IEC 27035-2:2023</strong></td>
<td style="width: 13.4885%;"><strong>Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response</strong></td>
<td style="text-align: center; width: 12.8273%;">ISO</td>
<td style="width: 62.4173%;"><a title="Part 2" rel="noopener noreferrer" href="https://www.iso.org/standard/78974.html" target="_blank">ISO/IEC 27035-2:2023 - Information technology — Information security incident management — Part 2: Guidelines to plan and prepare for incident response</a></td>
</tr>
<tr>
<td style="width: 11.2404%;"><strong>&nbsp;</strong></td>
<td style="width: 13.4885%;"><strong>Definitions of Computer Security Incident</strong></td>
<td style="text-align: center; width: 12.8273%;">NIST</td>
<td style="width: 62.4173%;"><a title="Definition of Computer Security Incident" rel="noopener noreferrer" href="https://csrc.nist.gov/glossary/term/Computer_Security_Incident" target="_blank">https://csrc.nist.gov/glossary/term/Computer_Security_Incident</a>&nbsp;&nbsp;</td>
</tr>
<tr>
<td style="width: 11.2404%;"><strong>SP 800-61 rev.2</strong></td>
<td style="width: 13.4885%;"><strong>Computer Security Incident Handling Guide</strong></td>
<td style="text-align: center; width: 12.8273%;">NIST</td>
<td style="width: 62.4173%;"><a title="NIST" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf [PDF, 1.5 MB]</a></td>
</tr>
<tr>
<td style="width: 11.2404%;">&nbsp;</td>
<td style="width: 13.4885%;"><strong>US-CERT Federal Incident Notification Guidelines</strong></td>
<td style="text-align: center; width: 12.8273%;">CISA</td>
<td style="width: 62.4173%;"><a title="Incident Notification Guidelines" rel="noopener noreferrer" href="https://us-cert.cisa.gov/incident-notification-guidelines" target="_blank">https://us-cert.cisa.gov/incident-notification-guidelines</a>&nbsp;</td>
</tr>
<tr>
<td style="width: 11.2404%;">&nbsp;</td>
<td style="width: 13.4885%;"><strong>NCSC Incident Management Be Resilient Be Prepared</strong></td>
<td style="text-align: center; width: 12.8273%;">NCSC</td>
<td style="width: 62.4173%;"><a rel="noopener noreferrer" href="https://www.ncsc.govt.nz/protect-your-organisation/guides/incident-management-be-resilient-be-prepared/" target="_blank">https://www.ncsc.govt.nz/protect-your-organisation/guides/incident-management-be-resilient-be-prepared/</a></td>
</tr>
<tr>
<td style="width: 11.2404%;">&nbsp;</td>
<td style="width: 13.4885%;"><strong>Cyber Security Incident Response Guide</strong></td>
<td style="text-align: center; width: 12.8273%;">CREST</td>
<td style="width: 62.4173%;"><a href="https://www.crest-approved.org/buying-building-cyber-services/implementation-procurement-guides-resources/">Implementation &amp; Procurement Guides - CREST</a><a href="https://www.crest-approved.org/wp-content/uploads/2022/04/CSIR-Procurement-Guide-1.pdf"></a></td>
</tr>
<tr>
<td style="width: 11.2404%;">&nbsp;</td>
<td style="width: 13.4885%;"><strong>Good Practice Guide for Incident Management</strong></td>
<td style="text-align: center; width: 12.8273%;">ENISA</td>
<td style="width: 62.4173%;"><a href="https://www.enisa.europa.eu/publications/good-practice-guide-for-incident-management">Good Practice Guide for Incident Management | ENISA</a></td>
</tr>
<tr>
<td style="width: 11.2404%;">&nbsp;</td>
<td style="width: 13.4885%;"><strong><span style="font-size: 12.0pt; font-family: &#039;Aptos&#039;,sans-serif; mso-fareast-font-family: Aptos; mso-fareast-theme-font: minor-latin; mso-bidi-font-family: Aptos; mso-ligatures: standardcontextual; mso-ansi-language: EN-NZ; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;">Vulnerability Disclosure for Security researchers</span></strong></td>
<td style="text-align: center; width: 12.8273%;">CISA</td>
<td style="width: 62.4173%;"><a href="https://www.cisa.gov/news-events/news/securitytxt-simple-file-big-value">security.txt: A Simple File with Big Value | CISA</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="PSR references"><paragraph
    title="7.1.6."


><![CDATA[<p class="NormS6C1">Relevant PSR requirements can be found at:</p>
<table class="table-grey">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>PSR Mandatory Requirements</strong></p>
</td>
<td><a title="PSR Mandatory Requirements - Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/governance/mandatory-requirements-2/" target="_blank"></a><span>GOV6, GOV7, INFOSEC1 <span>and&nbsp;</span>INFOSEC4</span></td>
<td><a title="PSR Home" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/" target="_blank">Home | Protective Security Requirements</a><br>
<p><a title="Security Governance" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/security-governance" target="_blank">Security governance (GOV) | Protective Security Requirements</a></p>
<p><a title="Information Security" rel="noopener noreferrer" href="https://www.protectivesecurity.govt.nz/policy/information-security" target="_blank">Information security (INFOSEC) | Protective Security Requirements</a></p>
</td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Preventing and detecting information security incidents"><paragraph
    title="7.1.7.R.01."

    tags="Governance,Information Security Incidents"


><![CDATA[<p class="Normal-nonumbering">Processes and procedures for the detection of information security incidents will assist in mitigating attacks using the most common vectors in systems exploits.</p>]]></paragraph>
<paragraph
    title="7.1.7.R.02."

    tags="Governance,Information Security Documentation"


><![CDATA[<p class="Normal-nonumbering">New or advanced attacks and exploits can frequently be detected through other metrics and effects, rather than direct identification. For example, unexpected spike in network traffic or network latency, unapproved changes in file permissions, unexpected high utilisation of computing resources etc.</p>]]></paragraph>
<paragraph
    title="7.1.7.R.03."

    tags="Governance,Information Security Incidents"


><![CDATA[<p>Potential information security incidents are detected by both personnel and automated incident detection tools.</p>
<ol>
<li>Personnel should be well trained and aware of information security issues.</li>
<li>Automated incident detection tools should be utilised to assist in developing use cases and a known baseline. Management and operation of the tools should be undertaken by experienced information security personnel.</li>
</ol>]]></paragraph>
<paragraph
    title="7.1.7.R.04."

    tags="Governance,Information Security Incidents"


><![CDATA[<p>Agencies may consider some of the tools described in the table below for detecting potential information security incidents.</p>
<p>&nbsp;</p>
<table class="table-secondary" style="width: 100%;">
<tbody>
<tr>
<td>Tool</td>
<td>Description</td>
</tr>
<tr>
<td>Next-Generation Firewall (NGFW)</td>
<td width="454">
<p>NGFWs can provide dynamic network defence by combining application/cloud service level control and dynamic threat feeds with signature or other anomaly detection to help prevent malicious connections to the network, or users connecting to malicious or non-approved cloud services. NGFWs may be deployed as cloud services (i.e. cloud firewall or firewall-as-a-service) or as a hardware or software appliance.</p>
</td>
</tr>
<tr>
<td>Protective DNS</td>
<td>Protective DNS provides real-time secure DNS resolver checks for domains and IP addresses against known malicious entities.</td>
</tr>
<tr>
<td>Threat Intelligence Platform (TIP)</td>
<td>TIPs enable an automated means to collect, analyse and manage threat data received from various intelligence sources to enrich prevention and detection capabilities.</td>
</tr>
<tr>
<td>Network and host Intrusion Detection Systems (IDSs)</td>
<td>Monitor and analyse network and host activity, usually relying on a list of known attack signatures to recognise/detect malicious activity and potential information security incidents.</td>
</tr>
<tr>
<td>Cloud threat detection capabilities</td>
<td>Enable, monitor and tune the threat detection capabilities of respective cloud services to detect threats and create high-quality alerts from log data or agents for cloud workloads and identity providers.</td>
</tr>
<tr>
<td>Anomaly detection systems</td>
<td>Baselines normal host and network activity and identifies events that deviate from expected patterns of activity .</td>
</tr>
<tr>
<td style="width: 26.0779%;">Endpont Detection and Response (EDR) /Extended Detection and Response (XDR</td>
<td style="width: 73.8873%;">Endpoint Detection and Response (EDR) provide host based threat detection and response that provide real-time monitoring and analytics. Extended Detection and Response expands on the functions of EDR to distinct security capabilities within your organisation.</td>
</tr>
<tr>
<td style="width: 26.0779%;">Log analysis</td>
<td style="width: 73.8873%;">Involves collecting and analysing event logs using pattern recognition to detect anomalous activities.</td>
</tr>
<tr>
<td style="width: 26.0779%;">Application Allow listing</td>
<td style="width: 73.8873%;">Lists the authorised activities and applications and permits their usage.</td>
</tr>
<tr>
<td style="width: 26.0779%;">Security Information and Event Management (SIEM)</td>
<td style="width: 73.8873%;">SIEM solutions provide centralised platform for log collection, storage, alerting and detection of security threats.</td>
</tr>
<tr>
<td style="width: 26.0779%;">Data Loss Prevention (DLP)</td>
<td style="width: 73.8873%;">DLP solutions identify and prevent sharing or transfer of sensitive information.</td>
</tr>
<tr>
<td style="width: 26.0779%;">security.txt</td>
<td style="width: 73.8873%;">Internet standard RFC 9116 defines a way for organisations to disclose their vulnerability disclosure practices.</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="7.1.7.R.05."

    tags="Governance,Information Security Incidents"


><![CDATA[<p class="Normal-nonumbering">Automated tools are only as good as their implementation and the level of analysis they perform.&nbsp; If tools are not configured to assess all areas of potential security risk then some vulnerabilities or attacks will not be detected. &nbsp;Maintenance of the tools is important to ensure that emerging threats and vulnerabilities are able to be identified. Failure to do so will reduce the effectiveness to identify vulnerabilities.</p>]]></paragraph>
<paragraph
    title="7.1.7.C.01."

    tags="Information Security Documentation,Information Security Incidents"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="1153"
><![CDATA[<p>Agencies MUST develop, implement and maintain tools and procedures covering the detection of potential information security incidents, incorporating:</p><ul>
<li>user awareness and training;</li>
<li>counter-measures against malicious code, known attack methods and types;</li>
<li>intrusion detection strategies;</li>
<li>data egress monitoring &amp; control;</li>
<li>access control anomalies;</li>
<li>audit analysis;</li>
<li>system integrity checking; and</li>
<li>vulnerability assessments.</li>
</ul>]]></paragraph>
<paragraph
    title="7.1.7.C.02."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1154"
><![CDATA[<p>Agencies SHOULD develop, implement and maintain tools and procedures covering the detection of potential information security incidents, incorporating:</p>
<ul>
<li>user awareness and training;</li>
<li>counter-measures against malicious code, known attack methods and types;</li>
<li>intrusion detection strategies;</li>
<li>dynamic network defence (i.e. protective DNS and/or NGFW)</li>
<li>data egress monitoring &amp; control;</li>
<li>access control anomalies;</li>
<li>audit analysis;</li>
<li>system integrity checking; and</li>
<li>vulnerability assessments.</li>
</ul>]]></paragraph>
<paragraph
    title="7.1.7.C.03."

    tags="Governance,Information Security Incidents"


    classification="All Classifications"
    compliance="Should"
    cid="1155"
><![CDATA[<p class="Normal-nonumbering">Agencies SHOULD use the results of the security risk assessment to determine the appropriate balance of resources allocated to prevention versus resources allocated to detection of information security incidents.</p>]]></paragraph>
</block>
</subsection>
</section>
