Establish and maintain contact information for parties that need to be informed of security incidents.
Contacts may include internal staff, service providers, law enforcement, cyber insurance providers,
relevant government agencies, Information Sharing and Analysis Center (ISAC) partners, or other
stakeholders. Verify contacts annually to ensure that information is up-to-date.
All security incidents are addressed in a consistent manner to improve security based on what has happened.
In the incident treatment process:
The organisation should have clear communication channels for event reporting:
Organisation should also consider the possibility of external reporting. This could mean having a system to handle security event reports from external parties, including:
The organisation should also ensure that the mechanisms and information for reporting incidents are easily accessible to all relevant reporters and establish a feedback procedure to provide timely responses and updates to those who report security events, ensuring they are informed of the outcomes and any necessary follow-up actions.
The organization lists the relevant government actors with whom it is important to actively contact and, if necessary, get in touch quickly. These authorities include national law enforcement and supervisory authorities.
A clear contact person should be defined for the relevant authorities to act as a contact point for the organization.
The organization must have a procedure for reporting disturbances, attacks and violations to the authorities. For example: