Improvements derived from the monitoring, measurement, assessment, testing, review,
and lessons learned, shall be incorporated into detection process revisions.
Guidance
- This results in a continuous improvement of the detection processes.
- The use of independent teams to assess the detection process could be considered.
The organization shall conduct specialized assessments including in-depth monitoring, vulnerability scanning, malicious user testing, insider threat assessment, performance/load testing, and verification and validation testing on the organization's critical systems.
Guidance
These activities can be outsourced, preferably to accredited organizations.
Security systems are the data systems that are in place to protect the information we have, not so much to process it.
We regularly evaluate the operation of different security systems and the need for new systems.
The knowledge gained from analyzing and resolving security incidents should be used to reduce the likelihood of future incidents and their impact.
The organization regularly analyzes incidents as a whole. This process examines the type, amount and cost of incidents with the aim of identifying recurrent and significant incidents that need more action.
If recurrent incidents requiring response are identified, based on them:
If it is difficult to identify the source of a security incident based on the primary treatment, a separate follow-up analysis is performed for the incident, in which the root cause is sought to be identified.