The organization shall implement an incident handling capability for information/cybersecurity incidents on its business-critical systems that includes
preparation, detection and analysis, containment, eradication, recovery, and documented
risk acceptance.
Guidance
A documented risk acceptance deals with risks that the organization assesses as not dangerous to the organization’s business critical systems and where the risk owner formally accepts the risk (related with the risk appetite of the organization)
The organization has defined a process for addressing identified technical vulnerabilities.
Some vulnerabilities can be fixed directly, but vulnerabilities that have a significant impact should also be documented as security incidents. Once a vulnerability with significant impacts has been identified:
We have defined the rules for responding to identified vulnerabilities. The rules may include e.g. the following things:
Vulnerabilities related to high-risk data systems are always of high severity and are addressed first.