The organization should develop and implement procedures for identifying, collecting, acquiring, and preserving evidence related to information security events. These procedures aim to ensure a consistent and effective management of evidence, particularly for disciplinary and legal actions resulting from information security incidents.
Our organization has defined the actions to be taken in the event of a breach of confidentiality. These may include e.g. the following steps:
Organization must create processes that identify, collect and store relevant evidence information related to information security incidents. The evidence may need to have been collected in a way that can be accepted in relevant courts or other similar disciplinary bodies.
Regarding the evidence material, it should be possible to demonstrate e.g.:
Certification or other assurances of the competency of related personnel and tools may additionally be considered to establish more evidentiary value.