SAMMY UI is optimized for resolutions with a width 1024px and higher.
Security Incident Management Policy and Procedures
SEF-01: Are policies and procedures for security incident management, e-discovery, and cloud forensics established, documented, approved, communicated, applied, evaluated, and maintained?
Management-approved policies and procedures for organizations and personnel who manage incidents should incorporate clearly defined roles and responsibilities—including guidelines on managing the “chain of custody” for forensic evidence collected from affected systems, devices, cloud services, applications, and personnel. These policies, procedures, and supporting systems should result in legally admissible evidence.

Policies should require establishing a core, qualified, and standing incident response team that holds the capability to assess, respond, learn, and communicate appropriately.

Appropriate reporting standards and procedures shall include lessons learned and key performance indicators (KPIs), which should be defined and implemented for incident response processes and training.

Appropriate information should be shared with affected third parties (including customers) promptly.
Control implemented
Control ownership
Description

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for Security Incident Management, E-Discovery, and Cloud Forensics. Review and update the policies and procedures at least annually.

Security Incident Management Policy and Procedures
SEF-01: Are policies and procedures reviewed and updated annually?
Management-approved policies and procedures for organizations and personnel who manage incidents should incorporate clearly defined roles and responsibilities—including guidelines on managing the “chain of custody” for forensic evidence collected from affected systems, devices, cloud services, applications, and personnel. These policies, procedures, and supporting systems should result in legally admissible evidence.

Policies should require establishing a core, qualified, and standing incident response team that holds the capability to assess, respond, learn, and communicate appropriately.

Appropriate reporting standards and procedures shall include lessons learned and key performance indicators (KPIs), which should be defined and implemented for incident response processes and training.

Appropriate information should be shared with affected third parties (including customers) promptly.
Control implemented
Control ownership
Description

Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures for Security Incident Management, E-Discovery, and Cloud Forensics. Review and update the policies and procedures at least annually.