ISO/IEC 27035-4:2024
(Main)Information technology - Information security incident management - Part 4: Coordination
Information technology - Information security incident management - Part 4: Coordination
This document provides guidelines for multiple organizations handling information security incidents in a coordinated manner. It also addresses the impacts of external cooperation on the internal incident management of an individual organization and provides guidelines for an individual organization to adapt to the coordination process. Furthermore, it provides guidelines for the coordination team, if it exists, to perform coordination activities supporting the cross-organization incident response. The principles given in this document are generic and are intended to be applicable to multiple organizations to work together to handle information security incidents, regardless of their types, sizes or nature. Organizations can adjust the guidance given in this document according to their type, sizes and nature of business in relation to the information security risk situation. This document is also applicable to an individual organization that participates in partner relationships.
Technologies de l'information — Gestion des incidents de sécurité de l'information — Partie 4: Coordination
General Information
Overview
ISO/IEC 27035-4:2024 - Part 4 of the ISO/IEC 27035 series - provides practical guidance for coordination of information security incident management across multiple organizations. The standard explains how organizations (and coordination teams) can work together to detect, assess, respond to and learn from incidents that cross organizational boundaries. Its guidance is intentionally generic so it can be adapted to different sizes, sectors and risk profiles and is also applicable to individual organizations participating in partner relationships.
Key topics and requirements
The document focuses on coordinated incident management and covers:
Principles of coordination
- Timeliness - prompt exchange and action
- Roles and responsibilities - clear ownership across participants
- Common understanding - shared situation awareness and terminology
- Confidentiality - controlled information handling
Coordinated incident management process
- Plan & prepare for multi-organization response
- Detect & report incidents across partners
- Assess & decide jointly on impact and containment
- Respond in a coordinated manner
- Learn lessons and update joint processes
Guidance for coordination activities
- Developing coordination policies and governance
- Establishing resilient communications channels
- Threat and event information sharing (types of information, forming relationships, participation rules)
- Conducting coordinated exercises
- Building trust among members and stakeholders
Coordination team role
- Functions as an independent facilitator for information exchange, response coordination and community-wide situational awareness; may not perform direct remediation but enables member IRTs (e.g., CSIRTs/CERTs).
Practical applications - who uses this standard
ISO/IEC 27035-4:2024 is intended for:
- CSIRTs, CERTs and internal Incident Response Teams (IRTs)
- Incident coordinators, IMTs and security managers
- Sectoral, regional or national coordination teams
- ISPs, service providers, regulators and law enforcement when cross-boundary incidents occur
- Organizations in supply chains or business partner networks forming information sharing relationships
Use cases include establishing cross-organization SOPs, designing shared communications and information-sharing agreements, running multi-party exercises, and defining trust/confidentiality controls for collaborative incident response.
Related standards (for context)
- ISO/IEC 27035-1 / -2 / -3 (incident management principles, planning, ICT operations)
- ISO/IEC 27000 (vocabulary and overview)
- ISO/IEC 29147, ISO/IEC 30111, ISO/IEC TR 5895 (vulnerability disclosure/coordination)
- ISO 22320 (incident management process guidance)
Keywords: ISO/IEC 27035-4:2024, information security incident management, incident coordination, coordinated incident response, CSIRT, information sharing, cross-organization incident response.
Frequently Asked Questions
ISO/IEC 27035-4:2024 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology - Information security incident management - Part 4: Coordination". This standard covers: This document provides guidelines for multiple organizations handling information security incidents in a coordinated manner. It also addresses the impacts of external cooperation on the internal incident management of an individual organization and provides guidelines for an individual organization to adapt to the coordination process. Furthermore, it provides guidelines for the coordination team, if it exists, to perform coordination activities supporting the cross-organization incident response. The principles given in this document are generic and are intended to be applicable to multiple organizations to work together to handle information security incidents, regardless of their types, sizes or nature. Organizations can adjust the guidance given in this document according to their type, sizes and nature of business in relation to the information security risk situation. This document is also applicable to an individual organization that participates in partner relationships.
This document provides guidelines for multiple organizations handling information security incidents in a coordinated manner. It also addresses the impacts of external cooperation on the internal incident management of an individual organization and provides guidelines for an individual organization to adapt to the coordination process. Furthermore, it provides guidelines for the coordination team, if it exists, to perform coordination activities supporting the cross-organization incident response. The principles given in this document are generic and are intended to be applicable to multiple organizations to work together to handle information security incidents, regardless of their types, sizes or nature. Organizations can adjust the guidance given in this document according to their type, sizes and nature of business in relation to the information security risk situation. This document is also applicable to an individual organization that participates in partner relationships.
ISO/IEC 27035-4:2024 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.
You can purchase ISO/IEC 27035-4:2024 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.
Standards Content (Sample)
International
Standard
ISO/IEC 27035-4
First edition
Information technology —
2024-12
Information security incident
management —
Part 4:
Coordination
Technologies de l'information — Gestion des incidents de sécurité
de l'information —
Partie 4: Coordination
Reference number
© ISO/IEC 2024
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
© ISO/IEC 2024 – All rights reserved
ii
Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Overview . 2
4.1 General .2
4.2 Coordination team .3
4.3 Principles of coordination .4
4.3.1 Timeliness principle .4
4.3.2 Roles and responsibilities principle .4
4.3.3 Common understanding principle .4
4.3.4 Confidentiality principle .4
5 Coordinated incident management process . 4
5.1 Overview .4
5.2 Coordinated plan and prepare .5
5.3 Coordinated detect and report .6
5.4 Coordinated assessment and decision .7
5.5 Coordinated respond .8
5.6 Coordinated learn lessons .9
6 Guidelines for key activities of coordinated incident management .10
6.1 Developing coordination policies . .10
6.2 Establishing communications .11
6.3 Threat and event Information sharing .11
6.3.1 Overview .11
6.3.2 Information types . 12
6.3.3 Establishing information sharing relationships . 13
6.3.4 Participating information sharing relationships .14
6.4 Conducting coordinated exercises .16
6.5 Building trust .17
Annex A (informative) Examples of information security incident management coordination . 19
Bibliography .22
© ISO/IEC 2024 – All rights reserved
iii
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations,
governmental and non-governmental, in liaison with ISO and IEC, also take part in the work.
The procedures used to develop this document and those intended for its further maintenance are described
in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the different types
of document should be noted. This document was drafted in accordance with the editorial rules of the ISO/
IEC Directives, Part 2 (see www.iso.org/directives or www.iec.ch/members_experts/refdocs).
ISO and IEC draw attention to the possibility that the implementation of this document may involve the
use of (a) patent(s). ISO and IEC take no position concerning the evidence, validity or applicability of any
claimed patent rights in respect thereof. As of the date of publication of this document, ISO and IEC had not
received notice of (a) patent(s) which may be required to implement this document. However, implementers
are cautioned that this may not represent the latest information, which may be obtained from the patent
database available at www.iso.org/patents and https://patents.iec.ch. ISO and IEC shall not be held
responsible for identifying any or all such patent rights.
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and expressions
related to conformity assessment, as well as information about ISO's adherence to the World Trade
Organization (WTO) principles in the Technical Barriers to Trade (TBT) see www.iso.org/iso/foreword.html.
In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
A list of all parts in the ISO/IEC 27035 series can be found on the ISO and IEC websites.
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing of these bodies can be found at www.iso.org/members.html and
www.iec.ch/national-committees.
© ISO/IEC 2024 – All rights reserved
iv
Introduction
Coordination is an important aspect in information security incident management. Incidents crossing
organizational boundaries can occur and cannot be easily resolved by a single organization. Emerging
threats are becoming increasingly sophisticated and can have a much larger impact than previously. The
characteristics of emerging threats and attacks make it more urgent than ever to coordinate incidents
across organizations.
Coordination can include relevant parties both within and outside the organization. For example, relevant
parties within the organization include business managers and representatives from IT; external interested
parties include incident response teams of external organizations and law enforcement organizations. See
ISO/IEC 27035-2:2023, Clause 8 for a complete list. This document, however, only considers coordination
between multiple organizations. This document provides guidelines for multiple organizations to work
together to handle information security incidents. The coordination activities occur throughout the
information security incident management process as defined in ISO/IEC 27035-1.
This document addresses the coordination of information security incident management between multiple
organizations. Incidents sometimes involve technical vulnerabilities. Guidance on the coordination,
disclosure, and handling of technical vulnerabilities is provided by ISO/IEC 29147 and ISO/IEC 30111.
Additional information on the coordination of technical vulnerabilities between multiple organizations is
provided by ISO/IEC TR 5895.
© ISO/IEC 2024 – All rights reserved
v
International Standard ISO/IEC 27035-4:2024(en)
Information technology — Information security incident
management —
Part 4:
Coordination
1 Scope
This document provides guidelines for multiple organizations handling information security incidents
in a coordinated manner. It also addresses the impacts of external cooperation on the internal incident
management of an individual organization and provides guidelines for an individual organization to adapt
to the coordination process. Furthermore, it provides guidelines for the coordination team, if it exists, to
perform coordination activities supporting the cross-organization incident response.
The principles given in this document are generic and are intended to be applicable to multiple organizations
to work together to handle information security incidents, regardless of their types, sizes or nature.
Organizations can adjust the guidance given in this document according to their type, sizes and nature
of business in relation to the information security risk situation. This document is also applicable to an
individual organization that participates in partner relationships.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content constitutes
requirements of this document. For dated references, only the edition cited applies. For undated references,
the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 27000, Information technology — Security techniques — Information security management systems —
Overview and vocabulary
ISO/IEC 27035-1, Information technology — Information security incident management — Part 1: Principles
and process
ISO/IEC 27035-2, Information technology — Information security incident management — Part 2: Guidelines to
plan and prepare for incident response
ISO/IEC 27035-3, Information technology — Information security incident management — Part 3: Guidelines
for ICT incident response operations
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 27000, ISO/IEC 27035-1,
ISO/IEC 27035-2, ISO/IEC 27035-3 and the following apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at https:// www .electropedia .org/
© ISO/IEC 2024 – All rights reserved
3.1
incident response team
IRT
team of appropriately skilled and trusted members of an organization that responds to and resolves
incidents in a coordinated way
Note 1 to entry: There can be several IRTs, one for each aspect of the incident.
1)
Note 2 to entry: Computer Emergency Response Team (CERT ) and Computer Security Incident Response Team
(CSIRT) are specific examples of IRTs in organizations and sectorial, regional, and national entities wanting to
coordinate their response to large scale ICT and cybersecurity incidents.
[SOURCE: ISO/IEC 27035-1:2023, 3.1.2]
3.2
coordinated incident management
CIM
process for IRTs from multiple organizations to work together to handle information security incidents
3.3
community
group of associated organizations, individuals and groups sharing common interests
Note 1 to entry: Impacted communities are the groups of people and associated organizations affected by the provision
of security services, projects or operations.
[SOURCE: ISO 22300:2021, 3.1.39]
4 Overview
4.1 General
Coordination is an important aspect in information security incident management. As stated in
ISO/IEC 27035-1, coordination can occur throughout the information security incident management
process, and the responsible roles for coordination should be taken by the incident management team (IMT)
and the incident coordinator. Coordination can include both internal and external parties (see a full list
of these parties in ISO/IEC 27035-2:2023, Clause 8). Among different parties, there are different degrees
of coordination relationships. Some coordination relationships are loose, only involving information
disclosure, such as the contacts with internal representatives from the legal department, public relations,
or external parties like law enforcement and media. Other coordination relationships are dense, targeting
incident response, which involves working with multiple internal incident response teams, or the incident
response teams from external organizations and internet service providers (ISPs). See Annex A for
examples of information security incident management coordination. ISO/IEC 27035-1, ISO/IEC 27035-2
and ISO/IEC 27035-3 focus on guidelines for information security incident management within a single
organization, and internal and external coordination activities are only briefly covered. This document
gives further detail on coordination between multiple organizations, and can benefit different organizations
to achieve a structured and effective cross-organization incident response. Figure 1 illustrates the scope of
this document.
1) CERT is an example of a suitable product available commercially. This information is given for the convenience of
users of this document and does not constitute an endorsement by ISO or IEC of this product.
© ISO/IEC 2024 – All rights reserved
Figure 1 — Illustration of the scope of this document
It is more possible to achieve good coordination between multiple organizations, when organizations
use incident management process (see ISO 22320). Based on the incident management process defined
in ISO/IEC 27035-1, the coordinated incident management process can be illustrated as in Figure 2. The
guidelines on the coordinated incident management process and its key activities are generic, which allows
flexibility so that coordination can be applied to incident management partially or entirely as needed (e.g.
the loose coordination case which only involves information disclosure is also applicable).
Figure 2 — Illustration of coordinated incident management process for multiple organizations
4.2 Coordination team
The coordination team is a special type of incident response team. They usually work as independent entities
which focus on the incident management coordination. The coordination team has the following features.
a) The coordination teams focus on activities including information exchanging, information sharing and
response coordination. It is possible that the coordination team does not implement incident response
activities directly. They facilitate efficient incident management coordination and cooperation among
multiple members. By fully dispatching the resources of each member, they help to realize information
sharing between members and throughout the entire community.
b) The coordination team should have a defined service constituency. The constituency is usually based
on a geographic location or a business domain. Typical examples of coordination teams based on
geographical regions are national incident response teams and regional incident response teams in
international regions or within a country. The main reason for setting up a coordination team based on
© ISO/IEC 2024 – All rights reserved
industry sectors is that organizations in the same industry face similar cybersecurity risks. Thus, the
appeal and value of information sharing and response coordination is greater.
c) The coordination team acts as a central point in the incident management coordination. Multiple
coordination teams can be arranged in a peer mode or a hierarchical mode. The coordination team and
the members can be regarded as forming a community, whereby the coordination team acts as a central
point when coordination is needed between multiple members. If the impact of the incident exceeds the
coordination team’s constituency or capability, the coordination team should contact another relevant
coordination team or relevant community member for assistance.
4.3 Principles of coordination
4.3.1 Timeliness principle
Information security incidents are highly time-sensitive. Any threat information and incident status has a
certain validity period. Therefore, all parties should agree on the time requirements of each item before
performing incident management coordination and observe the agreed time in the coordinated incident
management process.
4.3.2 Roles and responsibilities principle
Clear roles and responsibilities should be defined for incident management coordination activities. When
working under a coordination model with multiple organizations involved, it is important for all parties to
know the role that they play and what their respective responsibilities are under the model. In this manner,
all parties know what is expected of them to enable cohesion and minimise confusion. In addition, where the
lead coordinator role changes (e.g. depending on the content and context of the specific incident), criteria
should also be established to determine who leads coordination for that incident.
4.3.3 Common understanding principle
Communicating and coordinating incident response information can be difficult unless the organizations
involved utilize shared vocabulary. Organizations should use a common language and terminology to support
the exchange of information and facilitate understanding. Also, by adopting a common taxonomy to classify
information and standardizing data exchange format, organizations can have common understanding of the
security information shared by others. A common understanding can help organizations to reach consensus
and ensure their goals are consistent in the incident management coordination.
4.3.4 Confidentiality principle
During the incident management coordination, it is possible for organizations involved to carry out
information communication or exchange. Organizations should be careful to protect secret business
information and personal sensitive information when transmitting information to external parties. They
should consult their legal department to formulate confidentiality rules for information exchange.
5 Coordinated incident management process
5.1 Overview
As illustrated in Figure 2, the coordinated incident management process has the same phases as the incident
management process as defined in ISO/IEC 27035-1, namely:
— coordinated plan and prepare (see 5.2);
— coordinated detect and report (see 5.3);
— coordinated assess and decide (see 5.4);
— coordinated respond (see 5.5);
© ISO/IEC 2024 – All rights reserved
— coordinated learn lessons (see 5.6).
Figure 3 shows an overview of the activities in the coordinated incident management process, covering:
— coordinated activities for multiple organizations to complete together;
— the impacts on the internal activities of an individual organization and the adaption to make;
— if a coordination team exists, the coordination activities it performs.
Figure 3 — Overview of coordinated incident management process
5.2 Coordinated plan and prepare
In the coordinated plan and prepare phase, organizations in the community reach an agreement on
coordination policies and public framework, establish communication channels, and conduct training and
© ISO/IEC 2024 – All rights reserved
collaborative exercises to enhance incident response capability and mutual trust. Every organization should
appoint an incident coordinator responsible for the incident management coordination of the community,
and make sure that the organization’s incident management team (IMT) consents authority to the incident
coordinator and all planning and preparation activities.
The coordinated plan and prepare activities include, but are not limited to:
a) reach an agreement on coordination policies (see ISO 22397), including but not limited:
— memoranda of understandings (MOUs), or non-disclosure agreements (NDAs);
— the purpose, scope and resources of coordination;
— information sharing rules, and requirements of removing sensitive information;
— event tracking and coordination processes.
b) establish communication channels, including temporary channels, such as telephone, email, meeting,
as well as regular channels. Periodical meeting of incident coordinators from organizations in the
community, either offline or online, is a good way to improve understanding and build mutual trust.
Data exchange format and transmission mechanisms for information sharing should be determined to
make the information exchange process as secure and automated as possible;
c) conduct training and exercises on coordination in the community.
The adaption of an individual organization’s internal activity includes:
d) appointing an incident coordinator responsible for the incident management coordination of the
community, and making sure that the organization’s incident management team (IMT) consents
authority to the incident coordinator and all planning and preparation activities;
e) establishing organizational information sharing, disclosure, and incident management coordination
policies;
f) establishing and preserving appropriate relationships and connections with the community;
g) checking internal circumstances and solving conflicts.
The coordination team performs the following activities to achieve coordination:
h) providing neutral advice and facilitating accomplishment.
5.3 Coordinated detect and report
During the coordinated detect and report phase, the community encourages all members to actively share
threat intelligence. It establishes a threat information exchange mechanism and takes technical measures to
ensure the security of information transfer channels. Organizations of the community analyse the collected
information to make further assessment and decision-making.
Threat information exchange is based on trust. The following elements can be considered:
a) exchanging threat information should have the ability to support members' anonymity;
b) taking effective measures to protect the security of information related to reported vulnerabilities and
incidents and to prevent information leakage;
c) attempting to automate as much of the information sharing process as possible;
d) ensuring that threat information sharing mechanisms have the ability to support broad participation.
In addition to structured threat information expression and automatic exchange, these mechanisms
should also allow information in any format, such as email and verbal.
© ISO/IEC 2024 – All rights reserved
The adaption of an individual organization’s internal activity includes:
e) according to the pre-established shared information approval process, sharing threat intelligence as
quickly as possible; it is most valuable when the threat intelligence is shared quickly;
f) performing data sanitization or scrubbing to remove sensitive pieces of data from the incident
information without disturbing the information on precursors, indicators, and other technical
information;
g) analysing the captured internal incident threats and external threat intelligence shared by the
community to identify suspicious incidents. Automated measures should be applied in threat
information collection, processing, and use;
h) ensuring that the necessary measures are taken to protect information shared with the team by other
organizations;
i) ensuring all the shared information is managed by the responsible incident coordinator for the
community, and that the incident coordinator coordinates with other internal incident coordinators to
enhance overall information security situation awareness.
The coordination team performs the following activities to achieve coordination:
j) receiving and aggregate information. Automated measures should be applied in threat information
collection, processing, and use;
k) performing information dissemination and alerts notification.
5.4 Coordinated assessment and decision
For the coordinated assess and decide phase, organizations in the community should work together to assess
the impact of a specific incident and decide on the initiation of coordination.
The coordinated assessment and decision activities include, but are not limited to:
a) initiate the coordination request for a specific incident. In the community, there are three possible cases
of initiating coordination requests:
— One organization becomes aware of a possible incident and finds that the incident cannot be under
its own control, so the coordination request is initiated by the organization’s responsible incident
coordinator for the community;
— The coordination team becomes aware of a possible incident from reporting or information
sharing within the community. The coordination team discovers that the incident involves multiple
organizations and initiates the coordination request;
— Multiple organizations initiate the coordination requests almost at the same time and after assessing
the similarity and correlation, multiple requests merge into a single one.
b) assess whether an incident occurred or not, and decide to start the coordination for the incident in the
community;
c) assess the impact of the incident and the involved organizations who should participate;
d) assess the available resources that can be provided by the participating organizations;
e) ensure that the incident coordinators of all participating organizations are involved in the assessment
and decision process. The incident coordinators should gather internal related data and obtain necessary
authority from their organizations.
© ISO/IEC 2024 – All rights reserved
The adaption of an individual organization’s internal activity includes:
f) when aware of an incident not under its own control, the organization should identify the relevant
community and distribute incident information to the responsible incident coordinator of the
community;
g) the responsible incident coordinator identifies whether a coordination request is needed to initiate
the coordination process, or whether a coordination process for the incident already exists in the
community, and accordingly notifies the relevant incident response teams to prepare.
The coordination team performs the following activities to achieve coordination:
h) conducts an overall assessment of reporting or information sharing of the community, and analysis and
relevance of the information from multiple sources;
i) discovers any abnormalities and assesses the impact;
j) generates timely alerts to the whole community, and when necessary, makes a decision to start response
coordination.
5.5 Coordinated respond
For the coordinated respond phase, only the organizations involved by the incident should participate.
All participating organizations work together to determine the coordinated incident response plan, then
implement their parts accordingly back in their organizations. The incident coordinators of participating
organizations are key roles to coordinate both the internal and external response activities.
The coordinated response activities include, but are not limited to:
a) identify which organization will lead the response activities, it is recommended to let the coordination
team lead, if it exists. Also identify the associated roles and responsibilities of all parties involved in the
incident response.
b) conduct a combined investigation of the incident. The incident coordinators of participating
organizations coordinate internal IRTs to conduct an internal investigation, sharing necessary
information and participating in a combined investigation of the incident;
c) develop the coordinated incident response plan together. The internal incident response teams of
participating organizations develop the coordinated incident response plan, under the coordination
of their organizations’ incident coordinators. The developing progress is iterative, every organization
should provide timely feedback on applicability and validity. The coordinated incident response plan
should determine the activities for every participating organization to perform, and the arrangement
can be described by a matrix (see Table 1 for an example). The steps to create a matrix are:
— identifying response activities required to respond to the incident and assigning the response
activities to the top row;
— assigning the participating organizations to the left column;
— linking each response activity with the participating organizations.
Table 1 — Example of matrix
Activity 1 Activity 2 Activity 3 …… Activity N
Organization A X
Organization B X X X X
Organization C X X X
……
Organization M X X X
© ISO/IEC 2024 – All rights reserved
d) implement the coordinated incident response plan to achieve the containment, eradication and recovery
of the incident. The IRTs of participating organizations take response actions within their organization.
Each participating organization should follow its internal criteria and meet the requirements of its
part according to the coordinated incident response plan. The incident coordinators of participating
organizations supervise internal response progress of their organization to together evaluate overall
expectations, and make adjustments to the coordinated incident response plan when necessary;
e) review and confirm the resolution of the incident. The incident coordinators of participating
organizations lead the internal review of the response activities and together complete the joint incident
report. The incident coordinators should submit the joint incident report to the incident management
teams (IMTs).
f) after resolution of the incident, participating organizations should follow a closure process of the
coordination relationships and consider whether a coordinated post incident activity is required,
including:
— combined further investigation;
— alert notification to the whole community.
The adaption of an individual organization’s internal activity includes:
g) participate actively in the development of the coordinated incident response plan. The internal IRTs should
conduct an internal investigation, verify the applicability and validity of the plan under development, and
share necessary information for the development of the coordinated incident response plan;
h) take response actions required by the coordinated incident response plan. The internal IRTs should
follow the internal criteria of their organization and report the internal response progress to the
incident coordinator to coordinate with overall expectations;
i) perform the internal review of the response activities to draft a joint incident report and provide the
required assistance to the coordinated post-incident activity, after the incident has been resolved.
The coordination team performs the following activities to achieve coordination:
j) provide technical support and tackle the obstacles between multiple organizations during the
development and implementation of the coordinated incident response plan;
k) supervise the overall response progress and coordinate for unexpected problems;
l) after resolution of the incident, play a key role in the required post incident activity, e.g. lead the
combined further investigation, release the alert notification to the whole community and follow up.
5.6 Coordinated learn lessons
In the coordinated learn lesson phase, a single organization or multiple organizations in the community
jointly evaluate the incident response process, especially the coordination process. Organizations review
the process, identify and document lessons learned from the coordination, and improve the information
security incident response and coordination process in a continuous iteration. The activities in this phase
are mainly carried out and coordinated by the incident coordinators of the relevant organizations, including:
a) reviewing, identifying, and improving the implementation of information security controls (new or
updated controls), and incident management coordination process;
b) reviewing the effectiveness of existing policies, rules, processes and tools throughout the information
security incident response and coordination process, and making appropriate adjustments;
c) performing comprehensive evaluation of the performance and effectiveness of the participating
organizations;
d) communicating and sharing the results of review within a trusted community (if so desired);
© ISO/IEC 2024 – All rights reserved
e) deciding whether and to what extent the incident information, related attack vectors and vulnerabilities
can be shared with partner organizations or communities, to assist in preventing the same event from
recurring in their environment.
6 Guidelines for key activities of coordinated incident management
6.1 Developing coordination policies
Coordination policies are the foundation for organizations in the community to perform incident management
coordination. The coordination policies should provide the common vision, principles, procedures, as well
as financial support for organizations to handle information security incidents together. The coordination
policies can generally include contractual aspects, operational aspects, financial aspects and ethical aspects.
a) Policies in contractual aspects can include:
1) rules for joining and leaving the community, also multiple grades of membership can be adopted;
2) non-disclosure agreements (NDAs) outlining confidential material, knowledge, or information that
can be shared within a certain range but require restricted access. The community can choose
different levels of NDAs according to the actual needs, e.g. NDAs with strict policies can help to build
trust, while NDAs with moderate policies can increase participation.
b) Policies in operational aspects can include:
1) the benefits and responsibilities of members. Generally, if the responsibilities are clearly described
to members in the community, they are more likely to be more active, and therefore get better
benefits. While basic responsibilities can result in loose connections and less benefits;
2) the requirements and responsibilities of the members’ personnel. Each organization should appoint
an incident coordinator responsible for the incident management coordination of the community;
3) the coordination process, specifying a set of conditions that require coordination, timing
requirements in coordination activities and operational mechanisms to organize multi-party
response activities;
4) training and exercises programmes;
5) media policies complying with information disclosure policies.
c) Policies in financial aspects can include:
1) whether a fee is needed for membership, and whether multiple grades of membership can involve
fee differences;
2) funding policies for member organizations to hold events such as meetings and trainings, or for an
individual to attend events.
d) Policies in ethical aspects can include:
1) a code of conduct describing expected behaviour for anyone involved. This code of conduct
covers various kinds of activities, both online and offline, organized by the community, including
coordination communication, meetings, trainings, and special events. A code of conduct can help to
create inclusive, open, collaborative and enjoyable environments.
When applying these policies, the community should follow some principles including: considering
compliance with applicable legislation, being fair to all members and ensuring transparency by providing
timely information. The coordination team, if it exists, can be a central point in sustaining the operation of
the community and the implementation of policies. Otherwise, members can hold a secretariat to undertake
the function, for example, a secretariat consisting of the incident coordinators of partial organizations.
© ISO/IEC 2024 – All rights reserved
6.2 Establishing communications
It is important for the community to establish and maintain communication between members. Members
are encouraged to begin using communication as early as the initial assessment when trying to understand
what is happening or what has happened. The community should ensure the communication is timely, open
and accurate. Multiple (separate and different) communication mechanisms should be established in case of
the failure of one mechanism. The communication mechanisms can generally be divided into two categories:
ad hoc mechanisms and partially automated mechanisms.
a) Ad hoc mechanisms include email, instant messaging clients and the phone. Traditionally, the
communication has occurred through ad hoc mechanisms. The ad hoc communication mechanisms may
rely more on an employees’ connections with peers of partner organizations. The employees use ad
hoc channels to manually communicate with peers for sharing information and coordinating incident
response activities. These ad hoc mechanisms can be the most cost-effective way of sharing information
with partner organizations. However, due to the non-robust nature of ad hoc mechanisms, it is possible
to fail easily, for example, due to an experienced employee’s resignation. Thus, it is recommended for
the organizations to have two or more employees as backup. For the incident coordinators or other
important roles, it is better to have multiple communication mechanisms. Periodical meeting of incident
coordinators, either offline or online, is a good way to improve understanding and build mutual trust.
In addition, ad hoc mechanisms tend to require more manual intervention and are more resource-
intensive to process than the partially automated mechanisms, since the information exchanged in ad
hoc communication channels can lack standardization.
b) Partially automated mechanisms are desired to make the inter-organizational communication efficient.
Organizations should attempt to automate as much of the communication process as possible. In reality,
it is not possible to fully automate the communication process, nor is it desirable due to security and
trust considerations. Organizations should aim to achieve a balance of automated process overlaid with
human-centric processes. According to the community’s needs, the partially automated communication
solutions can support several aspects:
1) Information sharing: The inter-organizational communication is mainly used to share information.
To automate information sharing, the community should choose the data exchange model and
enabling technical transport mechanisms. The members in the community should agree on the data
exchange models to ensure that the models are compatible with their incident response systems. It
is recommended to select existing standards for data exchange models when the members need to
represent the information. Then, members in the community should agree on the technical transport
mechanisms for enabling the information exchange to occur in an automated fashion. The transport
mechanisms include the transport protocol for exchanging the information, the architectural model
for communicating with an information resource, and the applicable ports and domain names for
accessing an information resource.
2) Managing contact relationships: An organization should maintain various contact channels with
peers in the community. It is an efficient way to use technical methods to automate the management
of the contact relationships.
3) Utilizing integrated communication: It is possible to integrate multimedia communication facilities
and personal communication devices as partially automated communication channels. Examples
include video conference systems for convenient communication during incident management
coordination, enabling short or instant messages which can be automatically pushed to the
responsible employee when important alerts are received.
Organizations should protect sens
...
La norme ISO/IEC 27035-4:2024 se positionne comme un cadre essentiel pour la gestion des incidents de sécurité de l'information, en mettant un accent particulier sur la coordination entre plusieurs organisations. Son champ d'application couvre les directives nécessaires pour faciliter la réponse aux incidents à travers une collaboration efficace, ce qui est devenu primordial dans le paysage actuel où les menaces à la sécurité de l'information sont omniprésentes. Un des points forts de cette norme est sa capacité à traiter les impacts de la coopération externe sur la gestion des incidents au sein d'une organisation individuelle. Cela permet non seulement d'améliorer la réactivité face aux incidents, mais également de garantir une approche harmonisée entre différents acteurs concernés. Les directives fournies sont suffisamment flexibles pour permettre aux organisations d'adapter les conseils en fonction de leur type, taille et nature d'activité, ce qui en fait un outil versatile et pertinent pour divers secteurs. De plus, la norme établit des lignes directrices claires pour l'équipe de coordination, qui, si elle existe, est primordiale pour soutenir les activités de réponse aux incidents à l'échelle inter-organisationnelle. Cet aspect de la norme est crucial, car il formalise le rôle des différents intervenants et favorise une gestion proactive des incidents. La norme ISO/IEC 27035-4:2024 se distingue également par ses principes génériques, qui visent à être applicables à toutes les organisations, indépendamment de la nature des incidents qu'elles rencontrent. Ceci assure que toutes les entités, qu'elles soient grandes ou petites, puissent tirer profit de ce cadre pour renforcer leur préparation et leur capacité à réagir aux incidents de sécurité de l'information. En somme, la norme ISO/IEC 27035-4:2024 représente une avancée significative dans la gestion des incidents de sécurité de l'information, offrant des recommandations pratiques et adaptables qui renforcent la résilience des organisations face à des menaces croissantes.
The ISO/IEC 27035-4:2024 standard provides a comprehensive framework for information security incident management, specifically focusing on the coordination of response efforts among multiple organizations. It highlights the critical importance of collaboration when addressing information security incidents, allowing different entities to effectively manage and mitigate potential threats. One of the key strengths of this standard is its versatility. It is designed to be applicable to a wide range of organizations, regardless of their size, type, or nature. This flexibility ensures that diverse organizations can adapt the guidelines to fit their specific circumstances and information security risk situations. This adaptability is crucial in today’s interconnected landscape, where incidents can impact multiple stakeholders and require a synchronized response. Additionally, the standard emphasizes the significance of external cooperation in enhancing internal incident management. By encouraging organizations to foster collaborative relationships, it provides a structured approach to sharing vital information and resources, which can lead to more effective incident resolution. The inclusion of guidelines for a coordination team, where applicable, is another notable feature, as it centralizes and streamlines the management efforts during incidents. The generic principles outlined in ISO/IEC 27035-4:2024 are both practical and relevant, empowering organizations to establish their incident response strategies while aligning with best practices in information security. This standard acts as an essential tool for organizations participating in partner relationships, ensuring they are well-equipped to handle incidents collaboratively and efficiently. In summary, ISO/IEC 27035-4:2024 stands out as a vital resource in the realm of information security incident management, fostering a culture of coordination and response preparedness across various sectors. Its guidelines not only enhance the individual organization’s internal practices but also promote strong partnerships among entities, ultimately leading to a more resilient approach in tackling information security challenges.
Die Norm ISO/IEC 27035-4:2024 bietet umfassende Richtlinien für die koordinierte Handhabung von Informationssicherheitsvorfällen zwischen mehreren Organisationen. Der Geltungsbereich dieser Norm ist besonders relevant für Unternehmen, die in einer vernetzten und zunehmend komplexen Sicherheitslandschaft agieren. Durch die Betonung der externen Kooperation wird nicht nur der interne Incident-Management-Prozess einer einzelnen Organisation gestärkt, sondern es werden auch spezifische Leitlinien zur Anpassung an koordinierte Abläufe bereitgestellt. Eine der herausragenden Stärken dieser Norm ist ihre Flexibilität. Die Prinzipien sind so gestaltet, dass sie generisch sind und auf unterschiedliche Organisationen anwendbar sind, unabhängig von deren Größe, Art oder spezifischen Anforderungen im Bereich der Informationssicherheit. Diese Anpassungsfähigkeit erlaubt es Organisationen, die Leitlinien gemäß ihren individuellen Risiken und Bedürfnissen zu modifizieren, wodurch eine effektive Reaktion auf Sicherheitsvorfälle gewährleistet wird. Des Weiteren legt ISO/IEC 27035-4:2024 besonderen Wert auf die Rolle des Koordinationsteams, das, falls vorhanden, wesentliche Aufgaben zur Unterstützung einer effektiven bereichsübergreifenden Reaktion auf Vorfälle übernimmt. Die vorgelegten Richtlinien bieten strukturierte Ansätze zur Förderung der Zusammenarbeit und der Kommunikation zwischen verschiedenen Organisationen, was entscheidend für die Minimierung der Auswirkungen von Sicherheitsvorfällen ist. Insgesamt ist die Relevanz der Norm in der heutigen Informationssicherheitslandschaft unverkennbar. Sie unterstützt Organisationen dabei, ein robustes und effektives Incident-Management-System zu implementieren, das nicht nur auf interne Prozesse, sondern auch auf externe Partnerschaften fokussiert ist. Durch die Förderung einer koordinierten Response-Strategie erhöht ISO/IEC 27035-4:2024 die Resilienz von Organisationen im Umgang mit Informationssicherheitsvorfällen und trägt somit zur Stärkung der Gesamtsicherheit im digitalen Raum bei.
ISO/IEC 27035-4:2024は、情報技術における情報セキュリティインシデント管理の標準化文書であり、主に複数の組織が情報セキュリティインシデントを協調して処理するためのガイドラインを提供しています。この文書は、外部の協力が個々の組織の内部インシデント管理に与える影響にも対応しており、各組織が協調プロセスに適応するための指針を示しています。 この標準の強みは、異なる規模や性質を持つ組織が共に協力して情報セキュリティインシデントを管理できるように設計されている点です。原則が一般的であり、特定の業種や規模に関わらず、多くの組織に適用可能であるため、多様な環境におけるインシデント対応を促進します。また、協調チームが存在する場合には、その活動を支援するガイドラインも提供しており、組織間のインシデント応答を効果的に行うための基盤を整えています。 ISO/IEC 27035-4:2024は、パートナー関係に参加する個別の組織にも適用可能であり、そのため、ビジネスの種類や規模、情報セキュリティリスクの状況に応じて、文書のガイダンスを柔軟に調整することができます。このように、標準が提供する指針は、各組織が持つ特異なニーズに対応しつつ、協調的なインシデント管理を推進するための有効なリソースとなっています。
ISO/IEC 27035-4:2024 표준은 정보 기술 및 정보 보안 사고 관리에 관한 중요한 가이드라인을 제공합니다. 이 문서는 여러 조직이 정보 보안 사고를 조정된 방식으로 처리하는 데 필요한 지침을 제공하며, 외부 협력이 개별 조직의 내부 사고 관리에 미치는 영향도 다루고 있습니다. 또한, 각 조직이 조정 프로세스에 적응할 수 있도록 지원하는 지침을 포함하고 있습니다. 이 표준의 가장 큰 강점은 다양성에 대한 포괄적인 접근 방식입니다. 특별히 언급되는 것처럼 이 문서의 원칙은 다양한 조직들이 서로 협력하여 정보 보안 사고를 처리하는 데 적용될 수 있도록 설계되었습니다. 이는 사고의 유형, 규모 또는 성격에 구애받지 않으며, 각 조직은 정보 보안 위험 상황에 따라 이 문서에서 제공하는 지침을 조정할 수 있습니다. ISO/IEC 27035-4:2024는 조정팀이 존재할 경우, 교차 조직 사고 대응을 뒷받침하는 조정 활동을 수행하는 데 필요한 가이드라인도 제공합니다. 이를 통해 조직 간의 협력이 활발히 이루어질 수 있으며, 보다 효과적인 정보 보안 사고 대응이 가능해집니다. 마지막으로, 이 문서는 파트너 관계를 포함하여 특정 관계에 참여하고 있는 개별 조직에도 적용될 수 있으므로, 조직의 정보 보안 전략을 보다 견고하게 만드는 데 중요한 역할을 할 것입니다. 전반적으로 ISO/IEC 27035-4:2024 표준은 정보 보안 사고 관리에서 협력을 중시하는 현대의 요구에 충분히 부합하는 중요한 지침서입니다.








Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...