This is an old revision of the document!
Log files are stored local to the system where they are created. However, each log is analysed automatically and in case of a non-regular situation system managers are emailed with an indication of the non-regular behaviour. Upon receipt of such an incident the log on the system in question will be analysed. In case of a true irregularity an incident is initiated.
All systems use one set of time servers inside the IT Department server hardware to synchronize all clocks on all devices. The IT Department time servers themselves use international time servers to keep their time synchronized to the 'world'.
Security incidents are recorded in a mail folder of the IT Department Head.
The Security manager as defined by the roles is the responsible person for all incidents and works in collaboration with all team members to resolve the incident.
There is no true calamity procedure and each case is handled ad hoc, with teh following requirements in mind: