This is an old revision of the document!
There are no systems with elevated risks. So no additional risk analysis measures ahve to be taken.
Information systems are implemented in close collaboration with the system owner, but no formal, written acceptance is in place. For systems 'owned' by system management, a team meeting is initiated to formally decide a 'GO' on becoming part of the operational system.
For all systems, server, desktops, stoarge and other devices security updates are implemented as a continuous process. Every day the software repositories are automatically interrogated for new security updates, which are then applied immediately.
Log files are stored local to the system where they are created. However, each log is analysed automatically and in case of a non-regular situation system managers are emailed with an indication of the non-regular behaviour. Upon receipt of such an incident the log on the system in question will be analysed. In case of a true irregularity an incident is initiated.
All systems use one set of time servers inside the IT Department server hardware to synchronize all clocks on all devices. The IT Department time servers themselves use international time servers to keep their time synchronized to the 'world'.
Security incidents are recorded in a mail folder of the IT Department Head.
The Security manager as defined by the roles is the responsible person for all incidents and works in collaboration with all team members to resolve the incident.
There is no true calamity procedure and each case is handled ad hoc, with teh following requirements in mind: