{"id":987518259,"date":"2024-03-08T09:11:25","date_gmt":"2024-03-08T09:11:25","guid":{"rendered":"https:\/\/pmchampions.com\/?p=987518259"},"modified":"2024-03-13T16:23:03","modified_gmt":"2024-03-13T16:23:03","slug":"how-to-handle-a-security-incident","status":"publish","type":"post","link":"https:\/\/pmchampions.com\/en\/how-to-handle-a-security-incident\/","title":{"rendered":"How to Handle a Security Incident"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][pac_divi_table_of_contents title=&#8221;Summary&#8221; collapse_when_sticky=&#8221;on&#8221; opened_icon=&#8221;:||divi||400&#8243; closed_icon=&#8221;;||divi||400&#8243; included_headings=&#8221;off|on|on|on|off|off&#8221; exclude_headings_by_class=&#8221;on&#8221; show_keyword_highlight=&#8221;on&#8221; show_keyword_highlight_placeholder=&#8221;Mots Cl\u00e9s &#8230;&#8221; level_markers_1=&#8221;icons&#8221; icon_marker_1=&#8221;=||divi||400&#8243; level_markers_2=&#8221;icons&#8221; icon_marker_2=&#8221;^||divi||400&#8243; level_markers_3=&#8221;icons&#8221; icon_marker_3=&#8221;E||divi||400&#8243; level_markers_4=&#8221;icons&#8221; icon_marker_4=&#8221;5||divi||400&#8243; title_container_bg_color=&#8221;#1a9e21&#8243; body_area_height=&#8221;650px&#8221; body_area_scroll_color=&#8221;#000000&#8243; body_area_text_link_underline=&#8221;#000000&#8243; body_area_text_link_padding=&#8221;10px|0px|0px|0px|false|false&#8221; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; title_font_font=&#8221;Quicksand||||||||&#8221; heading_all_font=&#8221;|600|||||||&#8221; heading_all_font_size=&#8221;18px&#8221; marker_all_font=&#8221;|600|||||||&#8221; motion_trigger_start=&#8221;top&#8221; heading_all_font_size_tablet=&#8221;15px&#8221; heading_all_font_size_phone=&#8221;15px&#8221; heading_all_font_size_last_edited=&#8221;on|phone&#8221; border_radii=&#8221;on|10px|10px|10px|10px&#8221; border_color_all=&#8221;RGBA(255,255,255,0)&#8221; border_radii_title_container=&#8221;off|10px|10px|0px|0px&#8221; border_radii_body_area=&#8221;off|0px|0px|10px|10px&#8221; border_width_all_body_area=&#8221;3px&#8221; border_color_all_body_area=&#8221;RGBA(255,255,255,0)&#8221; box_shadow_style=&#8221;preset2&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/pac_divi_table_of_contents][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.23.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text module_class=&#8221;blue-list list_space&#8221; _builder_version=&#8221;4.24.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||21px|||&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<div class=\"ControlZone ControlZone--clean a_e_50a7110f\" data-automation-id=\"CanvasControl\" id=\"b43d8abe-1d23-49bb-ba84-ca706d52a490\">\n<div class=\"ControlZone--control\">\n<div data-sp-feature-tag=\"Rich Text Editor\" class=\"rte-webpart rte--ck5 rte--read-ck5 headerFontSizeLegacy uniformSpacingForElements\" data-sp-feature-instance-id=\"b43d8abe-1d23-49bb-ba84-ca706d52a490\" dir=\"auto\">\n<div data-automation-id=\"textBox\" class=\"ck-content rteEmphasis root-303\">\n<h2><span class=\"fontColorThemeSecondary\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pmchampions.com\/wp-content\/uploads\/2024\/03\/hacker.png\" width=\"237\" height=\"237\" alt=\"\" class=\"wp-image-987518245 aligncenter size-full\"><\/span><\/h2>\n<h2><span class=\"fontColorThemeSecondary\"><\/span><\/h2>\n<h2><span class=\"fontColorThemeSecondary\">What is a Security Incident?<\/span><\/h2>\n<p><span class=\"fontSizeMedium\">The occurrence or development of any of the following situations could indicate an information security incident:<\/span><\/p>\n<ul>\n<li><span class=\"fontSizeMedium\">A possible breach of information security (unauthorized disclosure of data, loss of data, data corruption, improper use of the company network, etc.).<\/span><\/li>\n<li><span class=\"fontSizeMedium\">A failure in one of the systems that could result from an information security vulnerability.<\/span>\u200b\u200b\u200b\u200b\u200b\u200b\u200b<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"ControlZone ControlZone--clean a_e_50a7110f\" data-automation-id=\"CanvasControl\" id=\"1efb4631-25d4-4aa1-9721-77a32f674fb8\">\n<div class=\"ControlZone--control\">\n<div id=\"vpc_CanvasImg.1efb4631-25d4-4aa1-9721-77a32f674fb8\" data-viewport-id=\"CanvasImg.1efb4631-25d4-4aa1-9721-77a32f674fb8\">\n<div class=\"a_a_f71b5f03 css-322\" data-automation-id=\"imageRead\">\n<figure class=\"g_a_f71b5f03\" tabindex=\"0\">\n<div class=\"b_a_f71b5f03\">\n<h2><span class=\"fontColorThemeSecondary\">How to react?<\/span><\/h2>\n<p><span class=\"fontSizeMedium\">As soon as you suspect or observe a security incident within the company or at a customer&#8217;s premises including your responsibility or a data leak, you are required to alert the <\/span><strong>IT Systems Security Department<\/strong><span> <\/span><span class=\"fontSizeMedium\">DSIS through the tools set up by your company (tracking tool, ticketing such as <strong>\n  <a href=\"https:\/\/glpi-project.org\/\">GLPI,<\/a>\n<\/strong> telephone, emailing, etc.)<\/span><\/p>\n<p><span class=\"fontSizeMedium\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pmchampions.com\/wp-content\/uploads\/2024\/03\/security-1.png\" width=\"185\" height=\"185\" alt=\"\" class=\"wp-image-987518249 aligncenter size-full\"><\/span><\/p>\n<p><span class=\"fontSizeMedium\">In the event of a security incident at a client&#8217;s premises, the IT Systems Security Department will contact the project&#8217;s security manager \/ referent in order to define the communication method to be adopted with the client. <\/span><\/p>\n<p><span class=\"fontSizeMedium\">In general (unless there is a constraint), the report to the latter must be made within 24 working hours.<\/span><\/p>\n<p><span class=\"fontSizeMedium\"> <\/span><\/p>\n<div class=\"a_c_50a7110f o_c_50a7110f CanvasSection CanvasSection-col CanvasSection-sm12 CanvasSection--read CanvasSection-xl8 q_c_50a7110f\" data-automation-id=\"CanvasSection\">\n<div class=\"ControlZone ControlZone--clean a_e_50a7110f\" data-automation-id=\"CanvasControl\" id=\"52d787eb-d33e-4da7-bef6-f75e5bad4ef0\">\n<div class=\"ControlZone--control\">\n<div data-sp-feature-tag=\"Rich Text Editor\" class=\"rte-webpart rte--ck5 rte--read-ck5 headerFontSizeLegacy uniformSpacingForElements\" data-sp-feature-instance-id=\"52d787eb-d33e-4da7-bef6-f75e5bad4ef0\" dir=\"auto\">\n<div data-automation-id=\"textBox\" class=\"ck-content rteEmphasis root-169\">\n<h2><span class=\"fontColorThemeSecondary\">Examples of Security Incidents<\/span><br>\u200b\u200b\u200b\u200b\u200b\u200b\u200b<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pmchampions.com\/wp-content\/uploads\/2024\/03\/bug.png\" width=\"187\" height=\"187\" alt=\"\" class=\"wp-image-987518251 aligncenter size-full\"><\/h2>\n<ul>\n<li><span class=\"fontSizeMedium\">The compromise of sensitive classified company data or internal data to third parties, competitors, the public.<\/span><\/li>\n<li><span class=\"fontSizeMedium\">Unauthorized access to the information system.<\/span><\/li>\n<li><span class=\"fontSizeMedium\">Unwanted disruption or deliberate denial of service (DOS) attacks.<\/span><\/li>\n<li><span class=\"fontSizeMedium\">Detection of viruses, worms and Trojan horses.<\/span><\/li>\n<li><span class=\"fontSizeMedium\">Theft of information, data, or assets.<\/span><\/li>\n<li><span class=\"fontSizeMedium\">Errors resulting from negligent operations, erroneous business data, or incorrect processing.<\/span><\/li>\n<li><span class=\"fontSizeMedium\">Privacy breaches.<\/span><\/li>\n<li><span class=\"fontSizeMedium\">Failure to comply with legal and regulatory requirements.<\/span><\/li>\n<li><span class=\"fontSizeMedium\">Attempts to gain unauthorized access to a system or its data.<\/span><\/li>\n<li><span class=\"fontSizeMedium\">Concealment, impersonation of authorized users.<\/span><\/li>\n<li><span class=\"fontSizeMedium\">Unauthorized use of a system for data processing by authorized or unauthorized users.<\/span><\/li>\n<li><span class=\"fontSizeMedium\">Unauthorized use of a system for data storage by authorized or unauthorized users.<\/span><\/li>\n<li><span class=\"fontSizeMedium\">Changes to system hardware, firmware, or software specifications and data without notifying application owners. In the case of outsourced services, cloud environments or similar commitments, the changes will be caused by the applicable contractual terms.<\/span><\/li>\n<li><span class=\"fontSizeMedium\">Unauthorized changes, without approval, with malicious intent to gain access.<\/span><\/li>\n<li><span class=\"fontSizeMedium\">The existence of unknown user accounts with no responsibility or authorization.<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/figure>\n<\/div>\n<\/div>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>Learn the basics of security:<br \/>\nWhat is a Security Incident?<br \/>\nHow to react?<br \/>\nExamples of Security Incidents<\/p>\n","protected":false},"author":1,"featured_media":987518654,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[77],"tags":[24,83],"class_list":["post-987518259","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-project-management-practices","tag-en","tag-fundamental"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/pmchampions.com\/en\/wp-json\/wp\/v2\/posts\/987518259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pmchampions.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pmchampions.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pmchampions.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pmchampions.com\/en\/wp-json\/wp\/v2\/comments?post=987518259"}],"version-history":[{"count":0,"href":"https:\/\/pmchampions.com\/en\/wp-json\/wp\/v2\/posts\/987518259\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pmchampions.com\/en\/wp-json\/wp\/v2\/media\/987518654"}],"wp:attachment":[{"href":"https:\/\/pmchampions.com\/en\/wp-json\/wp\/v2\/media?parent=987518259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pmchampions.com\/en\/wp-json\/wp\/v2\/categories?post=987518259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pmchampions.com\/en\/wp-json\/wp\/v2\/tags?post=987518259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}