- CIS Security Recovery Process
The CIS Security Recovery Processes enables to recover from a compromise in the CIS Security resulting from an attack or fault by restoring the systems and information integrity, and restoring the service availability. The full assessment of the attacks and faults and the registration of any compromised information is done in the CIS Security Assessment Process. ‘Initial state ‘ The CIS have been under attack, the attack is now handled but the trust in the CIS and in the information is not granted. A Recovery order is received. ‘End state ‘ The trust in the CIS is now reestablished. The CIS are now completly operational.