Reference document

Title
CIS Security Recovery Process
Description

The CIS Security Recovery Processes enables to recover from a compromise in the CIS Security resulting from an attack or fault by restoring the systems and information integrity, and restoring the service availability. The full assessment of the attacks and faults and the registration of any compromised information is done in the CIS Security Assessment Process. ‘Initial state ‘ The CIS have been under attack, the attack is now handled but the trust in the CIS and in the information is not granted. A Recovery order is received. ‘End state ‘ The trust in the CIS is now reestablished. The CIS are now completly operational.

Level
8
emUUID
f96a4e8e-880e-4f16-b16a-273b12d1058d
Parent
CIS Security Defence Processes