Examples of Triggered Security Events and Playbooks

From

editione1.0.0

Updated October 9, 2023
Now Available
Security for Everyone

The following table is by no means exhaustive, but provides a guide to the types of events that might happen in your company that you would want to plan for. Don’t get overwhelmed, there are a lot of them (and I’m sure you will think of more)—remember that a lot goes on in your growing business, so it’s not surprising that there is a lot of security to consider on the way.

For each of these, you would list the associated actions, procedures, or playbooks that should form part of your response. For example:

EventSuggested Actions
A new device is acquired1. Record the device in the asset register.
2. Assign the device an owner.
3. Provide secure storage guidance to the new owner.
4. Configure the device with appropriate security controls or hardening.

See the table of ISO domains for a refresher on what each area covers.

···

Table: Some Common Triggered Security Events

DomainTypeEvent
Security policyPlannedA new policy is developed
UnplannedA policy changes
Organization of information securityUnplannedA new risk is identified
UnplannedAn existing risk changes
PlannedA new leader joins the organization
UnplannedA change in the economic environment
Asset managementPlannedA new device is acquired
PlannedA device is decommissioned
UnplannedA device is lost or stolen
Human resources securityPlannedAn employment offer is made
PlannedA new person starts
Planned/UnplannedSomeone changes roles
Planned/UnplannedSomeone leaves the organization
Physical and environmental securityPlanned/UnplannedSomeone visits your office
UnplannedAn alarm triggers
Communications and operations managementPlannedA new tool is selected
Planned/UnplannedData is shared internally
Planned/UnplannedData is shared externally
Access controlPlannedSomeone requests admin permissions
PlannedSomeone requests access to an additional tool or datastore
UnplannedUnexpected access reported
Information systems acquisition, development, and maintenancePlannedA new product idea is suggested
PlannedA change is made to some existing code
PlannedSystems are used in a new way
UnplannedA new security update is available
PlannedCode is deployed to production
PlannedA system component is deprecated
Information security incident managementUnplannedSecurity notification from vendor
UnplannedSecurity notification from open source
UnplannedSecurity notification from customer
Business continuity managementPlannedA new system is deployed
PlannedChanges in the business or operating environment
CompliancePlannedCustomers acquired in a new region
PlannedBusiness expands into new area

At the risk of sounding like the detective from a black-and-white movie, the key is that as a leader, you need to “expect the unexpected.” While this doesn’t always feel like something you can plan for, there are many common planned and unplanned security events that happen in most companies.

Just having a plan or process for these common events can put you a long way ahead when it comes to repeatable security processes and can allow you more time to think. This way you can focus on anything truly unexpected that happens.

If you found this post worthwhile, please share!