Various maintenance activities (Goh, 2010b) are performed, demanding the availability of resources. Hence policies or frameworks have to be developed to ensure a maintenance program is in place to ensure the CIR plan is always relevant.
Information assets within an organisation frequently change due to changes in business needs, technological advancements or the introduction of internal or external policies. Therefore, the CIR plan has to be reviewed (Lennon et al., 2002) to document the new information and determine if current mitigation and response procedures are sufficient.
The reviewing process goes hand-in-hand with the change management process. It should occur on a pre-defined schedule scheduled annually or when significant changes to a particular plan component or inventory of information assets exist.
Although the frequency of review is dependent on the component being reviewed, the focus areas of the process are:
When the organisation undergoes significant changes regarding the elements mentioned above, it signals that changes (Stevens Institute of Technology, 2017) to the CIR plan will have to be made. However, changing the plan's contents is not as simple as editing using Microsoft Office; there is a formal process behind change management. When the changes to the organisation have been identified, the details, which include descriptions and reasons, of the changes are filled in on the change request form.
Most changes to information assets within the organisation will be accepted when submitted through the change management process because the Senior Management approved the acquisition of the information assets. Organisational changes to structure and processes also have a high probability of being accepted as these areas constitute the crucial components of the CIR plan. Once the Senior Management has approved the change request, the details can be documented to update the CIR plan and distributed to the respective parties.
The cyber security incident plan potentially contains sensitive organisational information. Hence the distribution of the plan should be controlled. A similar practice to when the plan was first documented and distributed can be adopted.
Back To: Rationale for Lack of Cyber Security Prioritisation | Plan Maintenance | Training and Awareness |
Advanced Testing and Exercising | Audit | Cyber Security Mindset and Culture |
Competency-based Course |
Certification Course | ||
Goh, M. H. (2017). A Manager's Guide to Business Continuity Management for Cyber Security Incidents, 2nd Edition. GMH Pte Ltd.
Reference: Chapter 10 Program Management 10.3 Plan Maintenance
Note: This version was the draft 2nd Edition being updated in 2023. The numeric in the square bracket [X-X] cross-refers to the actual chapter and section in the 1st Edition.