You are on page 1of 2

CERT No. 1. Requirement Pre-establishment Tasks 1.1 Reason for existence 1.2 Goals 1.3 Constituency 1.3.

1 Defining the Constituency 1.3.2 Advertising 1.4 Scope of Operation 1.5 Identify Savings to the Community 1.6 Scope of Expertise 1.7 Staff size and Makeup 1.8 Technology 1.9 Depth of Analysis 1.10 Budget 1.11 Authority and Reporting 1.12 Policies 1.13 Enforcement 1.14 Incident Response 1.15 Legal Issues Equipment 2.1 Phones 2.2 Answering Services 24 hr 2.3 Fax 2.4 Systems and Networks 2.4.1 IP Address Range 2.4.2 Domain Name 2.4.3 Subnetting 2.4.4 Test Equipment 2.4.5 Routers/Firewalls 2.4.6 Non-replayable Authentication 2.5 Shredder 2.6 Safe 2.7 Backup Media 2.8 Information Security 2.8.1 Data Origin Authentication and Integrity 2.8.2 Trusted Staff Commencing Operations Operations-Learning 4.1 Report Incidents
Individual Commercial Vendor Internal Sector CERTCC

2.

3 4

7 8 9

4.2 Contact other IRTs 4.3 Documents and Tools 4.4 Library of Reference Material 4.5 Journal Subscriptions 4.6 Staff Training 4.7 Visits to Existing Response Teams Operations-Reactive 5.1 Routine 5.2 Operations Manual 5.3 Administrative 5.4 Contacts 5.5 Unsolicited /Unauthenticated Calls 5.6 Point 5.7 Incident Numbers and Database 5.8 Hot Lists and Refer Again Operations-Proactive 6.1 Proactive Roles to Prevent Incidents 6.2 Education and Training 6.2.1 Advisories 6.2.2 Conference Presentations 6.2.3 Workshop Presentations 6.2.4 Panel Sessions 6.2.5 Journal Articles 6.2.6 Exercises 6.2.7 Book Reviews 6.2.8 Courses 6.2.9 Security Audits and On-site Consulting 6.2.10 Goals 6.3 Research and Development Operations-Offsite Working with the Larger Community Working with FIRST

You might also like