Part of Objective D - Minimising the impact of incidents
Principle D2: Lessons learned
When an incident or near miss occurs, steps are taken to understand its root causes and to ensure appropriate remediating action is taken to protect against future incidents.
D2.a Incident root cause analysis
Description
When an incident or near miss occurs, steps must be taken to understand its root causes and ensure appropriate remediating action is taken.
The expectation for this contributing outcome is Achieved.
Indicators of good practice (IGP) achievement levels
Expand the achievement levels to find out the requirements needed to meet each level.
As documented in the introduction to this framework, independent assessors are expected to use their professional judgement when assessing organisations against the Cyber Assessment Framework (CAF).
The approach and documentation list described below are a suggestion to the independent assessors, and do not have to be followed stringently.
Suggested approach to testing
1. Incident response lessons learned - Obtain and inspect the incident response process or policy, and assess whether lessons learned exercises and root cause analysis are documented as a key steps in the response process for both incidents and near misses, and responsibilities for those key steps have been clearly assigned (A#1)
2. Incident sampling - Obtain the list of incidents and near miss data that have taken place in the last 12 months. Confirm if all required data on incidents or near misses has been made available for analysis. From that list, choose a sample (see Introduction to CAF Independent Assessment Framework for more information) of incidents and request to see their lessons learned and root cause exercise. (A#1, A#3).
3. Root cause analysis - Assess the methodology in place at the organisation for undertaking root cause exercises, including the ownership and scope of the exercise and the routes to approval of the results. Determine whether the scope of the exercise includes vulnerabilities in the network, systems and software; organisational processes and people processes, and suppliers and suppliers processes. (A#2)
4. Methodology - Determine whether the methodology includes best practice examples of the type of data to be used during root cause analysis of common incidents and near misses, and enquire of the process to get access to that data by a member of staff. Verify that the lessons learned activities for the incidents you have sampled were completed following the correct methodology, as assessed during step 3 (A#2)
Suggested documentation
Suggested documentation should include:
- evidence of lessons learned being documented as part of incident management processes
- list of incidents and near misses from the past 12 months or incident review logs
- documented lessons learned and root cause analysis activities
- evidence of methodology and considerations for undertaking root cause exercises
D2.b Using incidents and near misses to drive improvements
Description
Your organisation uses lessons learned from incidents and near misses to improve your security measures.
The expectation for this contributing outcome is Achieved.
Indicators of good practice (IGP) achievement levels
Expand the achievement levels to find out the requirements needed to meet each level.
As documented in the introduction to this framework, independent assessors are expected to use their professional judgement when assessing organisations against the Cyber Assessment Framework (CAF).
The approach and documentation list described below are a suggestion to the independent assessors, and do not have to be followed stringently.
Suggested approach to testing
1. Incident review process or policy - Obtain the incident review process or policy, and assess whether the document contains:
- A requirement for lessons learned to be undertaken for near misses as well as incidents. (A#1)
- Assigned responsibilities for capturing lessons learned, updating relevant processes and documentation, and disseminating the learning throughout the organisation. (A#1)
- A documented authority to review the outputs of lessons learned exercises and direct the improvements in security measures (A#3).
- A clearly defined prioritisation process for the identified security improvements, including ownership for implementing changes and the process for approval of changes. (A#4)
- The escalation process and reporting lines to senior management. (A#5)
2. Lessons learned activities - Assess whether the scope of the lessons learned activities include a review of reporting, roles, governance, skills and organisational processes as well as technical aspects of networks and information systems (A#2).
3. Incident sampling - Obtain the list of incidents that have taken place in the last 12 months. From that list, choose a sample (see Introduction to CAF Independent Assessment Framework for more information on sampling) and request to see the respective lessons learned exercise. Verify that:
- The scope of the samples matches the expected scope as per the incident review process/policy, as assessed during step 2. (A#2)
- The findings of the samples have been documented, with remediation actions designed and their implementation assigned to a named owner with adequate timelines. (A#3)
4. Re-testing - Enquire of any plans to re-test the response plans with the updated security measures, where necessary and obtain evidence that this test is being designed (A#3).
5. Mitigating actions - Obtain and inspect documentation showing the progress that has been made on the implementation of mitigation actions. This may include updates to policies and process documentation, but also technical changes to security systems as required (A#4).
6. Approval of mitigating actions - Obtain and inspect the Terms of reference and minutes of the responsible group(s) to verify that outputs of the lessons learned exercises are being discussed, reviewed and approved by the responsible group(s). The remediation actions should be prioritised and approved by a relevant authority, with a named owner and adequate timelines put in place (A#1).
7. Incorporating into risk management and continuous improvement - Obtain examples of where lessons learned exercise and root cause analysis from incidents and near misses have been incorporated into risk management and continuous improvement. (A#5)
Suggested documentation
Suggested documentation includes:
- incident review process/policy
- documented lessons learned and root cause analysis activities
- evidence of methodology and considerations for undertaking root cause exercises
- list of incidents from the last 12 months
- evidence of actions take following lessons learned activities
- evidence of planning to re-test response plans or evidence that re-testing has occurred
- evidence of policies, processes and systems being updated following lessons learned activities
- terms of reference and minutes of relevant groups
- evidence of risk management processes being updated following lessons learned activities
Last edited: 2 January 2025 9:08 am