Security breaches - what now?
When a business discovers a security breach, they must act swiftly to implement security measures. When a breach alarm is triggered, it is often unclear where a potential breach comes from or whether it is an external or internal event that triggered the alarm. In such cases, the company should have a documented and tested crisis management process, including, among other things, a review of monitoring systems and other forensic analysis work.
During such investigations, it is often necessary to review large amounts of log data from firewalls, IT systems, etc. Implementing such log systems usually involves monitoring employees’ use of electronic equipment within the company. Initially, such monitoring is prohibited, however the email regulations state that the company can monitor employees’ use of electronic equipment to “detect or clarify security breaches in the network.” Detecting and clarifying security breaches can be interpreted that log data can be inspected both during the acute security incident and in subsequent forensic work, which aims to further clarify the causes and consequences of a security breach.
When the company inspects log data, privacy must be preserved. The company must ensure that they only process the information necessary for that purpose. During the acute phase, data essential to uncovering the security breach and possibly stopping it can be analyzed. In later stages, the goal will be to clarify the security breach.
The amount of log data that needs analysis in individual cases will vary depending on the type of event, but the company must conclude all log analysis when the security breach is clarified and/or resolved. All investigations and assessments must be documented in an internal report in the company.