BS EN ISO/IEC 27043:2016
$189.07
Information technology. Security techniques. Incident investigation principles and processes
Published By | Publication Date | Number of Pages |
BSI | 2016 | 46 |
This International Standard provides guidelines based on idealized models for common incident investigation processes across various incident investigation scenarios involving digital evidence. This includes processes from pre-incident preparation through investigation closure, as well as any general advice and caveats on such processes. The guidelines describe processes and principles applicable to various kinds of investigations, including, but not limited to, unauthorized access, data corruption, system crashes, or corporate breaches of information security, as well as any other digital investigation.
In summary, this International Standard provides a general overview of all incident investigation principles and processes without prescribing particular details within each of the investigation principles and processes covered in this International Standard. Many other relevant International Standards, where referenced in this International Standard, provide more detailed content of specific investigation principles and processes.
PDF Catalog
PDF Pages | PDF Title |
---|---|
7 | Foreword |
8 | Introduction |
13 | 1 Scope 2 Normative references 3 Terms and definitions |
15 | 4 Symbols and abbreviated terms |
16 | 5 Digital investigations 5.1 General principles 5.2 Legal principles |
17 | 6 Digital investigation processes 6.1 General overview of the processes 6.2 Classes of digital investigation processes |
19 | 7 Readiness processes 7.1 Overview of the readiness processes |
21 | 7.2 Scenario definition process 7.3 Identification of potential digital evidence sources process |
23 | 7.4 Planning pre-incident gathering, storage, and handling of data representing potential digital evidence process 7.5 Planning pre-incident analysis of data representing potential digital evidence process 7.6 Planning incident detection process 7.7 Defining system architecture process |
24 | 7.8 Implementing system architecture process 7.9 Implementing pre-incident gathering, storage, and handling of data representing potential digital evidence process 7.10 Implementing pre-incident analysis of data representing potential digital evidence process 7.11 Implementing incident detection process |
25 | 7.12 Assessment of implementation process 7.13 Implementation of assessment results process 8 Initialization processes 8.1 Overview of initialization processes |
26 | 8.2 Incident detection process |
27 | 8.3 First response process 8.4 Planning process 8.5 Preparation process |
28 | 9 Acquisitive processes 9.1 Overview of acquisitive processes 9.2 Potential digital evidence identification process |
29 | 9.3 Potential digital evidence collection process 9.4 Potential digital evidence acquisition process 9.5 Potential digital evidence transportation process 9.6 Potential digital evidence storage and preservation process |
30 | 10 Investigative processes 10.1 Overview of investigative processes |
31 | 10.2 Potential digital evidence acquisition process 10.3 Potential digital evidence examination and analysis process 10.4 Digital evidence interpretation process 10.5 Reporting process |
32 | 10.6 Presentation process 10.7 Investigation closure process 11 Concurrent processes 11.1 Overview of the concurrent processes |
33 | 11.2 Obtaining authorization process 11.3 Documentation process 11.4 Managing information flow process 11.5 Preserving chain of custody process |
34 | 11.6 Preserving digital evidence process 11.7 Interaction with physical investigation process 12 Digital investigation process model schema |
36 | Annex A (informative) Digital investigation processes: motivation for harmonization |
40 | Bibliography |