Incident Details Form
Once the prerequisite fields have been completed on the Incident Register, the incident details form is created for incidents. All information that has already been added on the parent forms will be automatically populated. For simplicity the following form has been separated into smaller sections, allowing each to be focused on.
Introductory Details
In this section, the user provides a detailed profile of the event, with some additional information being pulled through from the (e.g. the summary, the date notified). This allows the user to provide some context behind the event and fully detail the sequence of events that lead to this incident, including those who participated, see below.
This introductory section has the following fields:
Ref. |
Item |
Description |
1 |
Escalate |
Click this button to escalate to the accountable user as defined in the incident variant selected in the register. |
2 |
Status |
This displays status of the incident. |
3 |
Location |
A free text field to enter the location of the incident. |
4 |
Detailed Description |
An opportunity to add a detailed description of when the incident took place, and what happened. |
5 |
Attachment |
There is the option to upload any supporting documentation for this incident. |
6 |
Root Cause |
Here, there are four options to choose from in the form of a drop down list: System Failure, Human Error, Social Engineering and Malicious Attacks. |
7 |
Sequence |
This is an automatically generated sequential number that counts based upon when that row was added in a chronological sequence. |
8 |
Event |
The event that occurred. |
9 |
Participants |
The people who were involved |
10 |
Date |
The date the event occurred. |
11 |
Time |
The time the event occurred. The value field restricted to “hh:mm” format. |
12 |
Add Button |
This adds a new row into the table. |
Supporting Assets
This section detailed any supporting assets that were affected by the incident, see below. These assets are taken from a Supporting Assets Library, from which the assets details (e.g. the type of asset, the asset owner and infrastructure etc) are recorded. By selecting this asset from the list, these details are automatically populated in this section.
This section has the following fields:
Ref. |
Item |
Description |
1 |
Supporting Asset |
Add the affected supporting asset(s). |
2 |
Type |
Automatically populated from the Supporting Assets. |
3 |
Owner |
|
4 |
Organisation |
|
5 |
Infrastructure |
|
6 |
Location |
Inherent Risk on Information Assets
The affected information assets are taken from the Information Assets Library, from which details such as its risks are auto populated in the incident form. Using these risk values, the overall inherent risk of the incident is calculated, see below.
Ref. |
Item |
Description |
1 |
Information Asset |
Add the affected information asset(s) |
2 |
Subjects |
Automatically populated from the Information Assets.
|
3 |
Classification |
|
4 |
Sensitivity |
|
5 |
Volume |
|
6 |
Risk |
Calculated based upon the settings in Risk Limits. |
7 |
Add Button |
This adds a new row into the table. |
8 |
Inherent Risk |
This displays the maximum risk displayed over all the risks in column 7 of the Affected Information Assets section. |
Third Parties and Mitigating Controls
Any third parties that have been affected by the incident can also be detailed on the incident form, as well as any mitigating controls. The third parties and the controls selected are taken from the Organisation Register and Control Library respectively. The details of the third parties (e.g. status, scope etc) are populated from the Organisation Register. From here, the organisation can record if the Third Party has been notified of this incident. The control details (e.g. description, status etc) are completed from the Control library. From this, the residual risk and target risk are calculated. The residual risk is calculated by using the inherent risk and the current maturity of the mitigating controls, the target risk is calculated using the inherent risk and the target maturity.
This section has the following fields:
Ref. |
Item |
Description |
1 |
Third Party |
Add the affected third parties. |
2 |
Status |
The status of the Third Party, set in the Organisation Register. |
3 |
Scope |
The scope of the Third Party, set in the Organisation Register. |
4 |
Service Description |
The service description for the Third Party, set in the Organisation Register. |
5 |
Contact |
This is where the contact information for that third party is displayed. |
6 |
Notified? |
Mark if the Third-Party has been notified. |
7 |
Add Button |
This adds a new row into the table. |
8 |
Control |
Detail the mitigating controls, insert as many rows as needed. |
9 |
Description |
This description is automatically populated from the Control Library. |
10 |
Status |
This status is automatically populated from the Control Library. |
11 |
Current Maturity |
This Current Maturity is automatically populated from the Control Library. |
12 |
Target Maturity |
This Target Maturity is automatically populated from the Control Library. |
13 |
Add Button |
This adds a new row into the table. |
14 |
Residual Risk |
Calculated from the Inherent Risk and Current Maturity. |
15 |
Target Risk |
Calculated from Inherent Risk and Target Maturity. |
Failed Controls and Corrective Actions
This section details controls that were in place but failed to prevent the incident from occurring. These controls are taking from the Controls Library. Following this, the user can detail any actions that need to be taken in order to prevent this incident from occurring again.
This section has the following fields:
Ref. |
Item |
Description |
1 |
Control |
Detail the mitigating controls, insert as many rows as needed. |
2 |
Description |
This description is automatically populated from the Control Library. |
3 |
Status |
This status is automatically populated from the Control Library. |
4 |
Current Maturity |
This Current Maturity is automatically populated from the Control Library. |
5 |
Target Maturity |
This Target Maturity is automatically populated from the Control Library. |
6 |
Add Button |
This adds a new row into the table. |
7 |
Action |
Detail any corrective actions, insert as many rows as needed. |
8 |
Facilitator |
This is automatically populated from the Actions List. |
9 |
Target Date |
|
10 |
Updates |
|
11 |
Status |
|
12 |
Add Button |
This adds a new row into the table. |
Next Step: Incident Variants
Comments