data.gift
  • Datasets

http://cyfun.data.gift/data/requirement_PR_DS_01_3

http://cyfun.data.gift/data/requirement_PR_DS_01_3
Concept

  • http://cyfun.data.gift/data/CyFun2025

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

    • External link
    • Internal link

  • http://cyfun.data.gift/data/subcategory_PR.DS-01

    • External link
    • Internal link

Properties and relations

Direct links from the subject.

Property Value

type

The subject is an instance of a class.

  • External link
  • Internal link

http://cyfun.data.gift/ontology#Requirement

  • External link
  • Internal link

type

The subject is an instance of a class.

  • External link
  • Internal link

Concept

An idea or notion; a unit of thought.

  • External link
  • Internal link

label

A human-readable name for the subject.

  • External link
  • Internal link

PR.DS-01.3: The organisation shall define and implement automated responses to detected integrity violations, using predefined safeguards that are proportionate to the severity and impact of the violation.

http://cyfun.data.gift/ontology#requirementId

  • External link
  • Internal link

PR.DS-01.3

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p110

  • External link
  • Internal link

has broader

Relates a concept to a concept that is more general in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.DS-01

  • External link
  • Internal link

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to minimise the impact of integrityviolations by enabling timely, proportionate, and automated responses that help contain threats, preserve system stability, and support forensic analysis, especially in environments where manual intervention may be delayed or impractical. To achieve this goal, the following guidance should be considered: • Severity levels and response actions should be defined, with integrity violations being categorised (e.g. low, medium, high impact) and linked to appropriate automated safeguards. • Alerts and notifications should be triggered automatically when integrity violations are detected, and inte- grated with Security Orchestration, Automation, and Response (SOAR) platforms to streamline incident handling. • Affected components should be quarantined orisolated, such as compromised files, applications, orsystems, to prevent further damage. • All events should be logged and auditable, including detected violations and automated actions, to support forensic investigations and compliance reporting. • Lightweight automation should be used where possible, such as: o Blocking specific processes or users o Reverting to a known-good configuration o Temporarily disabling affected services • Response mechanisms should be tested and tuned regularly in controlled environments to ensure effective- ness and avoid unnecessary disruption. • The European Union Agency for Cybersecurity (ENISA) guidance in the “Implementation Guidance on Security Measures” (For Public Consultation, Document No. ENISA/2024/IGSM) should be consulted.

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to minimise the impact of integrityviolations by enabling timely, proportionate, and automated responses that help contain threats, preserve system stability, and support forensic analysis, especially in environments where manual intervention may be delayed or impractical. To achieve this goal, the following guidance should be considered: - Severity levels and response actions should be defined, with integrity violations being categorised (e.g. low, medium, high impact) and linked to appropriate automated safeguards. - Alerts and notifications should be triggered automatically when integrity violations are detected, and inte- grated with Security Orchestration, Automation, and Response (SOAR) platforms to streamline incident handling. - Affected components should be quarantined orisolated, such as compromised files, applications, orsystems, to prevent further damage. - All events should be logged and auditable, including detected violations and automated actions, to support forensic investigations and compliance reporting. - Lightweight automation should be used where possible, such as: - Blocking specific processes or users - Reverting to a known-good configuration - Temporarily disabling affected services - Response mechanisms should be tested and tuned regularly in controlled environments to ensure effective- ness and avoid unnecessary disruption. - The European Union Agency for Cybersecurity (ENISA) guidance in the “Implementation Guidance on Security Measures” (For Public Consultation, Document No. ENISA/2024/IGSM) should be consulted.

note

A general note, for any purpose.

  • External link
  • Internal link

<div><p>The goal of this control is to minimise the impact of integrityviolations by enabling timely, proportionate, and automated responses that help contain threats, preserve system stability, and support forensic analysis, especially in environments where manual intervention may be delayed or impractical. To achieve this goal, the following guidance should be considered:</p><ul><li>Severity levels and response actions should be defined, with integrity violations being categorised (e.g. low, medium, high impact) and linked to appropriate automated safeguards.</li><li>Alerts and notifications should be triggered automatically when integrity violations are detected, and inte- grated with Security Orchestration, Automation, and Response (SOAR) platforms to streamline incident handling.</li><li>Affected components should be quarantined orisolated, such as compromised files, applications, orsystems, to prevent further damage.</li><li>All events should be logged and auditable, including detected violations and automated actions, to support forensic investigations and compliance reporting.</li><li>Lightweight automation should be used where possible, such as:<ul><li>Blocking specific processes or users</li><li>Reverting to a known-good configuration</li><li>Temporarily disabling affected services</li></ul></li><li>Response mechanisms should be tested and tuned regularly in controlled environments to ensure effective- ness and avoid unnecessary disruption.</li><li>The European Union Agency for Cybersecurity (ENISA) guidance in the “Implementation Guidance on Security Measures” (For Public Consultation, Document No. ENISA/2024/IGSM) should be consulted.</li></ul></div>

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to minimise the impact of integrityviolations by enabling timely, proportionate, and automated responses that help contain threats, preserve system stability, and support forensic analysis, especially in environments where manual intervention may be delayed or impractical. To achieve this goal, the following guidance should be considered: - Severity levels and response actions should be defined, with integrity violations being categorised (e.g. low, medium, high impact) and linked to appropriate automated safeguards. - Alerts and notifications should be triggered automatically when integrity violations are detected, and inte- grated with Security Orchestration, Automation, and Response (SOAR) platforms to streamline incident handling. - Affected components should be quarantined orisolated, such as compromised files, applications, orsystems, to prevent further damage. - All events should be logged and auditable, including detected violations and automated actions, to support forensic investigations and compliance reporting. - Lightweight automation should be used where possible, such as: - Blocking specific processes or users - Reverting to a known-good configuration - Temporarily disabling affected services - Response mechanisms should be tested and tuned regularly in controlled environments to ensure effective- ness and avoid unnecessary disruption. - The European Union Agency for Cybersecurity (ENISA) guidance in the “Implementation Guidance on Security Measures” (For Public Consultation, Document No. ENISA/2024/IGSM) should be consulted.

notation

A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme.

  • External link
  • Internal link

PR.DS-01.3

alternative label

skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties.

  • External link
  • Internal link

Automated integrity violation response

preferred label

A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag.

  • External link
  • Internal link

The organisation shall define and implement automated responses to detected integrity violations, using predefined safeguards that are proportionate to the severity and impact of the violation.

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_delta_IMPORTANT_to_ESSENTIAL

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

  • External link
  • Internal link

http://cyfun.data.gift/ontology#level

  • External link
  • Internal link

http://cyfun.data.gift/data/level_ESSENTIAL

  • External link
  • Internal link

triple count

The number of triples associated with the subject.

  • External link
  • Internal link

17

in dataset

Specifies the dataset the subject is part of.

  • External link
  • Internal link

http://data.gift/d/datasets/69E8863AA6CE46D9ACD13109

  • External link
  • Internal link

Resultaten 1 - 19 of 19

References

Inverse links to the subject.

Property Subject

http://cyfun.data.gift/ontology#hasRequirement

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.DS-01

  • External link
  • Internal link

has narrower

Relates a concept to a concept that is more specific in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_PR.DS-01

  • External link
  • Internal link

Resultaten 1 - 1 of 1

© 2024 redpencil.io. All rights reserved.