Direct links from the subject.
| Property | Value |
|---|---|
|
The subject is an instance of a class. |
|
|
The subject is an instance of a class. |
An idea or notion; a unit of thought. |
|
A human-readable name for the subject. |
ID.IM-03.4: The organisation shall collaborate and share information about its critical system's related security incidents and mitigation measures with designated partners. |
|
ID.IM-03.4 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p56 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p76 |
|
|
Relates a concept to a concept that is more general in meaning. |
|
|
A general note, for any purpose. |
The goal of this control is to strengthen cyber resilience by sharing information about security incidents and mitigation measures related to critical systems with designated partners. In Operational Technology (OT) environments, timely and coordinated information exchange helps prevent the spread of threats, supports faster recovery, and enhances collective defence across interconnected systems. To achieve this goal, the organisation should: - Define Roles and Authorities Theincidentresponseplanshouldclearlyoutlineroles,responsibilities,andauthorisationforsharingincident- related information with designated partners. - Train the Response Team Incident response personnel should be regularly trained on procedures for communicating with external partners during and after incidents. - Coordinate with Partners Information sharing should include details on incidents, mitigation actions, and lessons learned, especially with suppliers and service providers involved in critical system operations. - Reference Trusted Guidance RelevantpracticesshouldbeinformedbytrustedsourcessuchasENISA/CERT-EUSecurityGuidance22-001, which provides recommended mitigation measures against critical threats. - Ensure Conformance and Compliance All collaboration and sharing activities should conform to internal policies and comply with applicable laws, regulations, and industry standards. |
|
A general note, for any purpose. |
The goal of this control is to strengthen cyber resilience by sharing information about security incidents and mitigation measures related to critical systems with designated partners. In Operational Technology (OT) environments, timely and coordinated information exchange helps prevent the spread of threats, supports faster recovery, and enhances collective defence across interconnected systems. To achieve this goal, the organisation should: - Define Roles and Authorities Theincidentresponseplanshouldclearlyoutlineroles,responsibilities,andauthorisationforsharingincident- related information with designated partners. - Train the Response Team Incident response personnel should be regularly trained on procedures for communicating with external partners during and after incidents. - Coordinate with Partners Information sharing should include details on incidents, mitigation actions, and lessons learned, especially with suppliers and service providers involved in critical system operations. - Reference Trusted Guidance RelevantpracticesshouldbeinformedbytrustedsourcessuchasENISA/CERT-EUSecurityGuidance22-001, which provides recommended mitigation measures against critical threats. - Ensure Conformance and Compliance All collaboration and sharing activities should conform to internal policies and comply with applicable laws, regulations, and industry standards. |
|
A general note, for any purpose. |
The goal of this control is to strengthen cyber resilience by sharing information about security incidents and mitigation measures related to critical systems with designated partners. In Operational Technology (OT) environments, timely and coordinated information exchange helps prevent the spread of threats, supports faster recovery, and enhances collective defence across interconnected systems. To achieve this goal, the organisation should: • Define Roles and Authorities Theincidentresponseplanshouldclearlyoutlineroles,responsibilities,andauthorisationforsharingincident- related information with designated partners. • Train the Response Team Incident response personnel should be regularly trained on procedures for communicating with external partners during and after incidents. • Coordinate with Partners Information sharing should include details on incidents, mitigation actions, and lessons learned, especially with suppliers and service providers involved in critical system operations. • Reference Trusted Guidance RelevantpracticesshouldbeinformedbytrustedsourcessuchasENISA/CERT-EUSecurityGuidance22-001, which provides recommended mitigation measures against critical threats. • Ensure Conformance and Compliance All collaboration and sharing activities should conform to internal policies and comply with applicable laws, regulations, and industry standards. |
|
A general note, for any purpose. |
<div><p>The goal of this control is to strengthen cyber resilience by sharing information about security incidents and mitigation measures related to critical systems with designated partners. In Operational Technology (OT) environments, timely and coordinated information exchange helps prevent the spread of threats, supports faster recovery, and enhances collective defence across interconnected systems. To achieve this goal, the organisation should:</p><ul><li>Define Roles and Authorities Theincidentresponseplanshouldclearlyoutlineroles,responsibilities,andauthorisationforsharingincident- related information with designated partners.</li><li>Train the Response Team Incident response personnel should be regularly trained on procedures for communicating with external partners during and after incidents.</li><li>Coordinate with Partners Information sharing should include details on incidents, mitigation actions, and lessons learned, especially with suppliers and service providers involved in critical system operations.</li><li>Reference Trusted Guidance RelevantpracticesshouldbeinformedbytrustedsourcessuchasENISA/CERT-EUSecurityGuidance22-001, which provides recommended mitigation measures against critical threats.</li><li>Ensure Conformance and Compliance All collaboration and sharing activities should conform to internal policies and comply with applicable laws, regulations, and industry standards.</li></ul></div> |
|
A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme. |
ID.IM-03.4 |
|
skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties. |
Incident information sharing with partners |
|
A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag. |
The organisation shall collaborate and share information about its critical system's related security incidents and mitigation measures with designated partners. |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
http://cyfun.data.gift/data/CyFun2025_delta_BASIC_to_IMPORTANT |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
The number of triples associated with the subject. |
19 |
|
Specifies the dataset the subject is part of. |
Resultaten 1 - 21 of 21
Inverse links to the subject.
| Property | Subject |
|---|---|
|
Relates a concept to a concept that is more specific in meaning. |
Resultaten 1 - 1 of 1