Incident Management Assessment form

Incident Management Assessment Form

Incident Management


  • i. Cross-site scripting
  • ii. SQL injection attacks
  • iii. DoS attack
  • iv. Man in the middle attack
  • i. stop and contain,
  • ii. eradicate,
  • iii. analyse and report, and
  • iv. follow up.
  • Monitoring the employee behavior and systems used by them
  • Conducting risk assessment regularly
  • Documenting and establishing security controls and policies
  • Implementing secure backups and disaster recovery plans
  • Applying strict account management policies
  • Disabling employees from installing unauthorized software and visiting a malicious website through the enterprise’s network