ETSI - Security Indicators Quick Reference Card v1.1.2
ETSI - Security Indicators Quick Reference Card v1.1.2
1.2. Consolidated indicators of the previous IEX, IMF, IDB security incidents
Non-patched or 1 Exploitation of sw vul. w/o available patch #ev[30d], #inc.categorized.detected, Ømonth[60d] key 3 3 3-6
VNP poorly patched vul. 2 Exploitation of non-patched sw vul. #ev[30d], #inc.categorized.detected, Ømonth[60d] key 3 3 3-6
IWH exploitation 3 Exploitation of poorly-patched sw vul. #ev[30d], #inc.categorized.detected, Ømonth[60d] key 3 3 3-6
Conf. vul.
whole VCN 1 Exploitation of config flaw #ev[30d], #inc.categorized.detected, Ømonth[60d] key 3 2 2,4-6
exploitation
incident
class UKN Unknown incidents 1 Not categorized sec incidents #ev[30d], #inc.categorized.detected, Ømonth[90d] key 3-4 2 4-6
Incidents on not Sec. inc. on non-inventoried/not-managed
UNA 1 #ev[30d], #inc.categorized.detected, Ømonth[90d] key 3-4 3 1,5,6
addressed assets assets
Conventions: F (frequency rate: +/++/+++; sig=significant; key to know; ?=undefined), S (severity level: 1[low]-4[highest]; ~[depend on sensitivity]), D (detection rate: 1[very difficult]-3[easy]), M (maturity KPSI)
“#” number (quantitative amount); “[30d]” time interval (e.g. 30 days); “Ø“ average; “Σ” sum over all incidents; “Ømonth“ average value of this indicator in last month, “org.xx” xx in the organization
Abbreviations: AP (access point), ev (event), FW (firewall), inc (incident), mis (misbehaving), mw (malware), org (company or organisation), OS (oper.sys.), sec (security), sw (software), vul (vulnerability)
29/06/2015
VSW WSR Webserver sw. vul. 1 Web applications sw vul. #ev[30d], #applications.web, Ømonth[90d] + 3-4 3 3,6
Software OSW OS sw. vul 1 OS sw vul. regarding servers #ev[30d], #server.ext.visible, Ømonth[90d] + 2-3 3 3,6
vul.
WBR Webbrowser sw. vul. 1 Webbrowser sw. vul. #ev[30d], #workstations, Ømonth[90d] ++ 2-4 3 3,6
BKP Back-up malfunction 1 Malfunction server hosted safeguards NEW #ev[30d], #servers.safeguards, Ømonth sig 3 3 6,7
IDS IDS/IPS malfunction 1 Full unavailability of IDS/IPS #ev[30d], #IDS/IPS, Ømonth[90d] sig 3 3 5,6
Illicit Wi-Fi access Wi-Fi devices installed on the network w/o 2,6
WFI 1 #ev[30d], #APs.WiFi, Ømonth[180d] sig 4 3
VTC points any official authorisation
General Remote access points used to gain 5
sec. RAP Illicit remote access 1 #ev[30d], #AP.authorized, Ømonth[180d] ? 3 1
technical unauthorised access
vul. Illicit network Devices or servers connected to org. 1
NRG 1 #ev[30d], #equipment.authorized, Ømonth[90d] sig 3 2/3
connections network w/o being reg./managed
Physical access -
PHY 1 Not operational phy. access control means #ev[30d], #areas.protected, Ømonth[90d] sig 2-3 2
control
DSC Discovery of attacks 1 Excessive time to discovery NEW #ev[30d], #inc.detected [30d], sig 4 1 6
1 Excessive time of windows of risk exposure time.risk(>limit.policy.sec), Ømonth[90d] + 3-4 2 3
VNP Not patched vul.
2 Rate of not patched systems #ev[30d], #systems, Ømonth[90d] sig 2 2 3
Not reconfigured 2
VNR 1 Rate of not reconfigured systems #ev[30d], #systems.reconfigured, Ømonth[90d] sig 2 3
systems
VOR 1 Reactions plans launched w/o experience #ev[30d], #reactionplans.launched, Ømonth[90d] sig 2 3 6,7
RCT Reaction plans feedback
General
sec. org.
2 Reaction plans unsuccessfully launched #ev[30d], # reactionplans.launched, Ømonth[90d] sig 4 3 6,7
vul. 1 Launch of new IT projects w/o information #ev[30d], #projects.launched, Ømonth[90d] + 3 3 6
classification
Security in IT 2 Launch of new specific IT projects w/o risk #ev[30d], #projects.launched, Ømonth[90d] + 3 3 6
PRT
projects analysis
3 Launch of new IT projects of a standard #ev[30d], #projects.launched, Ømonth[90d] + 3 3 6
type w/o identification of vul. and threats
Conventions: F (frequency rate: +/++/+++; sig=significant; key to know; ?=undefined), S (severity level: 1[low]-4[highest]; ~[depend on sensitivity]), D (detection rate: 1[very difficult]-3[easy]), M (maturity KPSI)
“#” number (quantitative amount); “[30d]” time interval (e.g. 30 days); “Ø“ average; “Σ” sum over all incidents; “Ømonth“ average value of this indicator in last month, “org.xx” xx in the organization
Abbreviations: AP (access point), ev (event), FW (firewall), inc (incident), mis (misbehaving), mw (malware), org (company or organisation), OS (oper.sys.), sec (security), sw (software), vul (vulnerability)