Back

Establish, implement, and maintain warning procedures that follow the organization's communication protocol.


CONTROL ID
12407
CONTROL TYPE
Establish/Maintain Documentation
CLASSIFICATION
Preventive

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Establish, implement, and maintain communication protocols., CC ID: 12245

There are no implementation support Controls.


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • If Option A: Where you have anti-malware software installed, is it set to scan web pages you visit and warn you about accessing malicious websites? (A8.3., Cyber Essentials Scheme (CES) Questionnaire, Version 13)
  • Is there a procedure for receiving and responding to warnings from outside agencies and emergency responders? (Operation ¶ 24, ISO 22301: Self-assessment questionnaire)
  • Is there a procedure for issuing alerts and warnings and is this communication regularly exercised and records kept of the results? (Operation ¶ 25, ISO 22301: Self-assessment questionnaire)
  • The organization shall decide, using life safety as the first priority and in consultation with relevant interested parties, whether to communicate externally about its significant risks and impacts and document its decision. If the decision is to communicate then the organization shall establish an… (§ 8.4.2 ¶ 3, ISO 22301: Societal Security - Business Continuity Management Systems - Requirements, Corrected Version)
  • The warning and communication procedures shall be exercised as part of the organization's exercise programme described in 8.5. (§ 8.4.3.2 ¶ 1, ISO 22301:2019, Security and resilience — Business continuity management systems — Requirements, Second Edition)
  • The organization has established processes and protocols to communicate, alert and periodically report detected potential cyber attacks and incident information including its corresponding analysis and cyber threat intelligence to internal and external stakeholders. (DE.DP-4.1, CRI Profile, v1.2)
  • The organization has established processes and protocols to communicate, alert and periodically report detected potential cyber attacks and incident information including its corresponding analysis and cyber threat intelligence to internal and external stakeholders. (DE.DP-4.1, Financial Services Sector Cybersecurity Profile, Version 1.0.0)
  • Provide timely access to BCD-collected indications and warnings relevant to organizations performing MCD Actions. (Section 6.3 ¶ 1 Bullet 2, sub-bullet 2, Department of Defense Cloud Computing Security Requirements Guide, Version 1, Release 3)