10.1184/R1/6572939.v1 Christopher J. Alberts Christopher J. Alberts Audrey J. Dorofee Audrey J. Dorofee Georgia Killcrece Georgia Killcrece Robin M. Ruefle Robin M. Ruefle Mark T. Zajicek Mark T. Zajicek Defining Incident Management Processes for CSIRTs: A Work in Progress Carnegie Mellon University 2004 software engineering technical report 2004-10-01 00:00:00 Report https://kilthub.cmu.edu/articles/report/Defining_Incident_Management_Processes_for_CSIRTs_A_Work_in_Progress/6572939 This report presents a prototype best practice model for performing incident management processes and functions. It defines the model through five high-level incident management processes: Prepare/Sustain/Improve, Protect Infrastructure, Detect Events, Triage Events, and Respond. Workflow diagrams and descriptions are provided for each of these processes. One advantage of the model is that it enables examination of incident management processes that cross organizational boundaries, both internally and externally. This can help computer security incident response teams (CSIRTs) improve their ability to collaborate with other business units and other organizations when responding to incidents. Future reports will extend this work and provide additional guidance to enable both newly forming and existing incident management capabilities to use the model to determine where gaps exist in their current processes and to develop plans for creating, improving, or restructuring their incident management processes. Although the processes defined in this document were originally developed for internal CSIRTs, the models and information presented here are applicable to other types of CSIRTs and other types of incident management and security management capabilities.