Cenareo is committed to protecting its customers' data and maintaining the confidentiality, integrity and availability of its information systems.
This policy describes our formal process for detecting, identifying, identifying, analyzing, analyzing, responding to, and recovering security incidents or crises.
Analysis and Investigation
Detection and identification
Cenareo uses various security tools and surveillance systems to detect potential security incidents or crises. This includes log analysis, intrusion detection systems, and endpoint security solutions. As soon as an incident or a potential crisis is detected, Cenareo launches an investigation to determine its nature, scope and impact.
Investigative team
A specialized response team, composed of IT security personnel, representatives of the relevant business units, and legal advisers, will be established to investigate the incident or crisis.
Collection of evidence
The team will gather and maintain all relevant evidence, including system logs, network traffic data, and relevant files. This will facilitate the analysis of the investigation and the identification of root causes.
Communication
Throughout the investigation, Cenareo will maintain open communication with the customer, keeping them informed of the status of the incident and the potential impact on their data.
Notification process
Cenareo is committed to promptly informing its customers as soon as a security incident is identified that may have an impact on their data or systems.
The notification will include details such as the nature of the incident, the potential impact on customer data, and the steps taken to mitigate and recover the incident.
Lockdown
The primary objective is to contain the incident and prevent further damage or data loss. This may include isolating compromised systems, suspending user accounts, or stopping affected services.
Eradication
Cenareo will take steps to eradicate the root cause of the incident and prevent it from happening again. This may include fixing vulnerabilities, removing malware, or implementing additional security controls.
Recovery
Cenareo will restore affected systems and data to a functional state using backups and disaster recovery procedures. Customer data recovery capabilities will be given priority.
Lessons learned
Following the incident, Cenareo will conduct a thorough review to identify lessons learned and improve our security posture. This includes updating our incident response plan and implementing additional security controls to prevent similar incidents from happening in the future.
Security capabilities
Forensic analysis
Cenareo can conduct digital investigations to analyze evidence and determine the extent and nature of a security incident.
Log management
Cenareo captures and stores relevant system audit logs for analysis during investigations and post-incident review. Customer data contained in these logs will be anonymized to the extent possible and protected by appropriate access controls.
Log security
Cenareo has put controls in place to protect newspapers from unauthorized access or corruption. These controls may include encryption, access restrictions, and manipulation detection mechanisms.
Security Operations Center (SOC)
Cenareo has a Security Operations Center (SOC) or an equivalent function that constantly monitors our information systems to detect suspicious activity. The SOC team is responsible for detecting, investigating, and responding to security incidents.
Disaster recovery scenarios
Cenareo has documented disaster recovery scenarios for critical systems, including Active Directory and privileged access management (PAM) solutions. These scenarios describe the steps required to restore functionality and minimize downtime in the event of an outage or compromise.
Cenareo can recover customer data in the event of a failure or data loss through backups and disaster recovery procedures. The recovery time objective (RTO) and recovery point objective (RPO) for customer data will be clearly defined and documented.
Incident history
Cenareo keeps a record of all security incidents, including successful attacks and those that Cenareo minimized before causing disruptions. This information is used to improve our security posture and ensure that Cenareo is ready to effectively manage future incidents.
Communication with the customer
Cenareo will maintain open communication with its customers throughout the incident response process. This includes providing quick updates on the investigation, lockdown efforts, and recovery progress.
Compliance
This incident management policy is aligned with relevant security frameworks and industry best practices. Cenareo will regularly review and update this policy to reflect changes in the threat landscape and regulatory requirements.