History
- 2008
- Agencies should develop and maintain procedures supporting the plan to: a. detect potential ICT security incidents b. establish the cause of any ICT security incident, whether accidental or deliberate c. detail the action to be taken to recover and minimise the exposure from an ICT security incident d. report ICT security incidents e. document any recommendations on preventing a recurrence.