ISM-1458

The functionality and quality of online services, how to maintain such functionality, and what functionality can be lived without during a denial-of-service attack, are determined and documented.

Topic
Denial of service strategies
Applicable to
all

History

Priority
should
Jun 2023
Removed
The existing control relating to determining what functionality and quality of online services can be lived without during a denial-of-service attack was rescinded due to its overlap with control ISM-1431 that calls for denial-of-service attack mitigation strategies to be discussed with cloud service providers (including thresholds for turning off any online services or functionality, and other pre-approved actions that can be taken, during a denial-of-service attack).
Dec 2021
The functionality and quality of online services, how to maintain such functionality, and what functionality can be lived without during a denial-of-service attack, are determined and documented.
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
2015
Agencies should determine the functionality and quality of services acceptable to legitimateusers of online services, how to maintain such functionality, and what functionality can belived without during a denial of service.