Sponsoring Team Representative [Primary Sponsor Contact] visited [Candidate] on [Date of Visit] [in-person at [Location]|virtually]. The following individuals [Candidate Contacts] were present. During the site visit, the incident handling and security procedures were reviewed. The team also reviewed examples of past incidents that they experienced with customers and/or projects.
Team information is available at [URL of public Candidate information] and in the RFC 2350 format provided in the application documentation.
[Please include a detailed description of your constituency]
The CSIRT's constituency is defined as the 'client base', the target group for whom you do the CSIRT work. This constituency can be your own organization or company - then it is said that your constituency is internal to your organization. Your team can also have a constituency external to your own organization, like for instance your country's universities when you serve the academic community, or a paying customer base (commercial), or all municipalities in your country.]
[Include mission statement, I=insert URL if mission statement is published]
Example: “[Candidate] is aimed to provide a reliable and trusted single point of contact for an effective incident response related to technology and ICTs (Information and Communications Technologies) into the financial sector and critical infrastructures in the public and private sector.“
[Candidate] has started to operate [month/year of establishment] and they have established cooperation with several teams such as [insert team names].
Their service portfolio is listed at [insert link], they provide the following services.
Refer to the application/list of services base on the CSIRT/PSIRT Framework.
TEAM is funded by a [Parent Organization/Host] ([insert url]) in [country] and specializes in providing [example: IT and consulting] services.
[Contact information is listed here (ex: cert.organization.url/contact/)]
Members of [Candidate] must sign a written statement regarding the usage of information, systems and resources. They are currently in the process of implementing ISO 27001 policies, and most of this information is covered in the internal policies reviewed during the site visit.
Addressed in the TEAM internal policy x
Addressed in the TEAM internal policy x
Addressed in the TEAM internal policy x
Addressed in the TEAM internal policy x
Addressed in the TEAM internal policy x
Addressed in the TEAM internal policy x
Addressed in the TEAM internal policy x
[Candidate] has been collaborating with other FIRST Teams members, such as [team names], and have contacts with government teams in [country/industry] and will support the development of other incident response teams in the region.
[Insert any other policies here]
Example: To access the [Candidate] building a legal photo ID (passport, national identity card, etc) is [required/requested]. The [Candidate] facilities are physically separated from the rest of the organization. To enter team facilities the process is [insert process].
Access to the servers and network infrastructure is also restricted, and only authorized members can access these facilities.
Example: [Candidate] members have [number] computers, one connected to the internal network, and another connected to the CSIRT network which is isolated from the rest of the organization network. Some users also have access to connect to test networks.
[Candidate] systems are managed internally by the CSIRT system administrators and systems are kept updated and backups are performed daily.
Example: [Candidate] infrastructure has several storage facilities isolated from the other parts of the organization that are used for backup and storage.
Example: The team uses [description of tools] for tracking incidents and also to implement the different live ISO 27001 procedures.
Example: [Candidate] network is isolated from the organization network, with different internet connections. They have other networks also for testing purposes.
Example: External users can use the information provided in [link to documentation - example /cert.organiation.url/report-incident/]. Clients also have a support desk that can be accessed [describe].
Yes, also by telephone and postal address that are noted in the application form.
Example: Most alerts came directly from their clients as a result of an alert generated in their systems that are handled by [Candidate] members. End users can also contact them by email or by use of specific forums in which they help them to fix the problems.
Describe how incidents are added to the database and acknowledged/responded to by email, tracked, coordinated and reported.
Example: Internally, [Candidate] uses different systems to store and disseminate information, such as [wiki/ticketing tool] for tracking incidents.
For clients, TEAM has various portals that they can use to contact the team.
Information to the public includes listing of free security tools, statistics of virus dissemination and documentation about incident recovery.
Example: [Candidate] members have attended the following courses and also have attended events/conferences such as [list]. [Candidate] members have several certifications in computer security including [list].
[Candidate] is willing to participate in the following FIRST conferences/meetings/SIGs [list]
Insert pictures/screenshots or other details from the remote visit
Sponsoring Team Representative |
Applying Team Representative |