Print

Policies


PIONIER-CERT (former: POL34-CERT) is authorized to address all types of computer security incidents that occur, or threaten to occur, at the range of its constituency. As it was already mentioned, the overall process of PIONIER-CERT operating covers all kinds of security incidents involving systems in our constituency (i.e. when they are targets or actual sources of abusive activity).

The level of support provided by PIONIER-CERT will vary depending upon the type and severity of the incident or issue, the type of constituent, the size of the user community affected, and the resources available at the time, though in all cases some response will be made within one working day.

  • Resources will be assigned according to the following priorities, listed in decreasing order: root or system-level attacks on any Management Information System, including any part of the backbone network infrastructure, any significant public service machine, either multi-user or dedicated-purpose,
  • compromise of the restricted confidential service accounts or software installations, compromise of data secrecy (in the case of confidential data) or integrity (also in case of published information),
  • denial of service or any other attempts of limiting availability of service or information (especially massive distributed attacks),
  • large-scale organized attacks of any kind, e.g. abusive information gathering, social engineering attacks, password cracking attacks,
  • threats, harassment, and other criminal offenses involving individual user accounts (or any other aspects of their virtual identity),
  • compromise of individual user accounts on multi-user or desktop systems,
  • forgery and misrepresentation, and other security-related violations of local rules and regulations.

Types of incidents other than those mentioned above will be prioritized according to their apparent severity and extent.


Menu