Přeskočit na obsah
TECHNOMATON | Docs SAI certifikovaní trenéři

Řízení incidentů

Verze: 1.0 | Efektivní od: 1. ledna 2026


1. Účel

Tato směrnice definuje proces řízení bezpečnostních incidentů včetně detekce, response, notification a recovery.


2. Definice incidentu

2.1 Typy incidentů

TypPříkladyRegulace
Data BreachÚnik dat, unauthorized accessGDPR
Security IncidentMalware, ransomware, intrusionNIS2
AI IncidentBias, hallucination, malfunctionAI Act
AvailabilityDDoS, system failureNIS2
CompliancePolicy violationInternal

2.2 Severity Classification

SeverityDefiniceResponse TimeEscalation
CriticalBusiness critical impact, data breach<1hCEO + Board
HighSignificant impact, potential breach<4hC-level
MediumLimited impact, contained<24hManagement
LowMinimal impact, no data at risk<72hTeam lead

3. Incident Response Team (IRT)

3.1 Složení týmu

RolePrimárníBackup
Incident CommanderCISOIT Director
Technical LeadSecurity EngineerSRE Lead
CommunicationsPR ManagerCEO
LegalCLOExternal counsel
DPODPOPrivacy consultant
BusinessCOODepartment head

3.2 Kontaktní informace


4. Incident Response Process

4.1 Fáze response


5. Notification Requirements

5.1 Internal Notification

SeverityNotifyTimeline
CriticalCEO, Board, All C-levelImmediate
HighCISO, CTO, relevant C-level<1h
MediumCISO, Team leads<4h
LowCISO<24h

5.2 External Notification (Regulatory)

RegulaceAutoritaTimelineTrigger
GDPRÚOOÚ72hPersonal data breach
NIS2NÚKIB24h (initial), 72h (full)Significant incident
AI ActDocumentAI incident

5.3 Notification Templates

Initial Notification (24h) - NÚKIB:

  • Incident ID
  • Detection time
  • Affected systems
  • Initial assessment
  • Containment status
  • Contact info

Full Report (72h) - ÚOOÚ:

  • Nature of breach
  • Categories of data
  • Number of subjects
  • Likely consequences
  • Measures taken
  • DPO contact

6. Data Breach Specific Process

6.1 Data Breach Assessment

Data Breach Checklist:

  • Co se stalo?
  • Kdy to bylo zjištěno?
  • Kdy to začalo?
  • Jaká data jsou dotčena?
  • Kolik subjektů je dotčeno?
  • Jsou data šifrovaná?
  • Byl klíč kompromitován?
  • Jaké je riziko pro subjekty?
  • Je nutná notifikace?

6.2 Subject Notification Criteria

Notifikovat subjekty pokud:

  • Vysoké riziko pro práva a svobody
  • Nešifrovaná citlivá data
  • Financial data exposed
  • Health data exposed
  • Credentials exposed (plaintext)

6.3 Subject Notification Content

  • Co se stalo (bez technických detailů)
  • Jaká data byla dotčena
  • Jaké je riziko
  • Co děláme
  • Co můžete udělat vy
  • Kontakt na DPO

7. AI Incident Specific Process

7.1 AI Incident Types

TypPříkladSeverity
BiasDiscriminatory outputsHigh
HallucinationFactually incorrectMedium
Privacy leakPII in outputsCritical
MalfunctionSystem not workingMedium
AdversarialModel manipulationHigh

7.2 AI Incident Response


8. Communication

8.1 Internal Communication

AudienceChannelFrequency
IRTWar room / SlackContinuous
ManagementEmail + callEvery 4h (critical)
EmployeesEmailAs needed

8.2 External Communication

AudienceOdpovědnostApproval
RegulatorsDPO / CISOCLO
CustomersPR + CSCEO
MediaPRCEO
PartnersAccount managerCOO

8.3 Communication Templates

Internal Status Update:

Subject: [INCIDENT-XXX] Status Update #N
Current Status: [ACTIVE/CONTAINED/RESOLVED]
Severity: [CRITICAL/HIGH/MEDIUM/LOW]
Summary: [2-3 sentences]
Timeline:
- [Time]: [Event]
- [Time]: [Event]
Current Actions:
- [Action 1]
- [Action 2]
Next Update: [Time]
Incident Commander: [Name]

9. Documentation

9.1 Incident Record

Každý incident musí obsahovat:

PolePopis
Incident IDUnikátní identifikátor
Detection timeKdy zjištěno
Start timeKdy začalo (odhad)
End timeKdy vyřešeno
SeverityClassification
TypeData breach / Security / AI
DescriptionCo se stalo
ImpactJaký dopad
Root causePříčina
Actions takenCo jsme udělali
Lessons learnedCo zlepšit
Follow-up actionsPreventivní opatření

9.2 Retention

DokumentRetention
Incident report5 let
Evidence5 let
Communication logs5 let
Forensic reports5 let

10. Post-Incident Review

10.1 Post-Mortem Template

POST-MORTEM: [INCIDENT-XXX]
1. INCIDENT SUMMARY
- What happened
- Timeline
- Impact
2. ROOT CAUSE ANALYSIS
- What failed
- Why it failed
- Contributing factors
3. WHAT WENT WELL
- Effective responses
- Good decisions
4. WHAT COULD BE IMPROVED
- Gaps identified
- Process issues
5. ACTION ITEMS
- Preventive measures
- Process improvements
- Training needs
- Tool improvements
6. FOLLOW-UP
- Owner for each action
- Deadlines
- Review date

11. Training & Exercises

ExerciseFrekvenceScope
Tabletop exerciseČtvrtletněIRT
Phishing simulationČtvrtletněAll employees
IR drillPololetněIRT + IT
Full-scale exerciseRočněOrganization-wide

12. Policy Review

  • Po každém incidentu: Review lessons learned
  • Čtvrtletně: Metrics review, process update
  • Ročně: Full policy review + CISO approval

Příští revize: Q2 2026