Security event classification 510 your security event

Info icon This preview shows pages 11–14. Sign up to view the full content.

View Full Document Right Arrow Icon
Security Event Classification 5.10 Your Security Event will be automatically classified into one of three classifications set out below and an email notification will be sent to your nominated contact points. TELSTRA CORPORATION LIMITED (ABN 33 051 775 556) | Managed Security Services Section was last changed on 24 August 2017 | TELSTRA UNRESTRICTED PAGE 11 OF 36
Image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
OUR CUSTOMER TERMS MANAGED SECURITY SERVICES SECTION Security Event Classification Security Event – Priority One All Security Events at this level are actionable, high-risk events that have the potential to cause severe damage to your environment and require immediate action by you. Security Event – Priority Two All Security Events at this level are the lowest level of actionable incidents generated by our Security Operational Centre and require your action within 12-24 hrs. Security Event – Priority Three All Security Events at this level of category of investigation encompass activity on a network or server that is not directly actionable. 5.11 A security attack blocked by the vendor recommended and supplied signature and/or by your policy is not a Security Event and a ticket will not be created for the blocked attack. Security Event Notification 5.12 Our security expert will analyse your Priority One and Two Security Events, provide information and expert assessment based on your asset information and notify your nominated contact points in accordance with the below table. Security Event Classification Type of Notification Security Event – Priority One Phone call Security Event – Priority Two Phone call (if appropriate) or email Security Event – Priority Three Email only Optional components 5.13 You may purchase from us at additional cost: (a) additional log and event storage capacity and retention period; and (b) additional allowable number of assets. How do I access my service? 5.14 You can access your Security Intelligence service via the Telstra Security Portal. The Telstra Security Portal lets you: (a) for logging: (i) view your device log files; and (ii) raise a service request to view your log files that have been archived; (b) for event monitoring, correlation and classification: TELSTRA CORPORATION LIMITED (ABN 33 051 775 556) | Managed Security Services Section was last changed on 24 August 2017 | TELSTRA UNRESTRICTED PAGE 12 OF 36
Image of page 12
OUR CUSTOMER TERMS MANAGED SECURITY SERVICES SECTION (i) view and track your classified Security Events for your device; (ii) raise a service request to view your Security Events that have been archived; (iii) generate reports on your device Security Events; and (iv) update your asset information; and (c) for Security Event notification: (i) view expert assessment of your Priority One and Two Security Events. Limitations 5.15 We don’t promise that the Security Intelligence service will correctly detect and identify all: (a) unauthorised access to your network; (b) viruses; (c) spam; and (d) other types of attacks.
Image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 14
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern