{"id":989090,"date":"2025-09-20T20:28:37","date_gmt":"2025-09-20T20:28:37","guid":{"rendered":"https:\/\/gpss.ro\/ghid-securitate\/gestionarea-incidentelor-de-securitate-cibernetica\/"},"modified":"2025-09-20T20:28:37","modified_gmt":"2025-09-20T20:28:37","slug":"gestionarea-incidentelor-de-securitate-cibernetica","status":"publish","type":"security_advisory","link":"https:\/\/delve.ro\/ro\/security-guide\/gestionarea-incidentelor-de-securitate-cibernetica\/","title":{"rendered":"Gestionarea incidentelor de securitate cibernetic\u0103"},"content":{"rendered":"<p># Gestionarea incidentelor de securitate cibernetic\u0103<\/p>\n<p>## Ce este un incident de securitate?<\/p>\n<p>Un incident de securitate este orice eveniment care compromite:<br \/>\n&#8211; Confiden\u021bialitatea datelor<br \/>\n&#8211; Integritatea sistemelor<br \/>\n&#8211; Disponibilitatea serviciilor<br \/>\n&#8211; Conformitatea cu reglement\u0103rile<\/p>\n<p>### Exemple de incidente:<br \/>\n&#8211; Malware\/ransomware detectat<br \/>\n&#8211; Cont compromis<br \/>\n&#8211; Data breach\/scurgere de date<br \/>\n&#8211; Atac DDoS<br \/>\n&#8211; Phishing reu\u0219it<br \/>\n&#8211; Acces neautorizat<br \/>\n&#8211; Pierdere\/furt dispozitiv<br \/>\n&#8211; Website defacement<\/p>\n<p>## Plan de r\u0103spuns la incidente &#8211; 6 faze<\/p>\n<p>### 1\ufe0f\u20e3 PREG\u0102TIRE (\u00eenainte de incident)<\/p>\n<p>#### Echipa de r\u0103spuns:<br \/>\n&#8211; **Incident Commander** &#8211; Coordoneaz\u0103 r\u0103spunsul<br \/>\n&#8211; **Technical Lead** &#8211; Analiz\u0103 tehnic\u0103<br \/>\n&#8211; **Communications** &#8211; Comunicare intern\u0103\/extern\u0103<br \/>\n&#8211; **Legal\/HR** &#8211; Aspecte legale \u0219i personal<br \/>\n&#8211; **Management** &#8211; Decizii strategice<\/p>\n<p>#### Documenta\u021bie necesar\u0103:<br \/>\n&#8211; Contact list 24\/7<br \/>\n&#8211; Proceduri pas-cu-pas<br \/>\n&#8211; Template-uri comunicare<br \/>\n&#8211; Forensic tools ready<br \/>\n&#8211; Backup \u0219i recovery plans<\/p>\n<p>### 2\ufe0f\u20e3 IDENTIFICARE (detectare \u0219i analiz\u0103)<\/p>\n<p>#### \u00centreb\u0103ri critice:<br \/>\n&#8211; **CE** s-a \u00eent\u00e2mplat exact?<br \/>\n&#8211; **C\u00c2ND** a \u00eenceput incidentul?<br \/>\n&#8211; **CINE** este afectat?<br \/>\n&#8211; **UNDE** \u00een infrastructur\u0103?<br \/>\n&#8211; **CUM** s-a produs?<br \/>\n&#8211; **DE CE** (root cause)?<\/p>\n<p>#### Clasificare severitate:<\/p>\n<p>**\ud83d\udfe2 LOW** &#8211; Impact minim<br \/>\n&#8211; Un utilizator afectat<br \/>\n&#8211; Date publice<br \/>\n&#8211; Servicii non-critice<\/p>\n<p>**\ud83d\udfe1 MEDIUM** &#8211; Impact moderat<br \/>\n&#8211; Departament afectat<br \/>\n&#8211; Date interne<br \/>\n&#8211; Servicii importante<\/p>\n<p>**\ud83d\udd34 HIGH** &#8211; Impact major<br \/>\n&#8211; Organiza\u021bie afectat\u0103<br \/>\n&#8211; Date confiden\u021biale<br \/>\n&#8211; Servicii critice<\/p>\n<p>**\ud83d\udfe3 CRITICAL** &#8211; Impact catastrofal<br \/>\n&#8211; Multiple organiza\u021bii<br \/>\n&#8211; Date clasificate<br \/>\n&#8211; Infrastructur\u0103 critic\u0103<\/p>\n<p>### 3\ufe0f\u20e3 CONTAINMENT (limitare r\u0103sp\u00e2ndire)<\/p>\n<p>#### Containment imediat:<br \/>\n1. Izoleaz\u0103 sistemele afectate<br \/>\n2. Blocheaz\u0103 IP\/domenii mali\u021bioase<br \/>\n3. Dezactiveaz\u0103 conturi compromise<br \/>\n4. Preserv\u0103 evidence pentru forensics<br \/>\n5. Implementeaz\u0103 workarounds<\/p>\n<p>### 4\ufe0f\u20e3 ERADICATION (eliminare amenin\u021bare)<\/p>\n<p>#### Ac\u021biuni de cur\u0103\u021bare:<br \/>\n&#8211; \u00cendep\u0103rtare malware complet<br \/>\n&#8211; \u00cenchidere vulnerabilit\u0103\u021bi<br \/>\n&#8211; Patch toate sistemele<br \/>\n&#8211; Update signatures<br \/>\n&#8211; Reset creden\u021biale<br \/>\n&#8211; Review access rights<\/p>\n<p>### 5\ufe0f\u20e3 RECOVERY (restaurare opera\u021biuni)<\/p>\n<p>#### Restaurare gradual\u0103:<br \/>\n**Faza 1: Sisteme critice**<br \/>\n&#8211; Authentication systems<br \/>\n&#8211; Email \u0219i comunica\u021bii<br \/>\n&#8211; Business critical apps<\/p>\n<p>**Faza 2: Sisteme importante**<br \/>\n&#8211; File shares<br \/>\n&#8211; Databases<br \/>\n&#8211; Internal tools<\/p>\n<p>**Faza 3: Sisteme secundare**<br \/>\n&#8211; Development<br \/>\n&#8211; Testing<br \/>\n&#8211; Archives<\/p>\n<p>### 6\ufe0f\u20e3 LESSONS LEARNED (post-incident)<\/p>\n<p>#### Review meeting (\u00een 48 ore):<br \/>\n&#8211; Ce a mers bine?<br \/>\n&#8211; Ce poate fi \u00eembun\u0103t\u0103\u021bit?<br \/>\n&#8211; Timeline complet<br \/>\n&#8211; Root cause analysis<br \/>\n&#8211; Update proceduri<br \/>\n&#8211; Training needs<\/p>\n<p>## R\u0103spuns specific pe tip incident<\/p>\n<p>### \ud83e\udda0 Ransomware<\/p>\n<p>**R\u0103spuns imediat:**<br \/>\n1. Izoleaz\u0103 INSTANT (pull network cable)<br \/>\n2. Opre\u0219te spread-ul (shutdown shares)<br \/>\n3. Identific\u0103 varianta<br \/>\n4. NU PL\u0102TI (\u00een principiu)<br \/>\n5. Preserve evidence<br \/>\n6. Notific\u0103 autorit\u0103\u021bile<\/p>\n<p>### \ud83d\udce7 Email Compromise<\/p>\n<p>**R\u0103spuns imediat:**<br \/>\n1. Reset parol\u0103 imediat<br \/>\n2. Revoke sessions<br \/>\n3. Check forwarding rules<br \/>\n4. Review sent items<br \/>\n5. Scan pentru alte compromise<br \/>\n6. Enable MFA<\/p>\n<p>### \ud83d\udcb3 Data Breach<\/p>\n<p>**R\u0103spuns imediat:**<br \/>\n1. Stop exfiltrarea<br \/>\n2. Identific\u0103 ce date<br \/>\n3. Preserve logs<br \/>\n4. Legal notification<br \/>\n5. Prepare comunicare<br \/>\n6. Credit monitoring<\/p>\n<p>**Obliga\u021bii legale (GDPR):**<br \/>\n&#8211; 72 ore notificare autorit\u0103\u021bi<br \/>\n&#8211; Notificare persoane afectate<br \/>\n&#8211; Documentare complet\u0103<br \/>\n&#8211; Remediation plan<\/p>\n<p>## Comunicare \u00een timpul crizei<\/p>\n<p>### \ud83d\udce2 Comunicare intern\u0103<\/p>\n<p>#### Template alert\u0103 intern\u0103:<br \/>\n&#8220;`<br \/>\nSUBIECT: [SEVERITY] Incident Securitate &#8211; [TYPE]<\/p>\n<p>STATUS: [Contained\/Ongoing]<br \/>\nIMPACT: [Sisteme\/Utilizatori afecta\u021bi]<br \/>\nAC\u021aIUNI: [Ce facem acum]<br \/>\nNECESIT\u0102\u021aI: [Ce avem nevoie]<br \/>\nETA: [Estimare rezolvare]<br \/>\nCONTACT: [Incident Commander]<br \/>\n&#8220;`<\/p>\n<p>## Contacte utile Rom\u00e2nia<\/p>\n<p>&#8211; **CERT-RO**: +40 21 317 48 75<br \/>\n&#8211; **DNSC**: contact@dnsc.ro<br \/>\n&#8211; **Poli\u021bia Rom\u00e2n\u0103**: 112<br \/>\n&#8211; **ANSPDCP** (GDPR): +40 318 059 211<\/p>\n<p>## Checklist post-incident<\/p>\n<p>### Tehnic:<br \/>\n&#8211; [ ] Toate sistemele curate<br \/>\n&#8211; [ ] Vulnerabilit\u0103\u021bi remediate<br \/>\n&#8211; [ ] Monitoring enhanced<br \/>\n&#8211; [ ] Backups verificate<br \/>\n&#8211; [ ] Access review complet<br \/>\n&#8211; [ ] Security tools updated<\/p>\n<p>### Procedural:<br \/>\n&#8211; [ ] Incident report complet<br \/>\n&#8211; [ ] Lessons learned session<br \/>\n&#8211; [ ] Procedure updates<br \/>\n&#8211; [ ] Training planificat<br \/>\n&#8211; [ ] Communication \u00eenchis\u0103<br \/>\n&#8211; [ ] Legal obligations \u00eendeplinite<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ce s\u0103 faci c\u00e2nd suspectezi o bre\u0219\u0103 de securitate sau un atac cibernetic.<\/p>","protected":false},"featured_media":0,"template":"","meta":[],"advisory_audience":[],"advisory_topic":[],"advisory_source":[],"advisory_severity":[],"advisory_region":[],"news_source":[],"class_list":["post-989090","security_advisory","type-security_advisory","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/security_advisory\/989090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/security_advisory"}],"about":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/types\/security_advisory"}],"version-history":[{"count":0,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/security_advisory\/989090\/revisions"}],"wp:attachment":[{"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/media?parent=989090"}],"wp:term":[{"taxonomy":"advisory_audience","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/advisory_audience?post=989090"},{"taxonomy":"advisory_topic","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/advisory_topic?post=989090"},{"taxonomy":"advisory_source","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/advisory_source?post=989090"},{"taxonomy":"advisory_severity","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/advisory_severity?post=989090"},{"taxonomy":"advisory_region","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/advisory_region?post=989090"},{"taxonomy":"news_source","embeddable":true,"href":"https:\/\/delve.ro\/ro\/wp-json\/wp\/v2\/news_source?post=989090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}