TLP (required)—assign a Traffic Light Protocol marker to an incident to define the nature of information about the incident. The default value is RED. Available values:
WHITE—disclosure is not restricted.
GREEN—disclosure is only for the community.
AMBER—disclosure is only for organizations.
RED—disclosure is only for a specific group of people.
Affected system name (required)—specify the name of the information resource where the incident occurred. You can enter up to 500,000 characters in the field.
Affected system category (required)—specify the critical information infrastructure (CII) category of your organization. If your organization does not have a CII category, select Information resource is not a CII object.
Affected system function (required)—specify the scope of activity of your organization. The value specified in RuCERT integration settings is used by default.
Location (required)—select the location of your organization from the drop-down list.
Affected system has Internet connection—select this check box if the assets related to this incident have an Internet connection. By default, this check box is cleared.
If this check box is selected, the Technical details tab is available. This tab displays information about the assets related to the incident. See below for more details.
Product info (required)—this table becomes available if you selected Notification about a detected vulnerability as the incident category.
You can use the Add new element button to add a string to the table. In the Name column, you must indicate the name of the application (for example, MS Office). Specify the application version in the Version column (for example, 2.4).
Vulnerability ID—if necessary, specify the identifier of the detected vulnerability. For example, CVE-2020-1231.
This field becomes available if you selected Notification about a detected vulnerability as the incident category.
Product category—if necessary, specify the name and version of the vulnerable product. For example, Microsoft operating systems and their components.
This field becomes available if you selected Notification about a detected vulnerability as the incident category.
If required, define the settings on the Advanced tab of the Export to RuCERT window.
The available settings on the tab depend on the selected category and type of incident:
Detection tool—specify the name of the product that was used to register the incident. For example, KUMA 1.5.
Assistance required—select this check box if you need help from GosSOPKA employees.
Incident end time—specify the date and time when the critical information infrastructure (CII object) was restored to normal operation after a computer incident, computer attack was ended, or a vulnerability was fixed.
Availability impact—assess the degree of impact that the incident had on system availability:
High
Low
None
Integrity impact—assess the degree of impact that the incident had on system integrity:
High
Low
None
Confidentiality impact—assess the degree of impact that the incident had on data confidentiality:
High
Low
None
Custom impact—specify other significant impacts from the incident.
City—indicate the city where your organization is located.
If assets are attached to the incident, you can specify their settings on the Technical details tab.
This tab is active only if you select the Affected system has Internet connection check box.
You should change or supplement the information previously specified on the Technical details tab in your personal GosSOPKA dashboard, even if the RuCERT experts request from you additional information, and you can change the exported incident.
The categories of the listed assets must match the category of the affected CII in your system.
Click Export.
Confirm the export.
Information about the incident is submitted to RuCERT, and the Export to RuCERT incident setting is changed to Exported. At RuCERT, the incident received from you is assigned a registration number and status. This information is displayed in the incident window in the RuCERT integration section.
It is possible to change the data in the exported incident only if the RuCERT experts requested additional information from you. If no additional information was requested, but you need to update the exported incident, you should do it in your GosSOPKA dashboard.
After the incident is successfully exported, the Compare KUMA incident to RuCERT data button is displayed at the bottom of the screen. When you click this button, a window opens, where the differences in the incident data between KUMA and RuCERT are highlighted.