As South Africa’s digital infrastructure shifts from hardware firewalls to cloud security, new security and reporting requirements from the Information Regulator have sparked an urgent need for updated governance frameworks. As organisations face an expanding attack surface, businesses require more robust security systems to prevent breaches and effective policies to respond to cybersecurity incidents. Standardised incident response frameworks like the National Institute of Standards and Technology (NIST) SP 800-61 framework and the ISO/IEC 27035 framework provide global best practices for dealing with data breaches.
The Central University of Technology (CUT) addresses the South African skills gap through its fully online Postgraduate Diploma in Information Technology, designed to equip professionals with the capabilities required to navigate complex containment and recovery cycles.
The NIST incident response framework, known as SP800-61, forms part of the larger NIST Cybersecurity Framework (CSF 2.0). It is a widely adopted guide favoured for its actionable and technical depth. It conceptualises the lifecycle as a continuous four-phase loop:
While NIST is technical, ISO/IEC 27035 is governance-oriented and aligns with the larger ISO/IEC 27001 security framework. It follows five phases:
A unique feature is the formal assessment step to determine if an "event" constitutes an "incident", ensuring that legal and regulatory notification requirements are considered early.
Comparison table for NIST SP 800-61 and ISO/IEC 27035
|
Feature |
NIST SP 800-61 |
ISO/IEC 27035 |
|
Lifecycle |
4 Phases (Cyclical) |
5 Phases (Sequential/Iterative) |
|
Audience |
Technical IR teams / SOC |
Management and auditors |
|
Focus |
Technical actions / Playbooks |
Governance and decision-making |
In South Africa, the choice of framework is increasingly dictated by the Protection of Personal Information Act (POPIA). Section 22 mandates that if there are "reasonable grounds" to believe personal information has been accessed by an unauthorised person, the responsible party must notify the Information Regulator and the data subject.
Under POPIA, there is no "high-risk" threshold; all compromises must be reported irrespective of the perceived risk. As of April 2025, organisations must use the Information Regulator's mandatory eServices portal for reporting. This environment requires security management that bridges technical triggers with legal obligations.
Mature organisations achieve resilience by synthesising frameworks into incident response best practices. Key technical measures include:
The Postgraduate Diploma in Information Technology at CUT provides the theoretical and practical depth needed for incident response leadership. The curriculum includes:
By mastering incident response, graduates of the postgraduate diploma are empowered to protect South Africa's future cybersecurity systems.
A security event is an identified occurrence that indicates a possible breach or a failure of controls. An incident is an event that has been assessed and confirmed as threatening business operations or information security.
NIST groups these together into Phase 3 because these activities often occur simultaneously or iteratively during a crisis. For example, a team may eradicate threats in one segment while still containing threats in another.
Yes. POPIA has no risk threshold for reporting. Any unauthorised access to personal information must be reported to the Information Regulator and affected subjects as soon as reasonably possible.
It provides context about known attackers and techniques. Integrating threat intelligence allows teams to prioritise alerts and predict an adversary's next moves during a breach.
Best practices suggest at least an annual tabletop exercise. Reviews should also follow major IT changes or actual incidents to incorporate "lessons learned".