Under active development Content is continuously updated and improved

IR-6Incident Reporting

LI-SaaS
Low
Moderate
High

>Control Description

a

Require personnel to report suspected incidents to the organizational incident response capability within organization-defined time period; and

b

Report incident information to organization-defined authorities.

>FedRAMP Baseline Requirements

Parameter Values

a
US-CERT incident reporting timelines as specified in NIST Special Publication 800-61 (as amended)

Additional Requirements and Guidance

IR-6 Requirement: Reports security incident information according to the guidance in the FedRAMP Continuous Monitoring Playbook.

>Discussion

The types of incidents reported, the content and timeliness of the reports, and the designated reporting authorities reflect applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Incident information can inform risk assessments, control effectiveness assessments, security requirements for acquisitions, and selection criteria for technology products.

>Cross-Framework Mappings

>Programmatic Queries

Beta

Related Services

SNS
Security Hub
EventBridge

CLI Commands

List SNS topics for alerts
aws sns list-topics
Check SNS subscriptions
aws sns list-subscriptions-by-topic --topic-arn ARN
List EventBridge targets
aws events list-targets-by-rule --rule RULE_NAME
Check Security Hub actions
aws securityhub list-automation-rules

>Relevant Technologies

Technology-specific guidance with authoritative sources and verification commands.

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of IR-6 (Incident Reporting)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring IR-6?
  • How frequently is the IR-6 policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures IR-6 requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce IR-6 requirements.
  • What automated tools, systems, or technologies are deployed to implement IR-6?
  • How is IR-6 integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce IR-6 requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of IR-6?
  • What audit logs, records, reports, or monitoring data validate IR-6 compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of IR-6 effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate IR-6 compliance?

Ask AI

Configure your API key to use AI features.