3.6.2—Incident response - Basic
>Control Description
>Discussion
Tracking and documenting system security incidents includes maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics, evaluating incident details, trends, and handling. Incident information can be obtained from a variety of sources including incident reports, incident response teams, audit monitoring, network monitoring, physical access monitoring, and user/administrator reports. Reporting incidents addresses specific incident reporting requirements within an organization and the formal incident reporting requirements for the organization.
Suspected security incidents may also be reported and include the receipt of suspicious email communications that can potentially contain malicious code. The types of security incidents reported, the content and timeliness of the reports, and the designated reporting authorities reflect applicable laws, Executive Orders, directives, regulations, and policies. [SP 800-61] provides guidance on incident handling.
>Cross-Framework Mappings
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What policies govern incident tracking, documenting, and reporting?
- •What procedures define incident documentation requirements?
- •Who is responsible for incident tracking and reporting?
- •What timelines exist for incident reporting (internal, external)?
- •What governance ensures consistent incident documentation?
Technical Implementation:
- •What incident tracking system do you use?
- •How do you automate incident logging and tracking?
- •What tools correlate incident data across systems?
- •How do you generate incident reports and metrics?
- •What mechanisms enforce incident documentation requirements?
Evidence & Documentation:
- •Can you provide incident tracking records?
- •What documentation exists for recent security incidents?
- •Can you demonstrate incident reporting to appropriate parties?
- •What incident metrics and trends are tracked?
- •What audit evidence shows incident tracking compliance?
Ask AI
Configure your API key to use AI features.