IR-8(1)—Breaches
PRIVACY
>Control Description
Include the following in the Incident Response Plan for breaches involving personally identifiable information:
a. A process to determine if notice to individuals or other organizations, including oversight organizations, is needed;
b. An assessment process to determine the extent of the harm, embarrassment, inconvenience, or unfairness to affected individuals and any mechanisms to mitigate such harms; and
c. Identification of applicable privacy requirements.
>Cross-Framework Mappings
>Supplemental Guidance
Organizations may be required by law, regulation, or policy to follow specific procedures relating to breaches, including notice to individuals, affected organizations, and oversight bodies; standards of harm; and mitigation or other specific requirements.
>Related Controls
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of IR-8(1) (Breaches)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring IR-8(1)?
- •How frequently is the IR-8(1) policy reviewed and updated, and what triggers policy changes?
- •What governance structure ensures IR-8(1) requirements are consistently applied across all systems?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce IR-8(1) requirements.
- •What automated tools, systems, or technologies are deployed to implement IR-8(1)?
- •How is IR-8(1) integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce IR-8(1) requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of IR-8(1)?
- •What audit logs, records, reports, or monitoring data validate IR-8(1) compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of IR-8(1) effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate IR-8(1) compliance?
Ask AI
Configure your API key to use AI features.