Skip to main content

💼 RS.CO-2: Incidents are reported consistent with established criteria

  • ID: /frameworks/nist-csf-v1.1/rs-co/02

Description

Empty...

Similar

  • Sections
    • /frameworks/iso-iec-27001-2013/06/01/03
    • /frameworks/iso-iec-27001-2013/16/01/02
    • /frameworks/nist-sp-800-53-r4/au/06
    • /frameworks/nist-sp-800-53-r4/ir/06
    • /frameworks/nist-sp-800-53-r4/ir/08
  • Internal
    • ID: dec-c-ffb36608

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 ISO/IEC 27001:2013 → 💼 A.6.1.3 Contact with authoritiesno data
💼 ISO/IEC 27001:2013 → 💼 A.16.1.2 Reporting information security events910no data
💼 NIST SP 800-53 Revision 4 → 💼 AU-6 AUDIT REVIEW, ANALYSIS, AND REPORTING1022no data
💼 NIST SP 800-53 Revision 4 → 💼 IR-6 INCIDENT REPORTING3no data
💼 NIST SP 800-53 Revision 4 → 💼 IR-8 INCIDENT RESPONSE PLANno data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 NIST CSF v2.0 → 💼 RC.CO-04: Public updates on incident recovery are shared using approved methods and messaging22no data
💼 NIST CSF v2.0 → 💼 RS.CO-02: Internal and external stakeholders are notified of incidents31no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (22)

PolicyLogic CountFlagsCompliance
🛡️ AWS Account IAM Access Analyzer is not enabled for all regions🟢1🟢 x6no data
🛡️ AWS CloudTrail S3 Bucket Access Logging is not enabled.🟢1🟢 x6no data
🛡️ AWS KMS Symmetric CMK Rotation is not enabled🟢1🟢 x6no data
🛡️ AWS S3 Bucket Server Access Logging is not enabled🟢1🟢 x6no data
🛡️ AWS VPC Flow Logs are not enabled🟢1🟠 x1, 🟢 x5no data
🛡️ Azure Diagnostic Setting for Azure Key Vault is not enabled🟢⚪🟢 x2, ⚪ x1no data
🛡️ Azure PostgreSQL Flexible Server log_checkpoints Parameter is not set to ON🟢1🟢 x6no data
🛡️ Azure PostgreSQL Flexible Server log_retention_days Parameter is less than 4 days🟢1🟢 x6no data
🛡️ Azure PostgreSQL Single Server log_connections Parameter is not set to ON🟢1🟢 x6no data
🛡️ Azure PostgreSQL Single Server log_disconnections Parameter is not set to ON🟢1🟢 x6no data
🛡️ Azure SQL Server Auditing Retention is less than 90 days🟢1🟢 x6no data
🛡️ Azure Storage Blob Logging is not enabled for Read, Write, and Delete requests🟢1🟢 x6no data
🛡️ Azure Storage Queue Logging is not enabled for Read, Write, and Delete requests🟢1🟢 x6no data
🛡️ Azure Subscription Activity Log Alert for Create or Update Network Security Group does not exist🟢1🟢 x6no data
🛡️ Azure Subscription Activity Log Alert for Create or Update Security Solution does not exist🟢1🟢 x6no data
🛡️ Azure Subscription Activity Log Alert for Create Policy Assignment does not exist🟢1🟢 x6no data
🛡️ Azure Subscription Activity Log Alert for Delete Network Security Group does not exist🟢1🟢 x6no data
🛡️ Azure Subscription Activity Log Alert for Delete Policy Assignment does not exist🟢1🟢 x6no data
🛡️ Azure Subscription Activity Log Alert for Delete Security Solution does not exist🟢1🟢 x6no data
🛡️ Azure Subscription Integration With Microsoft Defender For Cloud Apps is not enabled🟢1🟢 x6no data
🛡️ Azure Subscription Security Alert Notifications additional email address is not configured🟢1🟢 x6no data
🛡️ Azure Subscription Security Alert Notifications to subscription owners are not configured🟢1🟢 x6no data

Internal Rules

RulePoliciesFlags
✉️ dec-x-0c82d7751
✉️ dec-x-8a1ecfd01
✉️ dec-x-9b79d91f1
✉️ dec-x-9c0416671
✉️ dec-x-20c9ef831
✉️ dec-x-24bba4831
✉️ dec-x-52ca19601
✉️ dec-x-89d5ed7a1
✉️ dec-x-351e376f1
✉️ dec-x-611eaa351
✉️ dec-x-1518c16e1
✉️ dec-x-79579ed71
✉️ dec-x-9002886f1
✉️ dec-x-ab7fc52e1
✉️ dec-x-b2ce0ca11
✉️ dec-x-c397d3ca2
✉️ dec-x-db1b7a1b1
✉️ dec-x-dc359e591
✉️ dec-x-e00143332