Skip to main content

πŸ’Ό IR-4 Incident Handling

  • Contextual name: πŸ’Ό IR-4 Incident Handling
  • ID: /frameworks/nist-sp-800-53-r5/ir/04
  • Located in: πŸ’Ό IR Incident Response

Description​

a. Implement an incident handling capability for incidents that is consistent with the incident response plan and includes preparation, detection and analysis, containment, eradication, and recovery; b. Coordinate incident handling activities with contingency planning activities; c. Incorporate lessons learned from ongoing incident handling activities into incident response procedures, training, and testing, and implement the resulting changes accordingly; and d. Ensure the rigor, intensity, scope, and results of incident handling activities are comparable and predictable across the organization.

Similar​

  • Internal
    • ID: dec-c-7f432267

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό IR-4 Incident Handling (L)(M)(H)5
πŸ’Ό FedRAMP Low Security Controls β†’ πŸ’Ό IR-4 Incident Handling (L)(M)(H)
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.AE-02: Potentially adverse events are analyzed to better understand associated activities26
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.AE-03: Information is correlated from multiple sources26
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.AE-06: Information on adverse events is provided to authorized staff and tools33
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό DE.AE-08: Incidents are declared when adverse events meet the defined incident criteria
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-01: Improvements are identified from evaluations10
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-02: Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties23
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό ID.IM-03: Improvements are identified from execution of operational processes, procedures, and activities24
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RC.CO-03: Recovery activities and progress in restoring operational capabilities are communicated to designated internal and external stakeholders
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RC.CO-04: Public updates on incident recovery are shared using approved methods and messaging23
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RC.RP-01: The recovery portion of the incident response plan is executed once initiated from the incident response process2
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RC.RP-02: Recovery actions are selected, scoped, prioritized, and performed2
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RC.RP-06: The end of incident recovery is declared based on criteria, and incident-related documentation is completed
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RS.AN-03: Analysis is performed to establish what has taken place during an incident and the root cause of the incident
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RS.AN-06: Actions performed during an investigation are recorded, and the records' integrity and provenance are preserved
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RS.AN-07: Incident data and metadata are collected, and their integrity and provenance are preserved
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RS.AN-08: An incident's magnitude is estimated and validated
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RS.CO-02: Internal and external stakeholders are notified of incidents30
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RS.CO-03: Information is shared with designated internal and external stakeholders17
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RS.MA-02: Incident reports are triaged and validated22
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RS.MA-03: Incidents are categorized and prioritized
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RS.MA-04: Incidents are escalated or elevated as needed
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RS.MA-05: The criteria for initiating incident recovery are applied
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RS.MI-01: Incidents are contained7
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό RS.MI-02: Incidents are eradicated7

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό IR-4(1) Incident Handling _ Automated Incident Handling Processes
πŸ’Ό IR-4(2) Incident Handling _ Dynamic Reconfiguration
πŸ’Ό IR-4(3) Incident Handling _ Continuity of Operations
πŸ’Ό IR-4(4) Incident Handling _ Information Correlation
πŸ’Ό IR-4(5) Incident Handling _ Automatic Disabling of System
πŸ’Ό IR-4(6) Incident Handling _ Insider Threats
πŸ’Ό IR-4(7) Incident Handling _ Insider Threats β€” Intra-organization Coordination
πŸ’Ό IR-4(8) Incident Handling _ Correlation with External Organizations
πŸ’Ό IR-4(9) Incident Handling _ Dynamic Response Capability
πŸ’Ό IR-4(10) Incident Handling _ Supply Chain Coordination
πŸ’Ό IR-4(11) Incident Handling _ Integrated Incident Response Team
πŸ’Ό IR-4(12) Incident Handling _ Malicious Code and Forensic Analysis
πŸ’Ό IR-4(13) Incident Handling _ Behavior Analysis
πŸ’Ό IR-4(14) Incident Handling _ Security Operations Center
πŸ’Ό IR-4(15) Incident Handling _ Public Relations and Reputation Repair