incident-response Controls
21 controls across 4 frameworks.
CISA CPG
Credentials are revoked immediately on known or suspected compromise
Account Security / Account Security
An incident response plan is documented and maintained
Response and Recovery / Response and Recovery
Incident response roles and contacts are designated and current
Response and Recovery / Response and Recovery
Incident response exercises are conducted at least annually
Response and Recovery / Response and Recovery
HIPAA
NIST CSF
The estimated impact and scope of adverse events are understood
Detect / Adverse Event Analysis
Information on adverse events is provided to authorized staff and tools
Detect / Adverse Event Analysis
Incidents are declared when adverse events meet the defined criteria
Detect / Adverse Event Analysis
Cybersecurity roles and responsibilities for suppliers and partners are established and coordinated
Govern / Cybersecurity Supply Chain Risk Management
Relevant suppliers are included in incident planning, response, and recovery activities
Govern / Cybersecurity Supply Chain Risk Management
Incident response plans and cybersecurity plans are established, maintained, and improved
Identify / Improvement
Recovery activities and progress in restoring operational capabilities are communicated to designated internal and external stakeholders
Recover / Incident Recovery Communication
Public updates on the incident and ongoing recovery are shared using approved methods and messaging
Recover / Incident Recovery Communication
The integrity of restored assets is verified, the asset is deemed secure, and normal operating status is confirmed
Recover / Incident Recovery Plan Execution
Forensics are performed
Respond / Incident Analysis
Execute the incident response plan in coordination with relevant third parties
Respond / Incident Management
Incidents are contained
Respond / Incident Mitigation
Incidents are eradicated
Respond / Incident Mitigation
SOC2
Detected security incidents are evaluated and classified
Security / System Operations
Security incidents are responded to and contained
Security / System Operations
Incidents are recovered from and resumption of operations is documented
Security / System Operations