NIST Special Publication 800-53 (Rev. 4)
Security Controls and Assessment Procedures for Federal Information Systems and Organizations
IR - INCIDENT RESPONSE
P1 - Implement P1 security controls first.
- Baseline Allocation:
Documenting information system security incidents includes, for example, maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics, evaluating incident details, trends, and handling. Incident information can be obtained from a variety of sources including, for example, incident reports, incident response teams, audit monitoring, network monitoring, physical access monitoring, and user/administrator reports.
Related to: AU-6, IR-8, PE-6, SC-5, SC-7, SI-3, SI-4, SI-7
INCIDENT MONITORING | AUTOMATED TRACKING / DATA COLLECTION / ANALYSIS
The organization employs automated mechanisms to assist in the tracking of security incidents and in the collection and analysis of incident information.
Automated mechanisms for tracking security incidents and collecting/analyzing incident information include, for example, the Einstein network monitoring device and monitoring online Computer Incident Response Centers (CIRCs) or other electronic databases of incidents.