National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

NIST Special Publication 800-53 (Rev. 4)

Security Controls and Assessment Procedures for Federal Information Systems and Organizations

IR-7 INCIDENT RESPONSE ASSISTANCE

Family:
IR - INCIDENT RESPONSE
Class:
Priority:
P2 - Implement P2 security controls after implementation of P1 controls.
Baseline Allocation:
Low Moderate High
IR-7 IR-7 (1) IR-7 (1)

Control Description

The organization provides an incident response support resource, integral to the organizational incident response capability that offers advice and assistance to users of the information system for the handling and reporting of security incidents.

Supplemental Guidance

Incident response support resources provided by organizations include, for example, help desks, assistance groups, and access to forensics services, when required.

Related to: AT-2IR-4IR-6IR-8SA-9

Control Enhancements

IR-7(1) INCIDENT RESPONSE ASSISTANCE | AUTOMATION SUPPORT FOR AVAILABILITY OF INFORMATION / SUPPORT
The organization employs automated mechanisms to increase the availability of incident response-related information and support.
Supplemental Guidance: Automated mechanisms can provide a push and/or pull capability for users to obtain incident response assistance. For example, individuals might have access to a website to query the assistance capability, or conversely, the assistance capability may have the ability to proactively send information to users (general distribution or targeted) as part of increasing understanding of current response capabilities and support.
IR-7(2) INCIDENT RESPONSE ASSISTANCE | COORDINATION WITH EXTERNAL PROVIDERS
The organization:
IR-7 (2)(a)
Establishes a direct, cooperative relationship between its incident response capability and external providers of information system protection capability; and
IR-7 (2)(b)
Identifies organizational incident response team members to the external providers.
Supplemental Guidance: External providers of information system protection capability include, for example, the Computer Network Defense program within the U.S. Department of Defense. External providers help to protect, monitor, analyze, detect, and respond to unauthorized activity within organizational information systems and networks.

References

None.