IR-6: Incident Reporting
Control Family:
PF v1.0 References:
Next Version:
- NIST Special Publication 800-53 Revision 5:
- IR-6: Incident Reporting
Control Statement
The organization:
- Requires personnel to report suspected security incidents to the organizational incident response capability within [Assignment: organization-defined time period]; and
- Reports security incident information to [Assignment: organization-defined authorities].
Supplemental Guidance
The intent of this control is to address both specific incident reporting requirements within an organization and the formal incident reporting requirements for federal agencies and their subordinate organizations. Suspected security incidents include, for example, the receipt of suspicious email communications that can potentially contain malicious code. The types of security incidents reported, the content and timeliness of the reports, and the designated reporting authorities reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Current federal policy requires that all federal agencies (unless specifically exempted from such requirements) report security incidents to the United States Computer Emergency Readiness Team (US-CERT) within specified time frames designated in the US-CERT Concept of Operations for Federal Cyber Security Incident Handling.
Control Enhancements
IR-6(1): Automated Reporting
Baseline(s):
- Moderate
- High
The organization employs automated mechanisms to assist in the reporting of security incidents.
IR-6(2): Vulnerabilities Related To Incidents
Baseline(s):
The organization reports information system vulnerabilities associated with reported security incidents to [Assignment: organization-defined personnel or roles].
IR-6(3): Coordination With Supply Chain
Baseline(s):
The organization provides security incident information to other organizations involved in the supply chain for information systems or information system components related to the incident.