SI-4(24): Indicators Of Compromise

Threats Addressed:


(Not part of any baseline)

Next Version:

Control Statement

The information system discovers, collects, distributes, and uses indicators of compromise.

Supplemental Guidance

Indicators of compromise (IOC) are forensic artifacts from intrusions that are identified on organizational information systems (at the host or network level). IOCs provide organizations with valuable information on objects or information systems that have been compromised. IOCs for the discovery of compromised hosts can include for example, the creation of registry key values. IOCs for network traffic include, for example, Universal Resource Locator (URL) or protocol elements that indicate malware command and control servers. The rapid distribution and adoption of IOCs can improve information security by reducing the time that information systems and organizations are vulnerable to the same exploit or attack.