CMMC Practice IR.2.092: Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities.
CMMC CLARIFICATION (Ref CMMC – Appendix B)
Incident handling should include activities that prepare your organization to respond to incidents. These activities may include the following:
- identify people inside and outside your organization you may need to contact during an incident;
- establish a way to report incidents, such as an email address or a phone number;
- establish a system for tracking incidents; and
- determine a place and a way to store evidence of an incident.
You may need software and hardware to analyze incidents when they occur. You should also consider incident prevention activities as part of your incident-handling capability. The incident handling team provides input for such things as risk assessments and training.
Your organization should detect incidents in different ways. Use indicators to detect incidents. Indicators are things that don’t look like what you expect. Examples include:
- alerts from your sensors or antivirus software;
- a filename that looks unusual; and
- a log entry that raises concern.
After you detect an incident, you should analyze it to decide what to do. To analyze an incident, you need to know what should be occurring on your network and what should not. This will help you determine when an incident may have occurred. It may also help you decide what to do about it. You should also document what you know about the incident. Include all the log entries associated with the incident in your documentation.
Containment of the incident is important. This stops the damage the incident is causing to your network. You should base the containment activities you do off your incident analysis. These activities can include:
- disconnecting a system from the internet; and
- changing firewall settings to stop an attack.
Recovery activities are things to fix that caused the incident. This will help prevent the incident happening again. Recovery activities also include things that fix the affected systems, including:
- restoring backup data; and
- reinstalling software.
User response activities include:
- performing a lessons-learned analysis;
- deciding if you should contact the police; and
- updating any policy or plans as a result of after incident analysis.