IR-5: INCIDENT MONITORING
TAILORED FOR INDUSTRIAL CONTROL SYSTEMS
ICS Control Baselines:
- Low
- Moderate
- High
The organization tracks and documents information system security incidents.
SUPPLEMENTAL GUIDANCE
Documenting information system security incidents includes, for example, maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics, evaluating incident details, trends, and handling. Incident information can be obtained from a variety of sources including, for example, incident reports, incident response teams, audit monitoring, network monitoring, physical access monitoring, and user/administrator reports.
ICS SUPPLEMENTAL GUIDANCE
No ICS Supplemental Guidance.
RELATED CONTROLS: IR-5
CONTROL ENHANCEMENTS
IR-5 (1) INCIDENT MONITORING | AUTOMATED TRACKING / DATA COLLECTION / ANALYSIS
ISC Control Baseline:
- High
The organization employs automated mechanisms to assist in the tracking of security incidents and in the collection and analysis of incident information.
Supplemental Guidance:
Automated mechanisms for tracking security incidents and collecting/analyzing incident information include, for example, the Einstein network monitoring device and monitoring online Computer Incident Response Centers (CIRCs) or other electronic databases of incidents.
No ICS Supplemental Guidance.
RELATED CONTROLS: IR-5 (1)
REFERENCES:
- NIST Special Publication 800-82
- NIST Special Publication 800-61