Back

Include how incident response fits into the organization in the incident response plan.


CONTROL ID
14294
CONTROL TYPE
Establish/Maintain Documentation
CLASSIFICATION
Preventive

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Establish, implement, and maintain an incident response plan., CC ID: 12056

There are no implementation support Controls.


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • Under CPS 234, an APRA-regulated entity's information security response plans must include mechanisms for managing all relevant stages of an incident. These typically include: (73., APRA Prudential Practice Guide CPG 234 Information Security, June 2019)
  • managing all relevant stages of an incident, from detection to post-incident review; and (25.(a), Australian Prudential Regulation Authority Prudential Standard CPS 234 Information Security, CPS 234 – 1)
  • emergency organization and responsibilities; (8.2 ¶ 4 Bullet 8, ISO 14004:2016, Environmental management systems — General guidelines on implementation, Third Edition)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., StateRAMP Security Controls Baseline Summary Category 1, Version 1.1)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., StateRAMP Security Controls Baseline Summary Category 2, Version 1.1)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., StateRAMP Security Controls Baseline Summary Category 3, Version 1.1)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., StateRAMP Security Controls Baseline Summary High Sensitivity Level, Version 1.1)
  • Program requirement. Each financial institution or creditor that offers or maintains one or more covered accounts must develop and implement a written Identity Theft Prevention Program (Program) that is designed to detect, prevent, and mitigate identity theft in connection with the opening of a cove… (§ 248.201 (d)(1), 17 CFR Part 248 Subpart C, Regulation S-ID - Identity Theft Red Flags)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3. High Baseline Controls, FedRAMP Baseline Security Controls, 8/28/2018)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3. Moderate Baseline Controls, FedRAMP Baseline Security Controls, 8/28/2018)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3. Low Baseline Controls, FedRAMP Baseline Security Controls, 8/28/2018)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., FedRAMP Security Controls High Baseline, Version 5)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., FedRAMP Security Controls Low Baseline, Version 5)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., FedRAMP Security Controls Moderate Baseline, Version 5)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, High Impact Baseline, October 2020)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, Low Impact Baseline, October 2020)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, Moderate Impact Baseline, October 2020)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., Control Baselines for Information Systems and Organizations, NIST SP 800-53B, Privacy Control Baseline, October 2020)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Baseline Controls)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Flow Down Controls)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 2 Controls)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 3 Controls)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3. Low Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3. Moderate Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3. High Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, High Impact Baseline, Revision 4)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Low Impact Baseline, Revision 4)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Moderate Impact Baseline, Revision 4)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Revision 4)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5.1.1)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., TX-RAMP Security Controls Baseline Level 1)
  • Provides a high-level approach for how the incident response capability fits into the overall organization; (IR-8a.3., TX-RAMP Security Controls Baseline Level 2)