Control: The organisation tracks and documents information system security incidents.
Incident Monitoring SupplementalGuidance:
Documenting information system security incidents includes, for example, maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics, evaluating incident details, trends, and handling. Incident information can be obtained from a variety of sources including, for example, incident reports, incident response teams, audit monitoring, network monitoring, physical access monitoring, and user/administrator reports.
Related controls: AU-6, IR-8, PE-6, SC-5, SC-7, SI-3, SI-4, SI-7.
Incident Monitoring Control Enhancements:
IR-5 (1) Incident Monitoring - Automated Tracking / Data Collection / Analysis
The organisation employs automated mechanisms to assist in the tracking of security incidents and in the collection and analysis of incident information.
Supplemental Guidance: Automated mechanisms for tracking security incidents and collecting/analysing incident information include, for example, the Einstein network monitoring device and monitoring online Computer Incident Response Centres (CIRCs) or other electronic databases of incidents.