IR · Plan wizard

Incident Response Plan

Documents how the organization prepares for, detects, contains, eradicates, recovers from, and learns from cybersecurity incidents affecting the system. Covers the controls of the IR family in NIST SP 800-53 r5 and aligns with NIST SP 800-61 r2 (Computer Security Incident Handling Guide).

1
Full official name of the information system.
Short identifier used in headings and references.
Role or named individual accountable for the system.
Describe what falls inside the authorization boundary - components, services, networks, data flows.
2
Determines which controls in this family appear in your plan.
3
Approach basics → §4.x

IRT structure, ticketing platform, and the primary detection sources that feed the team.

What the team is called and how it's structured (e.g., '24/7 SOC + on-call IRT', 'Enterprise CSIRT', 'Combined SOC/IRT under the CISO').
Tool that holds incident cases (e.g., ServiceNow Security Operations, Jira Service Management, TheHive, Demisto / Cortex XSOAR, IBM Resilient).
Brief phrase summarizing what generates incident candidates. Detail goes in the dedicated sub-section.
Brief phrase (e.g., 'CISA AIS, MS-ISAC, vendor threat feeds, internal honeypot data').
Incident Classification & Severity → §4.x

How incidents are categorized and prioritized; containment SLAs by tier.

Target time from detection to containment, by severity tier (e.g., 'Critical: 1h, High: 4h, Medium: 24h, Low: best-effort within 5 business days').
When does an incident escalate to executive leadership / AO / external IR retainer? Define triggers (severity, scope, time elapsed).
Detection Sources → §4.x

What feeds candidate incidents into the queue.

How alerts from each source land in the case-management system. Auto-promotion rules, deduplication, severity scoring.
How recurring false positives are tuned out without losing visibility into real signals. Exception-rule register and review cadence.
How users report suspected incidents (e.g., 'phishing@org email auto-feeds the queue; ServiceNow Security Incident form').
Handling Phases (NIST SP 800-61 r2) → §4.x

Preparation; Detection & Analysis; Containment, Eradication, Recovery; Post-Incident.

What's prepared in advance: jump-kit contents, known-good images, contact rosters, evidence-collection tooling.
How an alert becomes an incident: triage steps, scoping, attribution, classification. Reference SOAR playbooks if used.
Standard containment options (network isolation, account disable, host quarantine). Approval thresholds for containment that disrupts operations.
How threats are removed and systems restored. References CM-2 baseline restoration and CP backup-restore procedures.
Lessons-learned cadence (within N days of resolution), participation, and how findings drive plan revisions and POA&M items.
External Reporting & Notifications → §4.x

Who outside the organization must be notified, and on what timeline.

Mandatory timelines per recipient (e.g., 'CISA major incident: within 1 hour of declaration; PII breach: 72h GDPR / state-specific'). CISA reference: Federal Incident Notification Guidelines.
Default sensitivity marking on outbound IR communications. Most internal-IR comms start TLP:AMBER+STRICT.
Role responsible for external messaging (typically Public Affairs / Comms in coordination with Legal and the IRT).
Training and Exercises → §4.x

Role-based training cadence and exercise programs (IR-2, IR-3).

How findings from exercises and real incidents are tracked to closure (POA&M? Internal tracker?). Cadence for re-validating closure.
Information Spillage Response (IR-9) → §4.x

Process for handling unauthorized disclosure of classified or controlled information.

Categories of information whose disclosure triggers spillage response (CUI / FOUO / classified / PII / PHI / etc.) and the threshold for declaration.
Steps when spillage is suspected or confirmed: containment (isolate affected systems), notification chain, scope assessment, sanitization plan, retention of evidence.
How affected systems / storage are sanitized per NIST SP 800-88 r1. Reference MP-6 if applicable.
Role responsible for coordinating spillage response (often the ISSO + Privacy Officer for PII).
IRT Scope and Membership → §2.x

Who's on the team and how they're contacted.

Order of magnitude (e.g., '~10 analysts across 3 tiers').
What systems and populations the team covers (single system vs enterprise).
How users / on-call engineers reach the IRT (e.g., 'PagerDuty service ir-soc; phishing@org for low-priority reports').
Third-party IR firm on retainer for surge support (e.g., Mandiant, CrowdStrike Services, Unit 42).
Incident Response Metrics & KPIs → §6.x

Metrics tracked to demonstrate IR control effectiveness over time.

    Suggested:
    Threat Intelligence Consumption → §6.x

    Sources, ingestion, and IOC sweeping cadence.

    How indicators flow from feeds into detection (TIP, MISP, direct SIEM watchlist, EDR threat-feed import).
    How often historical logs are searched for newly-published indicators (e.g., 'Daily for high-priority feeds; weekly comprehensive sweep').
    Cross-references to other RMF artifacts → §7

    Where this plan plugs into the broader RMF package.

    Where in the SSP the IR control implementations are summarized (e.g., 'SSP §13.6').
    Convention for IR-related POA&M items (e.g., 'POAM-IR-').
    How audit records and SIEM detections from the AU plan feed incident detection. SIEM index, log sources, retention.
    How system-monitoring (SI-4), malware protection (SI-3), and integrity verification (SI-7) generate IR signals.
    How recovery from incidents coordinates with the contingency plan's restoration procedures.
    Pointer to the CA-7 monitoring strategy document tying IR continuous-monitoring metrics to the broader ConMon plan.
    4

    Pick a baseline in section 2 and the applicable controls will appear here. Each control gets a card with the official text, related controls, linked CCIs, and fields for your implementation status, narrative, responsible role, and evidence.

    5