NIST 800-171 Incident Response Plan & Reporting Requirements

Contents

One thing is hard to argue in today’s complex cyber world:

Cyber incidents are part of doing business.

Chances are, your organization’s data will be—or already has been—breached. With 92% of malware delivered by email, it’s no surprise that cyber incidents that expose sensitive data are spreading like wildfire.

Most organizations focus on mitigation: you remove viruses, launch employee “don’t click” training programs, and try to secure your network from hackers.

Free Download: NIST 800-171 Incident Response Plan Template

But what is your organization doing to be ready when the inevitable happens?

In this article, I’m going to explain how incident response safeguards your organization as well as discuss NIST incident response requirements.

By the end, you’ll have a better understanding of incident reporting and compliance requirements, how they apply to NIST, and what DoD contractors are required to report in the event of a cyber incident.

Free Incident Response Policy

Skip the policy-writing hassle with our ready-to-use incident response policy template.

IT Security Policy Templates

What Is An Incident Response Plan?

Are you prepared to successfully respond to security incidents, whether they stem from malware, distributed denial-of-service (DDoS) attacks, stolen passwords, or lost laptops?

It’s one thing to have security efforts in place to protect your data, but it’s another to have incident response planning in place.

what is an incident response planAn incident response plan is a set of instructions designed to help IT staff identify, respond to, and recover from a security incident.

This plan refers to the scope of measures to be taken during an incident, not the details of the incident itself.

A response plan for an incident is the instruction that the response team follows when an event occurs.

An incident response plan protects sensitive data from a security breach, just as contingency plans ensure the continuity of business processes and services during a malfunction.

Learn More: The Security Incident Response Lifecycle Explained

NIST Incident Response Requirements

Incident response is one of the 14 requirements outlined in the National Institute of Standards and Technology’s (NIST) Special Publication (SP) 800-171—Protecting Controlled Unclassified Information (CUI) in Nonfederal Information Systems and Organizations and enforced by the U.S. Department of Defense (DoD).

If your organization contracts for the government, you must implement all of these requirements and security controls.

Simply put, if you do not comply, you risk losing your contracts, costing your organization millions of dollars in lost revenue.

$35/MO PER DEVICE

Enterprise Security Built For Small Business

Defy your attackers with Defiance XDR™, a fully managed security solution delivered in one affordable subscription plan.

What Is A Security Incident?

A security incident is defined as actions taken through the use of computer networks that result in a compromise or an actual or potentially adverse effect on an information system and/or the information residing therein.

Incident Reporting Compliance Requirements

According to NIST SP 800-171 section 3.6, the Incident Response family of security requirements focuses on establishing an operational incident-handling capability for organizational information systems that includes adequate:

  • Preparation
  • Detection
  • Analysis
  • Containment
  • Recovery
  • User response

You must acquire a medium assurance certificate to access the reporting site. So, this is the first step.

Cyber incidents that impact a system within the scope of Defense Acquisition Regulations System (DFARS) must be reported within 72 hours of detection.

To report cyber incidents, you must have a medium assurance certificate. A review must be conducted so that the scope of the compromise can be understood.

At a minimum, this review must cover:

  • Identification of affected systems
  • Affected users accounts
  • Affected data
  • Other systems that might have been compromised

Who Should Report And Why?

  • DoD contractors report cyber incidents in accordance with the DFARS Clause 252.204-7012
  • DoD contractors report in accordance with other reporting requirements identified in a contract or other agreement
  • DoD Cloud Service Providers report cyber incidents in accordance with clause 252.239-7010, Cloud Computing Services
  • DoD’s Defense Industrial Base Cybersecurity Program (DIB CS) Participants report cyber incidents in accordance with the Framework Agreement (FA)

The DoD has the right to request further information in order to investigate the cyber incident.

To this end, the contractor:

  • Should take images of affected systems and any relevant monitoring/packet capture data for at least 90 days from the submission of the cyber incident report to allow the DoD to request the media or decline interest.
  • Provide access to the DoD to carry out forensic analysis.
  • Work with the DoD to provide any additional information that is required to complete the investigation.

What Do DoD Contractors Need To Report?

DoD contractors shall report as much of the following information as can be obtained to DoD within 72 hours of discovery of any cyber incident:

  1. Company name
  2. Company point of contact information (address, position, telephone, email)
  3. Data Universal Numbering System (DUNS) Number
  4. Contract number(s) or other type of agreement affected or potentially affected
  5. Contracting Officer or other type of agreement point of contact (address, position, telephone, email)
  6. USG Program Manager point of contact (address, position, telephone, email)
  7. Contract or other type of agreement clearance level (Unclassified, Confidential, Secret, Top Secret, Not applicable)
  8. Facility CAGE code
  9. Facility Clearance Level (Unclassified, Confidential, Secret, Top Secret, Not applicable)
  10. Impact to Covered Defense Information
  11. Ability to provide operationally critical support
  12. Date incident discovered
  13. Location(s) of compromise
  14. Incident location CAGE code
  15. DoD programs, platforms or systems involved
  16. Type of compromise (unauthorized access, unauthorized release (includes inadvertent release), unknown, not applicable)
  17. Description of technique or method used in cyber incident
  18. Incident outcome (successful compromise, failed attempt, unknown)
  19. Incident/Compromise narrative
  20. Any additional information

Free Security Policy Templates

Get a step ahead of your cybersecurity goals with our comprehensive templates.

IT Security Policy Templates

Report the Fire Before It Spreads

While you may be doing what you can to prevent cyber fires from spreading and causing damage, there are procedures to follow to report the fire.

If your clothes catch on fire, we all know about “Stop, Drop, and Roll.” In the case of cyber incidents, it’s more like “Stop, Assess, and Report.”

Knowing and implementing the NIST 800-171 requirements—all 14 of them including incident response —is not only a good way to mitigate risk and minimize data exposure but critical to maintaining your organization’s compliance and status with the federal government.

Article by

Picture of Joshua Selvidge
Joshua Selvidge
Joshua is a diversely-skilled cybersecurity professional with over a decade of cybersecurity experience previously working for the Department of Defense.

Related Content

Picture of Joshua Selvidge
Joshua Selvidge
Joshua is a diversely-skilled cybersecurity professional with over a decade of cybersecurity experience previously working for the Department of Defense.

Share This Article

Our Editorial Process

Our content goes through a rigorous approval process which is reviewed by cybersecurity experts – ensuring the quality and accuracy of information published.

Categories

.

The Breach Report

Our team of security researchers analyze recent cyber attacks, explain the impact, and provide actionable steps to keep you ahead of the trends.