compliance controls are associated with this Policy definition 'Establish relationship between incident response capability and external providers' (b470a37a-7a47-3792-34dd-7a793140702e)
Control Domain |
Control |
Name |
MetadataId |
Category |
Title |
Owner |
Requirements |
Description |
Info |
Policy# |
FedRAMP_High_R4 |
IR-7(2) |
FedRAMP_High_R4_IR-7(2) |
FedRAMP High IR-7 (2) |
Incident Response |
Coordination With External Providers |
Shared |
n/a |
The organization:
(a) Establishes a direct, cooperative relationship between its incident response capability and external providers of information system protection capability; and
(b) Identifies organizational incident response team members to the external providers.
Supplemental Guidance: External providers of information system protection capability include, for example, the Computer Network Defense program within the U.S. Department of Defense. External providers help to protect, monitor, analyze, detect, and respond to unauthorized activity within organizational information systems and networks. |
link |
2 |
FedRAMP_Moderate_R4 |
IR-7(2) |
FedRAMP_Moderate_R4_IR-7(2) |
FedRAMP Moderate IR-7 (2) |
Incident Response |
Coordination With External Providers |
Shared |
n/a |
The organization:
(a) Establishes a direct, cooperative relationship between its incident response capability and external providers of information system protection capability; and
(b) Identifies organizational incident response team members to the external providers.
Supplemental Guidance: External providers of information system protection capability include, for example, the Computer Network Defense program within the U.S. Department of Defense. External providers help to protect, monitor, analyze, detect, and respond to unauthorized activity within organizational information systems and networks. |
link |
2 |
hipaa |
1504.06e1Organizational.34-06.e |
hipaa-1504.06e1Organizational.34-06.e |
1504.06e1Organizational.34-06.e |
15 Incident Management |
1504.06e1Organizational.34-06.e 06.01 Compliance with Legal Requirements |
Shared |
n/a |
Management approves the use of information assets and takes appropriate action when unauthorized activity occurs. |
|
16 |
hipaa |
1505.11a1Organizational.13-11.a |
hipaa-1505.11a1Organizational.13-11.a |
1505.11a1Organizational.13-11.a |
15 Incident Management |
1505.11a1Organizational.13-11.a 11.01 Reporting Information Security Incidents and Weaknesses |
Shared |
n/a |
A formal security incident response program has been established to respond, report (without fear of repercussion), escalate and treat breaches and reported security events or incidents. Organization-wide standards are specified for the time required for system administrators and other personnel to report anomalous events to the incident handling team, the mechanisms for such reporting, and the kind of information that should be included in the incident notification. This reporting includes notifying internal and external stakeholders, the appropriate community Computer Emergency Response Team, and law enforcement agencies in accordance with all legal or regulatory requirements for involving such organizations in computer incidents. |
|
19 |
hipaa |
1523.11c3Organizational.24-11.c |
hipaa-1523.11c3Organizational.24-11.c |
1523.11c3Organizational.24-11.c |
15 Incident Management |
1523.11c3Organizational.24-11.c 11.02 Management of Information Security Incidents and Improvements |
Shared |
n/a |
Incidents are promptly reported to the appropriate authorities and outside parties (e.g., FedCIRC, CERT/CC). |
|
4 |
NIST_SP_800-53_R4 |
IR-7(2) |
NIST_SP_800-53_R4_IR-7(2) |
NIST SP 800-53 Rev. 4 IR-7 (2) |
Incident Response |
Coordination With External Providers |
Shared |
n/a |
The organization:
(a) Establishes a direct, cooperative relationship between its incident response capability and external providers of information system protection capability; and
(b) Identifies organizational incident response team members to the external providers.
Supplemental Guidance: External providers of information system protection capability include, for example, the Computer Network Defense program within the U.S. Department of Defense. External providers help to protect, monitor, analyze, detect, and respond to unauthorized activity within organizational information systems and networks. |
link |
2 |
NIST_SP_800-53_R5 |
IR-7(2) |
NIST_SP_800-53_R5_IR-7(2) |
NIST SP 800-53 Rev. 5 IR-7 (2) |
Incident Response |
Coordination with External Providers |
Shared |
n/a |
(a) Establish a direct, cooperative relationship between its incident response capability and external providers of system protection capability; and
(b) Identify organizational incident response team members to the external providers. |
link |
2 |
|
op.exp.7 Incident management |
op.exp.7 Incident management |
404 not found |
|
|
|
n/a |
n/a |
|
103 |
SWIFT_CSCF_v2022 |
11.4 |
SWIFT_CSCF_v2022_11.4 |
SWIFT CSCF v2022 11.4 |
11. Monitor in case of Major Disaster |
Ensure an adequate escalation of operational malfunctions in case of customer impact. |
Shared |
n/a |
Ensure an adequate escalation of operational malfunctions in case of customer impact. |
link |
14 |
SWIFT_CSCF_v2022 |
11.5 |
SWIFT_CSCF_v2022_11.5 |
SWIFT CSCF v2022 11.5 |
11. Monitor in case of Major Disaster |
Effective support is offered to customers in case they face problems during their business hours. |
Shared |
n/a |
Effective support is offered to customers in case they face problems during their business hours. |
link |
10 |