UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

IR-5 INCIDENT MONITORING


Overview

Number Title Impact Priority Subject Area
IR-5 Incident Monitoring LOW P1 Incident Response

Instructions
The organization tracks and documents information system security incidents.
Guidance
Documenting information system security incidents includes, for example, maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics, evaluating incident details, trends, and handling. Incident information can be obtained from a variety of sources including, for example, incident reports, incident response teams, audit monitoring, network monitoring, physical access monitoring, and user/administrator reports.

Enhancements
IR-5 (1) Automated Tracking / Data Collection / Analysis HIGH
Automated mechanisms for tracking security incidents and collecting/analyzing incident information include, for example, the Einstein network monitoring device and monitoring online Computer Incident Response Centers (CIRCs) or other electronic databases of incidents.

The organization employs automated mechanisms to assist in the tracking of security incidents and in the collection and analysis of incident information.