UCF STIG Viewer Logo

Information Assurance - System Security Incidents (Identifying, Reporting, and Handling)


Overview

Finding ID Version Rule ID IA Controls Severity
V-31008 IA-03.02.01 SV-41055r2_rule VIIR-1 VIIR-2 Medium
Description
Failure to recognize, investigate and report information systems security incidents could result in the loss of confidentiality, integrity, and availability of the systems and its data.
STIG Date
Traditional Security 2013-07-11

Details

Check Text ( C-39667r4_chk )
1. Check to ensure there are written procedures for identifying, reporting, and handling systems security incidents.

2. Check to ensure that procedures for handling system security incidents are included in both initial and annual (refresher) employee training.

NOTE: Applies in a tactical environment. While procedures for incident handling might not be readily available in a mobile/field location, they should be established and available at a supporting fixed headquarters facility. Field units must still be informed and knowledgeable of their responsibility to report security incidents. This knowledge can be ascertained by asking field organization leadership what they would do in a spillage or similar computer security incident.
Fix Text (F-34815r4_fix)
A program to recognize, investigate, and report information systems security incidents to include virus, system penetration, and classified contamination must be established. Such a program will include written procedures that are available for employee review as well as including the topic in initial and annual security refresher training.