Improvements (IM)

Recovery strategies are updated


Login

Recovery Planning (RP)

Recovery plan is executed during or after a cybersecurity incident


Login

Analysis (AN)

Notifications from detection systems are investigated 


Login

Analysis (AN)

The impact of the incident is understood


Login

Analysis (AN)

Forensics are performed


Login

Analysis (AN)

Incidents are categorized consistent with response plans


Login

Analysis (AN)

Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)


Login

Communications (CO)

Personnel know their roles and order of operations when a response is needed


Login

Communications (CO)

Incidents are reported consistent with established criteria


Login

Communications (CO)

Information is shared consistent with response plans


Login