IR-1—Policy and Procedures
>Control Description
Develop, document, and disseminate to all personnel when their unescorted logical or physical access to any information system results in the ability, right, or privilege to view, modify, or make use of unencrypted CJI: (a) Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and
Agency-level incident response policy that:
Procedures to facilitate the implementation of the incident response policy and the associated incident response controls;
Designate an individual with security responsibilities to manage the development, documentation, and dissemination of the incident response policy and procedures; and
Review and update the current incident response: 3
Policy annually and following any security incidents involving unauthorized access to CJI or systems used to process, store, or transmit CJI; and
Procedures annually and following any security incidents involving unauthorized access to CJI or systems used to process, store, or transmit CJI.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.