Under active development Content is continuously updated and improved

IR-5Incident Monitoring

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Track and document incidents.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Documenting incidents includes maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics as well as evaluating incident details, trends, and handling. Incident information can be obtained from a variety of sources, including network monitoring, incident reports, incident response teams, user complaints, supply chain partners, audit monitoring, physical access monitoring, and user and administrator reports. IR-4 provides information on the types of incidents that are appropriate for monitoring.

>Programmatic Queries

Beta

Related Services

CloudWatch
Security Hub
EventBridge

CLI Commands

List CloudWatch dashboards
aws cloudwatch list-dashboards
Get Security Hub insight results
aws securityhub get-insight-results --insight-arn ARN
List EventBridge rules for security
aws events list-rules --name-prefix security
Check GuardDuty findings trend
aws guardduty get-findings-statistics --detector-id DETECTOR_ID --finding-statistic-types COUNT_BY_SEVERITY

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of IR-5 (Incident Monitoring)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring IR-5?
  • How frequently is the IR-5 policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures IR-5 requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce IR-5 requirements.
  • What automated tools, systems, or technologies are deployed to implement IR-5?
  • How is IR-5 integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce IR-5 requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of IR-5?
  • What audit logs, records, reports, or monitoring data validate IR-5 compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of IR-5 effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate IR-5 compliance?

Ask AI

Configure your API key to use AI features.