IR-2(3)—Breach
>Control Description
>Cross-Framework Mappings
>Supplemental Guidance
For federal agencies, an incident that involves personally identifiable information is considered a breach. A breach results in the loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or a similar occurrence where a person other than an authorized user accesses or potentially accesses personally identifiable information or an authorized user accesses or potentially accesses such information for other than authorized purposes. The incident response training emphasizes the obligation of individuals to report both confirmed and suspected breaches involving information in any medium or form, including paper, oral, and electronic.
Incident response training includes tabletop exercises that simulate a breach. See IR-02(01).
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of IR-2(3) (Breach)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring IR-2(3)?
- •How frequently is the IR-2(3) policy reviewed and updated, and what triggers policy changes?
- •What governance structure ensures IR-2(3) requirements are consistently applied across all systems?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce IR-2(3) requirements.
- •What automated tools, systems, or technologies are deployed to implement IR-2(3)?
- •How is IR-2(3) integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce IR-2(3) requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of IR-2(3)?
- •What audit logs, records, reports, or monitoring data validate IR-2(3) compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of IR-2(3) effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate IR-2(3) compliance?
Ask AI
Configure your API key to use AI features.