17.2
IG1 IG2 IG3

Establish and Maintain Contact Information for Reporting Security Incidents

Asset Type: N/A
Security Function: Respond

Description

Establish and maintain contact information for parties that need to be informed of security incidents. Contacts may include internal staff, third-party vendors, law enforcement, cyber insurance providers, relevant government agencies, Information Sharing and Analysis Center (ISAC) partners, or other stakeholders. Verify contacts annually to ensure that information is up-to-date.

Implementation Checklist

1
Define response procedures and playbooks
2
Assign response roles and responsibilities
3
Establish response timeframes and SLAs
4
Test response procedures through tabletop or simulation
5
Document lessons learned and update procedures
6
Develop incident response plan and playbooks
7
Define roles, escalation paths, and communication channels
8
Conduct tabletop exercise to validate plan
9
Establish post-incident review process
10
Inventory all third-party service providers
11
Classify third parties by risk level
12
Conduct security assessments of critical vendors
13
Include security requirements in contracts

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Regulatory Notification Deadline Missed After Breach

Integrity

After a data breach, the organization fails to notify required regulatory agencies within mandated timeframes because no maintained contact list exists for incident reporting parties.

Cyber Insurance Claim Denied Due to Late Notification

Availability

The organization's cyber insurance claim is denied because the insurer was not notified within the required timeframe, as the insurance provider's incident contact information was not readily available.

Law Enforcement Engagement Delayed During Active Attack

Availability

During an active ransomware attack, critical hours are lost trying to identify the correct law enforcement contacts because no pre-established contact list exists for security incident reporting.

Vulnerabilities (When Safeguard Absent)

No Maintained Contact List for Incident Reporting

Without a current list of incident reporting contacts including regulators, law enforcement, insurers, and partners, critical notifications are delayed or missed during the time-sensitive incident response phase.

Outdated Contact Information for Key Stakeholders

Absence of annual contact verification means that during an incident, the organization may attempt to reach stakeholders at outdated phone numbers or email addresses, causing communication failures.

Evidence Requirements

Type Evidence Item Collection Frequency
Document Response procedure/playbook documentation Reviewed bi-annually
Record Response action logs showing procedure execution Per incident
Document Incident response plan and playbooks Reviewed bi-annually
Record Incident reports and post-incident review documentation Per incident
Record Third-party risk assessment reports and scorecards Annually per vendor
Document Vendor contracts with security requirements Per contract cycle
Document Governing policy document (current, approved, communicated) Reviewed annually