17.6
IG2 IG3

Define Mechanisms for Communicating During Incident Response

Asset Type: N/A
Security Function: Respond

Description

Determine which primary and secondary mechanisms will be used to communicate and report during a security incident. Mechanisms can include phone calls, emails, or letters. Keep in mind that certain mechanisms, such as emails, can be affected during a security incident. Review annually, or when significant enterprise changes occur that could impact this Safeguard.

Implementation Checklist

1
Define response procedures and playbooks
2
Assign response roles and responsibilities
3
Establish response timeframes and SLAs
4
Test response procedures through tabletop or simulation
5
Document lessons learned and update procedures
6
Develop incident response plan and playbooks
7
Define roles, escalation paths, and communication channels
8
Conduct tabletop exercise to validate plan
9
Establish post-incident review process
10
Configure email authentication (SPF, DKIM, DMARC)
11
Deploy email security gateway with filtering
12
Configure attachment and URL scanning

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Communication Blackout During Email System Compromise

Availability

An attacker compromises the email system during a breach, and the incident response team cannot coordinate because email was the only planned communication channel and no secondary mechanism was defined.

Sensitive Incident Details Leaked Through Insecure Channel

Confidentiality

Incident responders discuss sensitive breach details over an unsecured communication channel because no predefined secure mechanisms were established, and the attacker monitors the communications.

Vulnerabilities (When Safeguard Absent)

No Defined Communication Mechanisms for Incident Response

Without predefined primary and secondary communication channels, incident response teams have no reliable way to coordinate when standard communication systems are compromised or unavailable.

No Out-of-Band Communication Capability

Absence of a secondary communication mechanism means a single point of failure exists; if the primary channel is compromised or disrupted during an incident, coordination collapses.

Evidence Requirements

Type Evidence Item Collection Frequency
Document Response procedure/playbook documentation Reviewed bi-annually
Record Response action logs showing procedure execution Per incident
Document Incident response plan and playbooks Reviewed bi-annually
Record Incident reports and post-incident review documentation Per incident
Technical Email security configuration (SPF, DKIM, DMARC records) Verified quarterly
Document Governing policy document (current, approved, communicated) Reviewed annually

Related Policy Templates