Skip to main content
NetStable
Level 2 IR.L2-3.6.2

Track, document, and report incidents to designated officials

πŸ“– What This Means

This practice requires organizations to systematically track, document, and report security incidents to designated officials. It ensures that incidents are properly recorded, analyzed, and escalated to the right people for timely response. For example, if an employee notices suspicious activity on their workstation, they must report it through the correct channels, and the incident must be logged with details like the date, time, and nature of the issue. Another example is a phishing email that bypasses filtersβ€”it should be documented, analyzed, and reported to prevent future occurrences. This practice helps maintain accountability and ensures incidents don’t go unnoticed or unaddressed.

🎯 Why It Matters

Failing to track and report incidents can lead to delayed responses, allowing threats to escalate and cause significant damage. For instance, in 2020, the SolarWinds breach went undetected for months, resulting in widespread data theft. Proper incident tracking could have mitigated the impact. For DoD contractors, this control is critical because it ensures that incidents affecting Controlled Unclassified Information (CUI) are promptly addressed, reducing the risk of data breaches and compliance violations. Without this practice, organizations risk financial losses, reputational damage, and losing DoD contracts.

βœ… How to Implement

  1. Enable logging and monitoring in your cloud environment (e.g., AWS CloudTrail, Azure Monitor).
  2. Create a centralized incident tracking system (e.g., Jira, ServiceNow) with predefined workflows.
  3. Set up alerts for suspicious activities (e.g., unauthorized access attempts).
  4. Train staff to report incidents using the designated system.
  5. Regularly review and update incident reports for accuracy.
  6. Integrate cloud logs with SIEM tools (e.g., Splunk, Sumo Logic) for comprehensive tracking.
  7. Conduct quarterly incident response drills to ensure readiness.
⏱️
Estimated Effort
2-3 days for initial setup (basic skills required); ongoing maintenance requires 2-4 hours monthly.

πŸ“‹ Evidence Examples

Incident Response Policy

Format: PDF/DOCX
Frequency: Annually or when updated.
Contents: Roles, procedures, escalation paths, and reporting requirements.
Collection: Export from document management system.

Incident Logs

Format: CSV/Excel
Frequency: Monthly.
Contents: Incident ID, date/time, description, severity, resolution.
Collection: Export from ticketing system or SIEM.

Training Records

Format: PDF/Excel
Frequency: Annually.
Contents: Employee names, training dates, topics covered.
Collection: Export from Learning Management System (LMS).

Incident Report

Format: PDF/DOCX
Frequency: Per incident.
Contents: Detailed analysis of a specific incident.
Collection: Generated post-incident.

SIEM Screenshot

Format: PNG/JPG
Frequency: Per incident.
Contents: Evidence of incident detection and alerts.
Collection: Capture from SIEM dashboard.

πŸ“ SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For IR.L2-3.6.2 ("Track, document, and report incidents to designated officials"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your incident response capability, including the IR plan, team structure, detection mechanisms, response procedures, reporting obligations (DIBNET), and testing schedule. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"IR.L2-3.6.2 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to track, document, and report incidents to designated officials. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"IR.L2-3.6.2 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to track, document, and report incidents to designated officials. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"IR.L2-3.6.2 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • β€’ Identify detection capabilities monitoring the CUI boundary
  • β€’ Document incident communication channels and escalation paths
  • β€’ Specify DIBNET reporting process for CUI incidents
  • β€’ Ensure this control covers all systems within your defined CUI boundary where track, document, and report incidents to designated officials applies
  • β€’ Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • πŸ“„ Incident Response Policy and Plan
  • πŸ“„ IRT roster and contact information
  • πŸ“„ Tabletop exercise reports
  • πŸ“„ Incident reports (if any)
  • πŸ“„ Evidence artifacts specific to IR.L2-3.6.2
  • πŸ“„ POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will review your IR plan for completeness, verify the IRT can be assembled, check for evidence of regular testing (tabletop exercises), and confirm DIBNET reporting capability.

πŸ’¬ Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Do you have a documented incident response policy?

βœ… YES β†’ Proceed to Q2.
❌ NO β†’ GAP: Develop and document an incident response policy within 2 weeks.
Remediation:
Use templates from NIST SP 800-61 or CMMC guidelines.

Question 2: Are all incidents logged in a centralized system?

βœ… YES β†’ Proceed to Q3.
❌ NO β†’ GAP: Implement a ticketing system (e.g., Jira, Zendesk) within 1 month.
Remediation:
Train staff on using the system.

Question 3: Are designated officials notified of incidents promptly?

βœ… YES β†’ Proceed to Q4.
❌ NO β†’ GAP: Update escalation procedures in the IR policy within 2 weeks.
Remediation:
Define clear escalation paths.

Question 4: Are incident logs reviewed regularly for completeness?

βœ… YES β†’ Proceed to Q5.
❌ NO β†’ GAP: Schedule monthly log reviews starting immediately.
Remediation:
Assign responsibility to a specific team member.

Question 5: Do you conduct incident response training annually?

βœ… YES β†’ Compliance confirmed.
❌ NO β†’ GAP: Schedule training within the next quarter.
Remediation:
Use NIST or CMMC training materials.

⚠️ Common Mistakes (What Auditors Flag)

1. Incomplete incident logs.

Why this happens: Employees fail to document all details.
How to avoid: Provide training and use standardized templates.

2. Lack of escalation procedures.

Why this happens: Policy does not define escalation paths.
How to avoid: Update IR policy with clear escalation steps.

3. Untested incident response process.

Why this happens: Organization assumes process works without testing.
How to avoid: Conduct annual incident response drills.

4. No centralized logging system.

Why this happens: Reliance on manual processes.
How to avoid: Implement a ticketing system or SIEM.

5. Failure to notify designated officials.

Why this happens: Lack of awareness or oversight.
How to avoid: Automate notifications using tools like PagerDuty.

πŸ“š Parent Policy

This practice is governed by the Incident Response Policy

View IR Policy β†’

πŸ“š Related Controls