Posted on Nov 26, 2016
New cyber incident notification guidelines take effect April 1
1.53K
9
2
6
6
0
Posted 8 y ago
Responses: 2
Thanks SFC Joe S. Davis Jr., MSM, DSL. I had to chuckle when I read that the U.S. Computer Emergency Readiness Team (US-CERT) is implementing new reporting requirements beginning on April Fools Day 2017. I trust this is not a joke but a serious announcement, unless US-CERT has been hacked :-)
In any event thanks for letting us know the basics:
"When notifying US-CERT, agencies and organizations should be sure to include:
•The current level of impact on agency functions or services.
•The type of information lost, compromised or corrupted.
•The scope of time and resources needed to recover from the incident.
•When the activity was first detected.
•The number of systems, records and users impacted.
•The network location of the observed activity.
•A point of contact information for additional follow-up.
If known, identify the attack vector(s) that led to the incident and provide any indicators of compromise, including signatures or detection measures developed in relationship to the incident, as well as any mitigation activities undertaken in response to the incident.
A complete list of mandates and deliverables can be viewed on the US-CERT website and questions can be emailed to [login to see] . "
LTC Stephen C. Capt Seid Waddell CW5 (Join to see) CW5 Charlie Poulton SGM David W. Carr LOM, DMSM MP SGT SFC William Farrell SSgt Robert Marx SSG James J. Palmer IV aka "JP4" SSgt (Join to see) TSgt Joe C. SGT (Join to see) SGT John " Mac " McConnell SP5 Mark Kuzinski SGT Forrest Stewart SGT Robert Hawks SPC (Join to see) SrA Christopher Wright
In any event thanks for letting us know the basics:
"When notifying US-CERT, agencies and organizations should be sure to include:
•The current level of impact on agency functions or services.
•The type of information lost, compromised or corrupted.
•The scope of time and resources needed to recover from the incident.
•When the activity was first detected.
•The number of systems, records and users impacted.
•The network location of the observed activity.
•A point of contact information for additional follow-up.
If known, identify the attack vector(s) that led to the incident and provide any indicators of compromise, including signatures or detection measures developed in relationship to the incident, as well as any mitigation activities undertaken in response to the incident.
A complete list of mandates and deliverables can be viewed on the US-CERT website and questions can be emailed to [login to see] . "
LTC Stephen C. Capt Seid Waddell CW5 (Join to see) CW5 Charlie Poulton SGM David W. Carr LOM, DMSM MP SGT SFC William Farrell SSgt Robert Marx SSG James J. Palmer IV aka "JP4" SSgt (Join to see) TSgt Joe C. SGT (Join to see) SGT John " Mac " McConnell SP5 Mark Kuzinski SGT Forrest Stewart SGT Robert Hawks SPC (Join to see) SrA Christopher Wright
(2)
(0)
Read This Next