Skip to content

3.6.1 — Have a Plan

Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities.

You need a documented, tested incident response plan that covers six phases — each one assessed independently:

  1. Preparation. Roles and responsibilities defined. Contact lists current. Tools ready. The team knows the plan exists and has read it. Includes the DFARS 252.204-7012 requirement to report cyber incidents to DIBCAC within 72 hours.

  2. Detection. How incidents are identified — SIEM alerts, user reports, EDR detections, vendor notifications. Feeds from your monitoring capabilities (3.14.6) and logging (3.3.1).

  3. Analysis. How you determine scope, severity, and impact. Who triages. What classification system you use (e.g., severity levels). How you determine whether CUI was affected.

  4. Containment. How you stop the bleeding — isolating affected systems, blocking malicious IPs, disabling compromised accounts. Short-term and long-term containment strategies.

  5. Recovery. How you restore systems to normal operation — reimaging, restoring from backups, verifying integrity. Includes validation that the threat is eliminated before reconnecting.

  6. User response activities. How you communicate with affected users, management, and external parties. Includes the 72-hour DIBCAC notification and any contractual notification requirements to the prime contractor.

The plan must be more than a document — it must be an operational capability. The team must know it exists, understand their role, and have practiced it.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Is an operational incident-handling capability established?Documented IR plan with assigned team, tools, and procedures
2Does it include preparation?Roles, contacts, tools, DIBCAC reporting procedure documented
3Does it include detection?Detection sources identified — SIEM, EDR, user reports
4Does it include analysis?Triage procedure, severity classification, CUI impact assessment
5Does it include containment?Short-term and long-term containment procedures
6Does it include recovery?System restoration, backup recovery, integrity verification procedures
7Does it include user response activities?Communication plan: internal notifications, 72-hour DIBCAC reporting, prime contractor notification

Documents they’ll review: Incident response policy; incident response plan; contact lists; escalation procedures; DIBCAC reporting procedures; system security plan; training records for IR team; tabletop exercise records; any past incident records

People they’ll talk to: Personnel with incident handling responsibilities; information security personnel; management with IR oversight; anyone on the IR contact list

Live demos they’ll ask for: “Walk me through what happens when you detect a potential breach.” “Show me your IR plan. Who knows about it?” “How do you report to DIBCAC within 72 hours? Show me the procedure.”


These are the actual questions. Have answers ready.

  • “Show me your incident response plan. When was it last updated?”
  • “Walk me through the six phases — preparation through user response.”
  • “Who is on your IR team? Do they know their roles?”
  • “How do you report to DIBCAC within 72 hours? Show me the procedure and the DIBNet portal access.”
  • “Does the plan specifically address incidents involving CUI?”
  • “Has the IR team been trained on this plan?”
  • “Show me your escalation path — who gets notified at each severity level?”

No written plan. The team knows what to do informally but nothing is documented. The assessor needs a document covering all six phases. Write it down.

Plan doesn’t address CUI. A generic IT incident response plan that never mentions CUI, DFARS 252.204-7012, or the 72-hour reporting requirement. The plan must specifically address CUI-related incidents.

Nobody knows the plan. The document exists in a SharePoint folder but the IR team hasn’t read it. Distribute it, train the team on it, and get signed acknowledgments.

No 72-hour reporting procedure. The plan covers detection through recovery but doesn’t address DIBCAC notification. Include the procedure, the DIBNet portal URL, login credentials, and who is authorized to file the report.



RequirementWhy it matters here
3.6.2 — Track and ReportIncident tracking and reporting procedures are part of this capability
3.6.3 — Test the PlanThe plan established here must be tested
3.14.6 — Watch the NetworkNetwork monitoring feeds the detection phase
3.3.1 — Log EverythingAudit logs provide evidence for the analysis phase

🔒

Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.

Start a conversation →

CMMC Practice ID: IR.L2-3.6.1 | SPRS Weight: 5 points | POA&M Eligible: No