{"id":1215,"date":"2024-07-17T18:07:19","date_gmt":"2024-07-17T18:07:19","guid":{"rendered":"https:\/\/www.tarleton.edu\/security-controls-catalog\/?page_id=1215"},"modified":"2024-09-06T20:45:17","modified_gmt":"2024-09-06T20:45:17","slug":"ir-4-incident-handling","status":"publish","type":"page","link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/incident-response-ir\/ir-4-incident-handling\/","title":{"rendered":"IR-4: Incident Handling"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-large-font-size\">IR-4: Incident Handling<\/h1>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>NIST Baseline: &nbsp;<\/strong>Low&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>Privacy Baseline:<\/strong> &nbsp;Yes&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>DIR Required By: &nbsp;<\/strong>07\/20\/2023&nbsp;<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:16px\"><strong>Review Date: &nbsp;<\/strong>07\/10\/2024&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list its-nested-list\">\n<li>Information resource owners and custodians, in coordination with the Tarleton State University (Tarleton) Chief Information Security Officer (CISO), shall ensure that documented incident handling procedures are developed within each unit that addresses:&nbsp;\n<ul class=\"wp-block-list\">\n<li>Implementing an incident handling capability for incidents consistent with the incident response plan and includes preparation, detection and analysis, containment, eradication, and recovery.&nbsp;<\/li>\n\n\n\n<li>Coordinating incident handling activities with information system recovery and reconstitution planning activities with both internal and external incident response providers, as applicable; and;&nbsp;<\/li>\n\n\n\n<li>Incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing\/exercises, and implements the resulting changes accordingly.&nbsp;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>The Tarleton CISO, or their designee, will coordinate the information security handling capabilities for Tarleton.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator alignfull has-text-color has-tarleton-purple-color has-alpha-channel-opacity has-tarleton-purple-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">References\/Additional Resources<\/h3>\n\n\n\n<p><a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=23\" target=\"_blank\" rel=\"noreferrer noopener\">1 TAC \u00a7 202.23(b)<\/a>&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/texreg.sos.state.tx.us\/public\/readtac$ext.TacPage?sl=R&amp;app=9&amp;p_dir=&amp;p_rloc=&amp;p_tloc=&amp;p_ploc=&amp;pg=1&amp;p_tac=&amp;ti=1&amp;pt=10&amp;ch=202&amp;rl=73\" target=\"_blank\" rel=\"noreferrer noopener\">1 TAC \u00a7 202.73(b)<\/a>&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/statutes.capitol.texas.gov\/Docs\/BC\/htm\/BC.521.htm#521.053:~:text=Sec.%20521.053.%20%20NOTIFICATION%20REQUIRED%20FOLLOWING%20BREACH%20OF%20SECURITY%20OF%20COMPUTERIZED%20DATA.\" target=\"_blank\" rel=\"noreferrer noopener\">Section 512.053, Business and Commerce Code<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IR-4: Incident Handling NIST Baseline: &nbsp;Low&nbsp; Privacy Baseline: &nbsp;Yes&nbsp; DIR Required By: &nbsp;07\/20\/2023&nbsp; Review Date: &nbsp;07\/10\/2024&nbsp; References\/Additional Resources 1 TAC \u00a7 202.23(b)&nbsp;&nbsp; 1 TAC \u00a7 202.73(b)&nbsp;&nbsp; Section 512.053, Business and &#8230;<\/p>\n","protected":false},"author":1,"featured_media":580,"parent":1404,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-1215","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/www.tarleton.edu\/security-controls-catalog\/author\/brian-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-3\/","display_name":"brian"},"relative_dates":{"created":"Posted 2 years ago","modified":"Updated 2 years ago"},"absolute_dates":{"created":"Posted on July 17, 2024","modified":"Updated on September 6, 2024"},"absolute_dates_time":{"created":"Posted on July 17, 2024 6:07 pm","modified":"Updated on September 6, 2024 8:45 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1215","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/comments?post=1215"}],"version-history":[{"count":0,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1215\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/pages\/1404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/security-controls-catalog\/wp-json\/wp\/v2\/media?parent=1215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}