Map the organization stakeholders against the NIST IR categories (CMMC, NIST.SP800-61)

📘Cisco Certified CyberOps Associate (200-201 CBROPS)


1️⃣ Understanding the NIST IR Categories (from NIST.SP800-61)

The NIST Special Publication 800-61 defines four main stages of incident response. Every organization’s stakeholders have different roles in these stages. Knowing who is responsible for what is key.

The four stages are:

  1. Preparation – Getting ready before an incident happens.
  2. Detection & Analysis – Finding out if an incident occurred and understanding it.
  3. Containment, Eradication, and Recovery – Limiting damage, removing the threat, and restoring systems.
  4. Post-Incident Activity (Lessons Learned) – Reviewing what happened and improving security.

2️⃣ Who are the Organization Stakeholders?

In an IT environment, the stakeholders include:

  • Executive Management / Leadership
    • CEO, CIO, CISO – decision-makers who approve budgets, policies, and strategic actions.
  • IT / Security Operations Team
    • SOC analysts, network engineers, system admins – handle day-to-day security monitoring and incident response.
  • Legal & Compliance Team
    • Lawyers, compliance officers – ensure the organization follows laws, regulations, and contracts (like CMMC requirements).
  • Human Resources (HR)
    • Handles internal employee issues, such as insider threats or policy violations.
  • Public Relations / Communications
    • Manages communication with customers, partners, or media if there’s a breach.
  • External Partners / Vendors
    • Managed service providers, cloud providers – help in incident containment or recovery.

3️⃣ Mapping Stakeholders to NIST IR Stages

Here’s a simple table that shows which stakeholders are involved in each stage:

NIST IR StagePrimary StakeholdersRoles in IT Context
PreparationExecutive Management, IT/Sec Ops, LegalDefine incident response policies, implement security tools, ensure compliance with CMMC and NIST requirements, train staff on security procedures
Detection & AnalysisIT/Sec Ops, SOC AnalystsMonitor systems (SIEM, IDS/IPS), detect anomalies, analyze logs, classify incidents, alert leadership if severe
Containment, Eradication, RecoveryIT/Sec Ops, External Vendors, Executive ManagementContain malware, remove threats, restore systems from backups, approve critical recovery decisions
Post-Incident ActivityExecutive Management, IT/Sec Ops, Legal, HRReview incident reports, update policies, perform audits, recommend security improvements, handle HR/legal actions if needed

4️⃣ Key Points to Remember for the Exam

  1. Executive management is mostly strategic – approving plans, budgets, and policies. They may not handle technical tasks directly.
  2. IT and SOC teams are tactical – they respond directly to incidents, analyze data, and recover systems.
  3. Legal/Compliance is critical for regulatory requirements like CMMC (Cybersecurity Maturity Model Certification). They ensure reporting meets federal or industry standards.
  4. HR is involved if the incident involves internal users (like insider threats).
  5. Post-incident lessons learned is everyone’s responsibility – it’s about improving security for next time.

5️⃣ IT-Relevant Examples (without real-life physical analogies)

  • Preparation: IT implements a firewall and endpoint protection, creates an incident response plan, and trains SOC analysts on phishing detection.
  • Detection & Analysis: SOC sees unusual outbound traffic and analyzes logs to determine if it’s a ransomware attack.
  • Containment, Eradication, Recovery: IT isolates affected servers, removes malware, restores from backups, and ensures systems are secure before reconnecting to the network.
  • Post-Incident Activity: The IT team documents what happened, updates detection rules, management reviews the budget for better tools, and compliance ensures reporting to regulators is done correctly.

Exam Tip: For the Cisco CyberOps exam, focus on which stakeholders are responsible at each stage, and how their roles connect to IT incident response activities, especially regarding compliance with NIST.SP800-61 and CMMC.

Buy Me a Coffee