Evidence collection order

5.6 Describe concepts as documented in NIST.SP800-86

📘Cisco Certified CyberOps Associate (200-201 CBROPS)


1. What is Preparation in NIST.SP800-61?

Preparation is the first phase of the NIST Incident Response Life Cycle. Its goal is to make sure an organization is ready to respond to cyber incidents quickly and efficiently.

During preparation, you:

  1. Identify key stakeholders in the organization.
  2. Define roles and responsibilities for incident response.
  3. Ensure policies, tools, and communication methods are ready.

Think of this as setting up a “cyber emergency plan” before anything goes wrong.


2. Understanding Stakeholders

Stakeholders are people or teams in an organization who have a role in handling or supporting an incident.

Key IT Stakeholders:

StakeholderRole in IR PreparationExample in IT Environment
CISO (Chief Information Security Officer)Sets overall security strategy, approves IR planDecides which security tools (like SIEM or firewall logs) are used
IT Operations TeamMaintains systems and networksEnsures servers and networks are up and running during incidents
Security Analysts / SOC TeamDetect and analyze security incidentsMonitor SIEM dashboards for unusual logins or malware alerts
Incident Response Team / IR ManagerLeads incident responseCoordinates actions when malware or ransomware is detected
Legal / Compliance TeamEnsures adherence to laws and regulationsChecks if data breach notifications are required under GDPR
Management / ExecutivesApprove resources and decisionsAllocate budget for emergency response or for forensic tools
Communications / PR TeamHandles internal and external messagingDrafts alerts for employees or public statements in case of a breach
HR / Employee RelationsManages insider threatsAssists if a current employee is suspected of data theft
Vendors / Third-Party PartnersSupport external tools or servicesCloud provider helps recover compromised virtual machines

3. NIST IR Categories

NIST.SP800-61 defines four main IR categories where stakeholders are involved:

  1. Preparation – making the organization ready (focus of this section)
  2. Detection & Analysis – identifying the incident
  3. Containment, Eradication, and Recovery – stopping and removing threats
  4. Post-Incident Activity / Lessons Learned – improving processes

In preparation, the focus is mapping the stakeholders to their responsibilities.


4. Mapping Stakeholders to the Preparation Phase

During preparation, each stakeholder’s role is defined. Here’s how it works:

NIST IR PhaseStakeholderResponsibilities
PreparationCISOApproves IR policy, defines priorities
PreparationIR ManagerDevelops IR plan, identifies tools and workflows
PreparationSecurity Analysts / SOCPrepares monitoring rules, establishes alert thresholds
PreparationIT OpsConfigures backups, ensures patching and updates
PreparationLegal / ComplianceReviews legal requirements for breach reporting
PreparationPR / CommunicationsCreates template announcements for incidents
PreparationHRDevelops insider threat reporting procedures
PreparationVendorsConfirms support SLAs and emergency contacts

5. Tools and Processes to Prepare

In an IT environment, preparation includes:

  1. Incident Response Plan (IRP): Documented step-by-step procedures for responding to incidents.
  2. Playbooks: Pre-defined actions for common scenarios (e.g., malware infection, phishing attack).
  3. Monitoring Tools: SIEM, IDS/IPS, and antivirus systems to detect incidents.
  4. Communication Plan: Email, secure chat, or ticketing system to alert stakeholders quickly.
  5. Training & Drills: Regular exercises for stakeholders to practice incident response.

Example: A phishing email is reported → SOC analysts detect → IR manager coordinates containment → Legal ensures reporting compliance → Communications informs employees.


6. CMMC (Cybersecurity Maturity Model Certification) Alignment

CMMC requires organizations to formalize cybersecurity roles:

  • Level 2 or 3 CMMC: Must have defined IR policies and trained personnel.
  • Mapping stakeholders to IR categories demonstrates compliance with CMMC requirements.
  • This ensures auditors can see who is responsible for each incident response activity.

7. Key Points for the Exam

  • Preparation = defining people, processes, and technology before an incident.
  • Map stakeholders to IR categories clearly, showing their roles in preparation.
  • Focus on IT-related roles: SOC team, IR manager, IT operations, legal, HR, communications.
  • Use playbooks, IR plan, monitoring tools, and training as evidence of preparation.
  • Know the link to CMMC: defined roles and formalized policies support certification.

Quick Memory Tip:

“Prepare People, Prepare Process, Prepare Tools”

  • People → Stakeholders (SOC, IR team, legal, management, etc.)
  • Process → IR plan, playbooks, reporting procedures
  • Tools → SIEM, IDS/IPS, communication systems, backup systems

This covers everything you need to map organization stakeholders in the preparation phase of NIST IR for the exam.

Buy Me a Coffee