MIL1 requirements
a. Detected cybersecurity events are reported to a specified person or role and documented, at least in an ad hoc manner
MIL2 requirements
b. Criteria are established for cybersecurity event detection (for example, what constitutes a cybersecurity event, where to look for cybersecurity events)
c. Cybersecurity events are documented based on the established criteria
MIL3 requirements
d. Event information is correlated to support incident analysis by identifying patterns, trends, and other common features
e. Cybersecurity event detection activities are adjusted based on identified risks and the organization’s threat profile (THREAT-2e)
f. Situational awareness for the function is monitored to support the identification of cybersecurity events
The organization shall ensure that clear persons are assigned to incident management responsibilities, e.g. handling the first response for incidents.
Incident management personnel need to be instructed and trained to understand the organization's priorities in dealing with security incidents.
The organization has defined a process and the team involved in responding promptly to security incidents and deciding on the appropriate actions.
The first level response process includes at least:
The organization shall determine what security events it monitors and in what ways.
Security events should be monitored from a variety of sources to identify important potential incidents that require a response. Information can be obtained e.g. directly from the management system, external partners, or logs generated by the organization’s equipment.
Examples of security incidents that can be monitored include: