3.6.1 — Have a Plan
What It Says
Section titled “What It Says”Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities.
What It Actually Means
Section titled “What It Actually Means”You need a documented, tested incident response plan that covers six phases — each one assessed independently:
-
Preparation. Roles and responsibilities defined. Contact lists current. Tools ready. The team knows the plan exists and has read it. Includes the DFARS 252.204-7012 requirement to report cyber incidents to DIBCAC within 72 hours.
-
Detection. How incidents are identified — SIEM alerts, user reports, EDR detections, vendor notifications. Feeds from your monitoring capabilities (3.14.6) and logging (3.3.1).
-
Analysis. How you determine scope, severity, and impact. Who triages. What classification system you use (e.g., severity levels). How you determine whether CUI was affected.
-
Containment. How you stop the bleeding — isolating affected systems, blocking malicious IPs, disabling compromised accounts. Short-term and long-term containment strategies.
-
Recovery. How you restore systems to normal operation — reimaging, restoring from backups, verifying integrity. Includes validation that the threat is eliminated before reconnecting.
-
User response activities. How you communicate with affected users, management, and external parties. Includes the 72-hour DIBCAC notification and any contractual notification requirements to the prime contractor.
The plan must be more than a document — it must be an operational capability. The team must know it exists, understand their role, and have practiced it.
Pass or Fail
Section titled “Pass or Fail”Your assessor needs a “yes” to every row:
| # | Question | What “yes” looks like |
|---|---|---|
| 1 | Is an operational incident-handling capability established? | Documented IR plan with assigned team, tools, and procedures |
| 2 | Does it include preparation? | Roles, contacts, tools, DIBCAC reporting procedure documented |
| 3 | Does it include detection? | Detection sources identified — SIEM, EDR, user reports |
| 4 | Does it include analysis? | Triage procedure, severity classification, CUI impact assessment |
| 5 | Does it include containment? | Short-term and long-term containment procedures |
| 6 | Does it include recovery? | System restoration, backup recovery, integrity verification procedures |
| 7 | Does it include user response activities? | Communication plan: internal notifications, 72-hour DIBCAC reporting, prime contractor notification |
What to Have Ready on Assessment Day
Section titled “What to Have Ready on Assessment Day”Documents they’ll review: Incident response policy; incident response plan; contact lists; escalation procedures; DIBCAC reporting procedures; system security plan; training records for IR team; tabletop exercise records; any past incident records
People they’ll talk to: Personnel with incident handling responsibilities; information security personnel; management with IR oversight; anyone on the IR contact list
Live demos they’ll ask for: “Walk me through what happens when you detect a potential breach.” “Show me your IR plan. Who knows about it?” “How do you report to DIBCAC within 72 hours? Show me the procedure.”
The Assessor’s Playbook
Section titled “The Assessor’s Playbook”These are the actual questions. Have answers ready.
- “Show me your incident response plan. When was it last updated?”
- “Walk me through the six phases — preparation through user response.”
- “Who is on your IR team? Do they know their roles?”
- “How do you report to DIBCAC within 72 hours? Show me the procedure and the DIBNet portal access.”
- “Does the plan specifically address incidents involving CUI?”
- “Has the IR team been trained on this plan?”
- “Show me your escalation path — who gets notified at each severity level?”
Where Companies Trip Up
Section titled “Where Companies Trip Up”No written plan. The team knows what to do informally but nothing is documented. The assessor needs a document covering all six phases. Write it down.
Plan doesn’t address CUI. A generic IT incident response plan that never mentions CUI, DFARS 252.204-7012, or the 72-hour reporting requirement. The plan must specifically address CUI-related incidents.
Nobody knows the plan. The document exists in a SharePoint folder but the IR team hasn’t read it. Distribute it, train the team on it, and get signed acknowledgments.
No 72-hour reporting procedure. The plan covers detection through recovery but doesn’t address DIBCAC notification. Include the procedure, the DIBNet portal URL, login credentials, and who is authorized to file the report.
How to Talk About This
Section titled “How to Talk About This”Connected Requirements
Section titled “Connected Requirements”| Requirement | Why it matters here |
|---|---|
| 3.6.2 — Track and Report | Incident tracking and reporting procedures are part of this capability |
| 3.6.3 — Test the Plan | The plan established here must be tested |
| 3.14.6 — Watch the Network | Network monitoring feeds the detection phase |
| 3.3.1 — Log Everything | Audit logs provide evidence for the analysis phase |
Implementation (coming soon)
Section titled “Implementation (coming soon)”Step-by-step setup for Microsoft 365 / Entra ID, AWS, Azure, and GCP — console steps, CLI commands, and evidence screenshots.
CMMC Practice ID: IR.L2-3.6.1 | SPRS Weight: 5 points | POA&M Eligible: No