Monday, January 20, 2025
HomeCyber Security NewsCISA Proposes National Cyber Incident Response Plan

CISA Proposes National Cyber Incident Response Plan

Published on

SIEM as a Service

Follow Us on Google News

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a proposed update to the National Cyber Incident Response Plan (NCIRP), inviting public feedback on the draft.

This highly anticipated revision, outlined in a pre-decisional public comment draft released this month, aims to address the evolving cybersecurity landscape amidst increasing threats to critical infrastructure, national security, and public safety.

The updated NCIRP builds on the 2016 version, aligning with the 2023 National Cybersecurity Strategy and Presidential Policy Directive 41 (PPD-41) to provide a robust framework for coordinating national responses to significant cyber incidents.

The plan integrates lessons learned from past incidents, changes in federal law and policy, and emerging organizational capabilities.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

Key Features of the Updated Plan

The NCIRP provides a flexible, high-level framework for managing cyber incidents across federal, state, local, tribal, and territorial (SLTT) governments, the private sector, and international partners.

It identifies four central “lines of effort” to guide responses: Asset Response, Threat Response, Intelligence Support, and Affected Entity Response.

Lead agencies such as CISA, the Federal Bureau of Investigation (FBI), the Department of Justice, and the Office of the Director of National Intelligence (ODNI) are designated to oversee these efforts.

Notably, the plan emphasizes a coordinated approach using two primary bodies: the Cyber Response Group (CRG) for policy guidance and awareness and the Cyber Unified Coordination Group (Cyber UCG) for operational coordination.

Additionally, the plan introduces a revised Cyber Incident Severity Schema to assess and escalate response efforts systematically.

The updated NCIRP delineates a lifecycle approach to cyber incident management, split into two main phases: Detection and Response.

During the Detection phase, stakeholders collaborate to monitor, analyze, and validate incidents, ensuring a shared understanding of their scale and impact.

The Response phase focuses on containment, eradication, and recovery efforts while supporting law enforcement and intelligence activities to attribute and hold perpetrators accountable.

National Preparedness and Stakeholder Engagement

CISA emphasizes that the revised NCIRP is adaptable and encourages private sector entities and SLTT governments to incorporate its framework into their cyber preparedness planning.

The plan also outlines guidelines for voluntary cyber incident reporting, further promoting collaboration across the public and private sectors.

Comprehensive planning and preparedness remain cornerstones of the NCIRP. CISA plans to support additional initiatives, including sector-specific annexes, tailored guidance for SLTT entities, and regular plan revisions based on emerging threats and lessons learned.

The draft NCIRP seeks to foster a “unity of effort” across diverse stakeholders, recognizing that no single entity can address the multifaceted challenges posed by cyber incidents.

This initiative underscores the federal government’s commitment to strengthening national resilience against increasingly sophisticated cyber threats.

Public comments on the draft will remain open through January 2025, marking a crucial step toward finalizing a plan that aims to ensure a coordinated and effective national response to future cyber incidents.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Apple Confirms Removal of TikTok App US Users

Apple has confirmed that popular apps developed by ByteDance Ltd., including TikTok, will no...

Pumakit – Sophisticated Linux Rootkit That Persist Even After Reboots

Pumakit is a sophisticated rootkit that leverages system call interception to manipulate file and...

FunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims In December

FunkSec is a RaaS operator that makes use of artificial intelligence and demonstrates how...

Threat Actor IntelBroker Allegedly Claiming Breach of Hewlett Packard Enterprise Data

A threat actor known as IntelBroker has taken to a prominent dark web forum...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Apple Confirms Removal of TikTok App US Users

Apple has confirmed that popular apps developed by ByteDance Ltd., including TikTok, will no...

Pumakit – Sophisticated Linux Rootkit That Persist Even After Reboots

Pumakit is a sophisticated rootkit that leverages system call interception to manipulate file and...

FunkSec Ransomware Dominating Ransomware Attacks, Compromised 85 Victims In December

FunkSec is a RaaS operator that makes use of artificial intelligence and demonstrates how...