Thursday, April 24, 2025
HomeCyber Security NewsCISA Proposes National Cyber Incident Response Plan

CISA Proposes National Cyber Incident Response Plan

Published on

SIEM as a Service

Follow Us on Google News

The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a proposed update to the National Cyber Incident Response Plan (NCIRP), inviting public feedback on the draft.

This highly anticipated revision, outlined in a pre-decisional public comment draft released this month, aims to address the evolving cybersecurity landscape amidst increasing threats to critical infrastructure, national security, and public safety.

The updated NCIRP builds on the 2016 version, aligning with the 2023 National Cybersecurity Strategy and Presidential Policy Directive 41 (PPD-41) to provide a robust framework for coordinating national responses to significant cyber incidents.

- Advertisement - Google News

The plan integrates lessons learned from past incidents, changes in federal law and policy, and emerging organizational capabilities.

Free Webinar on Best Practices for API vulnerability & Penetration Testing:  Free Registration

Key Features of the Updated Plan

The NCIRP provides a flexible, high-level framework for managing cyber incidents across federal, state, local, tribal, and territorial (SLTT) governments, the private sector, and international partners.

It identifies four central “lines of effort” to guide responses: Asset Response, Threat Response, Intelligence Support, and Affected Entity Response.

Lead agencies such as CISA, the Federal Bureau of Investigation (FBI), the Department of Justice, and the Office of the Director of National Intelligence (ODNI) are designated to oversee these efforts.

Notably, the plan emphasizes a coordinated approach using two primary bodies: the Cyber Response Group (CRG) for policy guidance and awareness and the Cyber Unified Coordination Group (Cyber UCG) for operational coordination.

Additionally, the plan introduces a revised Cyber Incident Severity Schema to assess and escalate response efforts systematically.

The updated NCIRP delineates a lifecycle approach to cyber incident management, split into two main phases: Detection and Response.

During the Detection phase, stakeholders collaborate to monitor, analyze, and validate incidents, ensuring a shared understanding of their scale and impact.

The Response phase focuses on containment, eradication, and recovery efforts while supporting law enforcement and intelligence activities to attribute and hold perpetrators accountable.

National Preparedness and Stakeholder Engagement

CISA emphasizes that the revised NCIRP is adaptable and encourages private sector entities and SLTT governments to incorporate its framework into their cyber preparedness planning.

The plan also outlines guidelines for voluntary cyber incident reporting, further promoting collaboration across the public and private sectors.

Comprehensive planning and preparedness remain cornerstones of the NCIRP. CISA plans to support additional initiatives, including sector-specific annexes, tailored guidance for SLTT entities, and regular plan revisions based on emerging threats and lessons learned.

The draft NCIRP seeks to foster a “unity of effort” across diverse stakeholders, recognizing that no single entity can address the multifaceted challenges posed by cyber incidents.

This initiative underscores the federal government’s commitment to strengthening national resilience against increasingly sophisticated cyber threats.

Public comments on the draft will remain open through January 2025, marking a crucial step toward finalizing a plan that aims to ensure a coordinated and effective national response to future cyber incidents.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...