NIST 800-53 REV 5 • INCIDENT RESPONSE

IR-6(2)Vulnerabilities Related to Incidents

Report system vulnerabilities associated with reported incidents to {{ insert: param, ir-06.02_odp }}.

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Supplemental Guidance

Reported incidents that uncover system vulnerabilities are analyzed by organizational personnel including system owners, mission and business owners, senior agency information security officers, senior agency officials for privacy, authorizing officials, and the risk executive (function). The analysis can serve to prioritize and initiate mitigation actions to address the discovered system vulnerability.

Practitioner Notes

When an incident reveals a vulnerability — whether in your software, configuration, or processes — that vulnerability needs to be reported to the right people so it can be fixed and not exploited again.

Example 1: After every incident, conduct a root cause analysis that identifies any underlying vulnerabilities. Log these in your vulnerability management tool (Tenable, Qualys, or Rapid7) and assign them for remediation with priority based on the incident severity.

Example 2: Create a post-incident vulnerability report template that captures the CVE (if applicable), affected systems, how it was exploited, and recommended fixes. Submit this to your patch management team and track remediation through your change management process.