<?xml version="1.0" encoding="UTF-8"?><!--Serialized by the GTRI Trustmark Framework API, version: 1.4.74--><tf:TrustmarkDefinition xmlns:tf="https://trustmarkinitiative.org/specifications/trustmark-framework/1.4/schema/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ds="http://www.w3.org/2000/09/xmldsig#"><tf:Metadata><tf:Identifier>https://artifacts.trustmarkinitiative.org/lib/tds/review-and-update-of-incident-response-policy/1.0/</tf:Identifier><tf:Name>Review and Update of Incident Response Policy</tf:Name><tf:Version>1.0</tf:Version><tf:Description>Defines conformance and assessment criteria for compliance with minimum security requirements for review and update of incident response policy as related to overall incident response requirements.</tf:Description><tf:PublicationDateTime>2018-10-24T00:00:00.000Z</tf:PublicationDateTime><tf:TrustmarkDefiningOrganization><tf:Identifier>https://trustmarkinitiative.org/</tf:Identifier><tf:Name>Trustmark Initiative</tf:Name><tf:Contact><tf:Kind>PRIMARY</tf:Kind><tf:Email>help@trustmarkinitiative.org</tf:Email><tf:Telephone>404-407-8956</tf:Telephone><tf:MailingAddress>75 5th Street NW, Suite 900, Atlanta, GA 30308</tf:MailingAddress></tf:Contact></tf:TrustmarkDefiningOrganization><tf:TargetStakeholderDescription>Organizations that are interested in implementing or making use of digital information systems in a manner that complies with widely accepted information security standards and practices such as NIST Special Publication 800-53.</tf:TargetStakeholderDescription><tf:TargetRecipientDescription>Organizations that want to demonstrate that they provide and/or consume digital information services in a manner that complies with widely accepted information security standards and practices such as NIST Special Publication 800-53.</tf:TargetRecipientDescription><tf:TargetRelyingPartyDescription>Organizations and individuals that require their trusted partners' computer and information systems to comply with widely accepted information security standards and practices such as NIST Special Publication 800-53.</tf:TargetRelyingPartyDescription><tf:TargetProviderDescription>Organizations that audit or evaluate other organizations for compliance with widely accepted information security standards and practices such as NIST Special Publication 800-53.</tf:TargetProviderDescription><tf:ProviderEligibilityCriteria>Any organization or business entity may act as a Trustmark Provider for trustmarks under this Trustmark Definition.</tf:ProviderEligibilityCriteria><tf:AssessorQualificationsDescription>Any individual employed or contracted by the Trustmark Provider may act as the assessor for trustmarks under this Trustmark Definition.</tf:AssessorQualificationsDescription><tf:TrustmarkRevocationCriteria>For any trustmark issued under this Trustmark Definition, the Trustmark Provider must revoke the trustmark upon any condition whereby one or more Conformance Criteria cease to be satisfied.</tf:TrustmarkRevocationCriteria><tf:ExtensionDescription>This Trustmark Definition requires no extension data.</tf:ExtensionDescription><tf:LegalNotice>This document and the information contained herein is provided on an "AS IS" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.</tf:LegalNotice><tf:Notes></tf:Notes><tf:Keywords><tf:Keyword>Incident Response</tf:Keyword><tf:Keyword>Security</tf:Keyword><tf:Keyword>Information Assurance</tf:Keyword><tf:Keyword>NIST</tf:Keyword><tf:Keyword>800-53</tf:Keyword></tf:Keywords></tf:Metadata><tf:Terms><tf:Term><tf:Name>Accreditation</tf:Name><tf:Definition><![CDATA[The official management decision given by a senior organization official to authorize operation of an information system and to explicitly accept the risk to organization operations (including mission, functions, image, or reputation), organization assets, or individuals, based on the implementation of an agreed-upon set of security controls.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Authentication</tf:Name><tf:Definition><![CDATA[Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Authorizing Official</tf:Name><tf:Definition><![CDATA[Official with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organization operations (including mission, functions, image, or reputation), organization assets, or individuals. Synonymous with Accreditation Authority.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Availability</tf:Name><tf:Definition><![CDATA[Ensuring timely and reliable access to and use of information.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Certification</tf:Name><tf:Definition><![CDATA[A comprehensive assessment of the management, operational, and technical security controls in an information system, made in support of security accreditation, to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Confidentiality</tf:Name><tf:Definition><![CDATA[Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Environment</tf:Name><tf:Definition><![CDATA[Aggregate of external procedures, conditions, and objects affecting the development, operation, and maintenance of an information system.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Incident</tf:Name><tf:Definition><![CDATA[An occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Information</tf:Name><tf:Definition><![CDATA[An instance of an information type; data.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Information Security</tf:Name><tf:Definition><![CDATA[The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Information System</tf:Name><tf:Definition><![CDATA[A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Information Technology</tf:Name><tf:Definition><![CDATA[Any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the organization. For purposes of the preceding sentence, equipment is used by an organization if the equipment is used by the organization directly or is used by a contractor under a contract with the organization which: (i) requires the use of such equipment; or (ii) requires the use, to a significant extent, of such equipment in the performance of a service or the furnishing of a product. The term information technology includes computers, ancillary equipment, software, firmware and similar procedures, services (including support services), and related resources.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Integrity</tf:Name><tf:Definition><![CDATA[Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Management Controls</tf:Name><tf:Definition><![CDATA[The security controls (i.e., safeguards or countermeasures) for an information system that focus on the management of risk and the management of information system security.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Media</tf:Name><tf:Definition><![CDATA[Physical devices or writing surfaces including, but not limited to, magnetic tapes, optical disks, magnetic disks, Large-Scale Integration (LSI) memory chips, printouts (but not including display media) onto which information is recorded, stored, or printed within an information system.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Organization</tf:Name><tf:Definition><![CDATA[An organized body of people with a particular purpose, especially a business, society, association, government agency, etc.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Potential Impact</tf:Name><tf:Definition><![CDATA[The loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect, a serious adverse effect, or a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Records</tf:Name><tf:Definition><![CDATA[All books, papers, maps, photographs, machine-readable materials, or other documentary materials, regardless of physical form or characteristics, made or received by an organization in connection with the transaction of business and preserved or appropriate for preservation by that organization or its legitimate successor as evidence of the organization, functions, policies, decisions, procedures, operations or other activities such as legal requirements or because of the informational value of the data in them.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Risk</tf:Name><tf:Definition><![CDATA[The level of impact on organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals resulting from the operation of an information system given the potential impact of a threat and the likelihood of that threat occurring.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Risk Management</tf:Name><tf:Definition><![CDATA[The process of managing risks to organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals resulting from the operation of an information system, and includes: (i) the conduct of a risk assessment; (ii) the implementation of a risk mitigation strategy; and (iii) employment of techniques and procedures for the continuous monitoring of the security state of the information system.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Safeguards</tf:Name><tf:Definition><![CDATA[Protective measures prescribed to meet the security requirements (i.e., confidentiality, integrity, and availability) specified for an information system. Safeguards may include security features, management constraints, personnel security, and security of physical structures, areas, and devices. Synonymous with security controls and countermeasures.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Sanitization</tf:Name><tf:Definition><![CDATA[Process to remove information from media such that information recovery is not possible. It includes removing all labels, markings, and activity logs.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Security Category</tf:Name><tf:Definition><![CDATA[The characterization of information or an information system based on an assessment of the potential impact that a loss of confidentiality, integrity, or availability of such information or information system would have on organizational operations, organizational assets, or individuals.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Security Controls</tf:Name><tf:Definition><![CDATA[The management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Security Plan</tf:Name><tf:Definition><![CDATA[See System Security Plan.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Security Requirements</tf:Name><tf:Definition><![CDATA[Requirements levied on an information system that are derived from applicable laws, orders, directives, policies, standards, instructions, regulations, or procedures, or organizational mission/business case needs to ensure the confidentiality, integrity, and availability of the information being processed, stored, or transmitted.]]></tf:Definition></tf:Term><tf:Term><tf:Name>System</tf:Name><tf:Definition><![CDATA[See information system.]]></tf:Definition></tf:Term><tf:Term><tf:Name>System Security Plan</tf:Name><tf:Definition><![CDATA[Formal document that provides an overview of the security requirements for an information system and describes the security controls in place or planned for meeting those requirements.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Threat</tf:Name><tf:Definition><![CDATA[Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.]]></tf:Definition></tf:Term><tf:Term><tf:Name>User</tf:Name><tf:Definition><![CDATA[Individual or (system) process authorized to access an information system.]]></tf:Definition></tf:Term><tf:Term><tf:Name>Vulnerability</tf:Name><tf:Definition><![CDATA[Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source.]]></tf:Definition></tf:Term></tf:Terms><tf:Sources><tf:Source tf:id="Source-2112165102"><tf:Identifier>SP800-53R4</tf:Identifier><tf:Reference>NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at &lt;a href="http://dx.doi.org/10.6028/NIST.SP.800-53r4"&gt;http://dx.doi.org/10.6028/NIST.SP.800-53r4&lt;/a&gt;.</tf:Reference></tf:Source></tf:Sources><tf:ConformanceCriteria><tf:Preface><![CDATA[If conformance criteria reference organization-defined elements (e.g. &lt;organization-defined personnel or roles&gt;, &lt;organization-defined frequency&gt;, etc.), these values must be defined and documented by the organization. <br><br>Similarly, if the criteria specify a "Selection" among multiple options (e.g. [Selection (one or more): as needed; &lt;organization-defined frequency&gt;]), the option(s) implemented by the organization must also be defined and documented.]]></tf:Preface><tf:ConformanceCriterion tf:id="criterion1"><tf:Number>1</tf:Number><tf:Name>C1</tf:Name><tf:Description>The organization must review and update the current incident response policy &amp;ltorganization-defined frequency&amp;gt.</tf:Description><tf:Citation><tf:Source tf:ref="Source-2112165102" xsi:nil="true"></tf:Source><tf:Description><![CDATA[<em>Appendix F, IR-1</em>]]></tf:Description></tf:Citation></tf:ConformanceCriterion></tf:ConformanceCriteria><tf:AssessmentSteps><tf:Preface><![CDATA[If an assessment step references organization-defined elements (E.g. &ltorganization-defined personnel or roles&gt, &ltorganization-defined frequency&gt, etc.), corresponding citations/excerpts must be provided to confirm that the organization has established and documented these values and that they apply as referenced in the conformance criteria. <br><br>Similarly, if a "Selection" among multiple options (e.g. [Selection (one or more): as needed; <organization-defined frequency>]) is specified, evidence must be provided to establish that the option(s) implemented by the organization have been defined and documented.
<br><br>
The assessment step shall not be marked as satisfied without this evidence.]]></tf:Preface><tf:AssessmentStep tf:id="ReviewandUpdateofIncidentResponsePolicy"><tf:Number>1</tf:Number><tf:Name>Review and Update of Incident Response Policy</tf:Name><tf:Description>Does the organization review and update the current incident response policy &amp;ltorganization-defined frequency&amp;gt?</tf:Description><tf:ConformanceCriterion tf:ref="criterion1" xsi:nil="true"></tf:ConformanceCriterion><tf:Artifact><tf:Name>A1</tf:Name><tf:Description><![CDATA[Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.]]></tf:Description></tf:Artifact></tf:AssessmentStep></tf:AssessmentSteps><tf:IssuanceCriteria><![CDATA[yes(ALL)]]></tf:IssuanceCriteria></tf:TrustmarkDefinition>