The Sector CSIRT Framework: Developing Sector-Based Incident Response Capabilities
The Sector CSIRT Framework: Developing Sector-Based Incident Response Capabilities
The Sector CSIRT Framework: Developing Sector-Based Incident Response Capabilities
June 2021
TECHNICAL REPORT
CMU/SEI-2021-TR-002
DOI: 10.1184/R/10.1184/R1/13624148
CERT Division
[Distribution Statement A: Approved for public release and unlimited distribution.]
http://www.sei.cmu.edu
REV-03.18.2016.0
Copyright 2021 Carnegie Mellon University.
This material is based upon work funded and supported by the Department of State under Contract No.
FA8702-15-D-0002 with Carnegie Mellon University for the operation of the Software Engineering Institute, a
federally funded research and development center sponsored by the United States Department of Defense.
The view, opinions, and/or findings contained in this material are those of the author(s) and should not be con-
strued as an official Government position, policy, or decision, unless designated by other documentation.
This report was prepared for the SEI Administrative Agent AFLCMC/AZS 5 Eglin Street Hanscom AFB, MA
01731-2100
[DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribu-
tion. Please see Copyright notice for non-US Government use and distribution.
Internal use:* Permission to reproduce this material and to prepare derivative works from this material for in-
ternal use is granted, provided the copyright and “No Warranty” statements are included with all reproductions
and derivative works.
External use:* This material may be reproduced in its entirety, without modification, and freely distributed in
written or electronic form without requesting formal permission. Permission is required for any other external
and/or commercial use. Requests for permission should be directed to the Software Engineering Institute at
[email protected].
Carnegie Mellon®, CERT® and CERT Coordination Center® are registered in the U.S. Patent and Trademark
Office by Carnegie Mellon University.
DM21-0108
Executive Summary v
Abstract vii
Introduction 1
2 Gather Information 18
2.1 Define the Constraints to Information Gathering 18
2.2 Understand the Process and Gather Information 19
2.2.1 Define the Scope of the Process 19
2.2.2 Establish Information Gathering Goals 20
2.2.3 Conduct Open Source Research 20
2.2.4 Conduct Interviews 21
4 Build a Roadmap 28
4.1 Understand the Purpose of a Roadmap 28
4.2 Outline the Steps Needed to Create a Roadmap 29
4.2.1 Define and Understand the Goal of the Roadmap 29
4.2.2 Consider Terminology and Approach 29
4.2.3 Apply the Framework 29
4.2.4 Transition from As-Is to To-Be 30
4.3 Identify Roadmap Considerations and Create the Roadmap 30
4.3.1 Outline the Services Offered 30
4.3.2 Address the CSIRT’s Role Within the National Cybersecurity Ecosystem 31
4.3.3 Develop Policies 31
4.3.4 Address Training Gaps 32
7 Conclusion 47
References 71
Figure 8: Roadmap Example: Parallel Work Tracks for a Sector CSIRT Development Team 33
Figure 11: CSIRT Services Framework Service Areas, Services, and Functions 65
The growth of Computer Security Incident Response Teams (CSIRTs) has largely followed the
rapid expansion of the Internet into every facet of modern life and the digital economy. As the use
of technology has grown and becomes more pervasive and specialized, CSIRTs have also grown
and become more specialized. An emerging trend of this increased specialization in the realm of
incident response and coordination is the adoption of sector CSIRTs—CSIRTs responsible for fa-
cilitating incident response and management for a particular sector of a country or economy (e.g.,
financial, energy, or government). 1
These specialized entities enable public and private sector stakeholders to come together to ad-
dress the risks, threats, and other challenges that are unique to the organizations and individuals in
a particular sector.
In addition to establishing sector CSIRTs and effectively addressing risks and opportunities, pub-
lic and private sector entities also continue to evolve cybersecurity and incident response ap-
proaches to incorporate stakeholders from critical infrastructure (CI) sectors into national cyberse-
curity ecosystems. 2
Sector CSIRTs are at the forefront of these efforts. To that end, the U.S. Department of State, Of-
fice of the Coordinator for Cyber Issues commissioned the Software Engineering Institute (SEI) to
develop the Sector CSIRT Framework to guide interested parties through the process of develop-
ing a sector CSIRT and integrating it into the national cybersecurity ecosystem.
This framework addresses the sector CSIRT’s creation and integration process using the follow-
ing six steps:
• Step 1: Satisfy the Prerequisites. To build a sector CSIRT from the ground up, certain pre-
requisites, such as a clear definition of the sector, must first be met. This step covers those
prerequisites, including how to (1) ensure that all prerequisites are established, (2) understand
the context of the new sector CSIRT, and (3) define the role the sector CSIRT will play
within the national cybersecurity ecosystem.
• Step 2: Gather Information. Having the right information is essential for defining the as-is
and to-be states of the process. This step outlines the type of information that should be gath-
ered and how to effectively gather it.
____________
1
While sector CSIRTs often focus on critical infrastructure (CI) sectors defined by a government, development of
sector CSIRTs that support sectors that are not necessarily deemed as critical can be considered; in such cir-
cumstances, this framework can also be used.
2
A national cybersecurity ecosystem is the collective group of agencies, teams, and stakeholders working to pro-
tect the cybersecurity and information assets of a nation or economy.
• Step 4: Build a Roadmap. A roadmap is a step-by-step guide for bridging the identified gaps
from the as-is state to the to-be state. This step describes how to build a roadmap and provides
the tools needed to be successful.
• Step 5: Plan and Implement the Sector CSIRT. Planning and implementing a sector
CSIRT transforms the research and development conducted into a functioning, operational
incident response team. This step addresses implementation considerations—including tack-
ling challenges that arise during this part of the process, and establishing and operationalizing
the team’s services, thereby integrating the CSIRT into its broader national cybersecurity eco-
system.
This framework guides the development and implementation of a sector CSIRT. The desired out-
come of this process is an organization—the sector CSIRT—that can fulfill its mission by provid-
ing clearly outlined services to a clearly defined constituency. By doing so, the Sector CSIRT
Framework enriches global incident response and the cybersecurity community while enabling
sector stakeholders to increase their own capabilities and capacity to coordinate and share infor-
mation.
The U.S. Department of State, Office of the Coordinator for Cyber Issues commissioned the Soft-
ware Engineering Institute (SEI) to create the Sector CSIRT Framework for (1) developing a sec-
tor-based computer security incident response and coordination capability and (2) integrating this
capability into a larger national cybersecurity ecosystem as applicable. The framework is a guide
for helping interested parties develop the policies, processes, and procedures necessary to opera-
tionalize a sector Computer Security Incident Response Team (CSIRT), a uniquely adapted, spe-
cialized incident response team. The framework outlines a process that moves the sector CSIRT
from concept to reality. The framework helps the team developing the sector CSIRT understand
the current conditions of incident response in the sector (i.e., the as-is state) and how to move it to
a robust operating state (i.e., the to-be state). It bridges the gap between these two states using a
well-defined roadmap and implementation process.
The Sector CSIRT Framework is intended for individuals and organizations—including CSIRT
managers, national CSIRTs, and others—who are developing or implementing a sector CSIRT.
Using this framework, these individuals or organizations can move a sector CSIRT from a con-
cept to the reality of a fully operational team.
As governments and critical infrastructure (CI) operators incorporate more connected technolo-
gies, cybersecurity risks continue to increase. In response to these risks, many governments
around the world have begun to dedicate more resources toward cybersecurity as well as the pro-
tection of CI and critical sectors of their countries or economies.
Critical infrastructure, and the sectors and subsectors associated with it, are different for each
country or economy. For example, there are 16 CI sectors in the United States (U.S.). 3 The Cyber-
security and Infrastructure Security Agency (CISA) defines U.S. critical sectors as follows:
Critical sectors of the economy are defined as infrastructure sectors whose assets, systems, and
networks, whether physical or virtual, are considered so vital that their incapacitation or de-
struction would have a debilitating effect on security, national economic security, national pub-
lic health or safety, or any combination thereof.
The European Union (EU) Directive on Security of Network and Information Systems (NIS Di-
rective) defines, at a minimum, seven CI sectors. 4 The NIS Directive mandates the following:
Each Member State shall adopt a national strategy on the security of network and information
systems defining the strategic objectives and appropriate policy and regulatory measures with
a view to achieving and maintaining a high level of security of network and information sys-
tems and covering at least the sectors referred to Annex II.
Regardless of sector prioritization or which sectors are defined as critical by a country or econ-
omy, cybersecurity threats to CI can have devastating consequences. Therefore, to effectively ad-
dress risks at a national level, national cybersecurity ecosystems must continue to evolve and in-
corporate CI stakeholders.
Fundamentally, a sector CSIRT is a body that facilitates incident response and management for a
subset of a country or economy. In rare cases, a sector CSIRT can be transnational. Regardless of
its scope and orientation, a sector CSIRT provides key advantages that other bodies—including
national CSIRTs, national cybersecurity coordination centers, Security Operations Centers
(SOCs), Product Security Incident Response Teams (PSIRTs), and private CSIRTs—cannot. Ben-
efits of sector CSIRTs include bridging the gap between public and private sectors, and providing
a mechanism or platform for cooperation, information sharing, and trust building.
____________
3
CISA lists the following 16 U.S. CI sectors: Chemical; Commercial Facilities; Communications; Critical Manufac-
turing; Dams; Defense Industrial Base; Emergency Services; Energy; Financial Services; Food and Agriculture;
Government Facilities; Healthcare and Public Health; Information Technology; Nuclear Reactors, Material, and
Waste; Transportation Systems; and Water and Wastewater Systems [CISA 2020].
4
NIS Directive, Annex II lists the following CI sectors: Energy, Transport, Banking, Financial Market, Health,
Drinking Water Supply and Distribution, and Digital Infrastructure. These sectors are further divided into subsec-
tor and type of entity [OJEU 2016].
Scope
This document focuses on sector-based incident response capabilities and provides guidance on
how to develop and implement a sector CSIRT. It covers the foundational steps of identifying and
defining a sector through implementing a sector CSIRT and integrating it into a national cyberse-
curity ecosystem. The appendices contain related guidance and point to additional resources.
It is important to note that terminology may vary. This document uses the term sector CSIRT to
broadly refer to any organization that is responsible for incident response and management for a
subset of a country or economy. However, some entities use the terms sectoral CSIRTs, sector-
based Cybersecurity Centers, Sector CERTs (Computer Emergency Response Teams), or Infor-
mation Sharing and Analysis Centers (ISACs). This document uses the term sector CSIRT
throughout. In addition, each country or economy may define its CI differently. 6 Regardless of the
terminology used or the prioritization of CI within a country or economy, this document focuses
on sector-based incident response capabilities.
____________
5
A sector CSIRT may provide in-depth incident response services, or it may serve only as a coordinator. These
functions, and the possible roles of sector CSIRTs, are discussed throughout this document.
6
The act of defining CI acknowledges that a particular sector or entity is critical to the well-being of a country or
economy; however, the definition of CI, and which sectors are deemed critical, will vary.
The framework includes key considerations for sector and national CSIRTs when developing sec-
tor-based capabilities. Thus, it can be a valuable resource to both audiences. When establishing a
sector CSIRT, members of the development team are commonly involved in and participate in a
national CSIRT. National CSIRTs often have established relationships with CI sector stakeholders
and often have authority over and insights about incident response in those areas. Often, the national
CSIRT’s role is to serve as a bridge between the sector CSIRT and the broader national cybersecu-
rity ecosystem. Even though this document was primarily written for development teams, it also
provides some considerations that national CSIRTs can find valuable.
This document may be useful to others who interact with a sector CSIRT, including members of
the CSIRT’s constituency, law enforcement, and other cybersecurity and incident response teams
directly or indirectly affected by the services of a sector CSIRT. 8
Document Structure
Each section in the remainder of this document describes a step in the sector CSIRT development
and implementation process.
• Step 1: Satisfy the Prerequisites
• Step 2: Gather Information
• Step 3: Organize the Information and Evaluate the Gaps
• Step 4: Build a Roadmap
• Step 5: Plan and Implement the Sector CSIRT
• Step 6: Conduct Post-Implementation Activities
____________
7
Throughout this document, we refer to the sector CSIRT development team as simply the development team.
8
See Section 1.3, “Identify and Define the Sector,” for more information about a sector CSIRT’s stakeholders,
constituency, and community.
In this document, a roadmap graphic, depicted in Figure 1, illustrates the framework’s six steps.
A development team leads the establishment and initial operation of the sector CSIRT. Prior to
initiating development of a sector CSIRT, the development team must weigh and carefully con-
sider a number of prerequisites (i.e., questions and other issues) that help determine how the sec-
tor CSIRT will run and who will run it. While these prerequisites do not have to be fully ad-
dressed, they must at least be factored into the development team’s approach.
These prerequisites are the foundation the sector CSIRT is built on. Without this strong founda-
tion in place before establishing and operationalizing the sector CSIRT, the development team
runs the risk of creating a flawed and/or ineffective organization.
When examining these prerequisites, the development team can avoid potential negative out-
comes by addressing two critical questions:
1. What is the current (as-is) state of cybersecurity and incident response in the given sector?
2. What is the desired (to-be) end state after the sector CSIRT is fully operational?
The prerequisites are organized into five categories, which are described in the following sections:
• 1.1: Understand the Need for a Sector CSIRT
• 1.2: Understand the National Cybersecurity Ecosystem
• 1.3: Identify and Define the Sector
• 1.4: Host the Capability
• 1.5: Understand Legislation and Legal Authority or Guidance
• 1.6: Set Goals and Objectives
Cybersecurity leaders in a country or economy might wish to implement a sector CSIRT when
they recognize the need for an organization that provides the above advantages or when there is a
need for additional cybersecurity and incident response capacity in a sector. This additional ca-
pacity might take the form of added scalability or added expertise:
• Scalability. A national CSIRT’s services can be difficult to scale to the owner/operator level.
A sector CSIRT covers the majority of those needs for a sector so that a national CSIRT can
focus on coordinating across sectors and others in the ecosystem.
• Expertise. Addressing CI sector incidents can require specialized knowledge and skills. A
national CSIRT may not have the resources to address each sector’s specific needs. However,
a sector CSIRT can maintain subject matter expertise for its sector’s needs.
A sector CSIRT performs vital tasks and functions related to computer security incidents that oc-
cur within the sector it supports. The list of functions can include the following:
• leading or facilitating incident response
• communicating and coordinating with members of the sector and other stakeholders
• coordinating with the national CSIRT and within the national cybersecurity ecosystem
• disseminating information before and after incidents
• convening meetings and facilitating discussions among stakeholders
• providing or leading training
• ensuring trust and confidentiality among members
Once the relevant authorities (including the development team) recognize the need for these func-
tions, they must be integrated into a broader approach to cybersecurity and incident response. This
broader approach is the responsibility of the sector CSIRT. The development team and other
stakeholders must determine how the sector CSIRT can best (1) achieve a public-private partner-
ship, (2) share information, and (3) build trust.
To establish and implement the sector CSIRT, the development team must answer the following
questions:
• Who will define the sector CSIRT, and what will that definition be?
• What legal authorities, if any, will the sector CSIRT have?
• What is the scope of the responsibilities that the sector CSIRT will have?
• What will the composition of the sector CSIRT be, particularly as it relates to funding, staff-
ing, and information acquisition and sharing?
One important consideration is the degree to which the sector CSIRT will integrate with the na-
tional cybersecurity ecosystem. The national cybersecurity ecosystem is the collection of agen-
cies, teams, and stakeholders that work together to protect a nation’s cybersecurity and
The development team can include a national CSIRT or other parts of the national cybersecurity
ecosystem. However, these stakeholders can assume additional roles, including as sources of in-
formation, collaboration, and direction during each part of the process. How involved the national
cybersecurity ecosystem is depends on how involved the sector CSIRT is in that ecosystem. For
example, a sector CSIRT that is created by law and housed in a government agency will likely be
closely integrated with the national CSIRT and other national partners in that ecosystem. On the
other hand, a sector CSIRT that is created and operated by private sector entities (e.g., an industry
association or a group of CI operators) may have only loose ties to the rest of the national cyber-
security ecosystem.
A national CSIRT is a team responsible for the cyber protection of a country or economy. There
are many models of national CSIRTs; however, regardless of the model used, every national
CSIRT has a broad responsibility and mission.
In contrast, a sector CSIRT is responsible for a smaller subset of the country or economy (i.e., the
particular sector it serves). In many cases, this arrangement leads to an overlap of responsibilities
between the sector CSIRT and the national CSIRT. Therefore, successfully integrating the sector
CSIRT into the national cybersecurity ecosystem requires a strong working relationship between
the two. However, in some cases—particularly in countries with nascent or developing cybersecu-
rity capabilities—a national CSIRT may not exist.
During implementation, the development team must consider two possible scenarios:
• A national CSIRT is established. If a functioning, capable national CSIRT exists, it likely
has an established relationship with the sector CSIRT. The nature and depth of this relation-
ship may vary, ranging from informal information exchange to a hierarchy where the sector
CSIRT is subordinate to the national CSIRT. Identifying this relationship and/or hierarchy is
essential, followed by establishing rules, norms, and policies that will govern the relationship
between the sector and national CSIRT, and clearly delineate the roles and responsibilities of
each.
• A national CSIRT is not yet established. When a national CSIRT does not exist, the devel-
opment team does not have access to the knowledge, experience, and resources that might
otherwise guide its integration into a national cybersecurity ecosystem. The development
team might need to find other entities in the national cybersecurity ecosystem it can collabo-
rate with instead. While not ideal, developing such a relationship can be an opportunity to
take a leadership role in the ecosystem and establish custom policies and plans based on its
mission and its constituency’s needs. On the other hand, this situation presents challenges;
other entities might seek support and expertise from the sector CSIRT because there is no na-
tional CSIRT. While the sector CSIRT’s input can be valuable—such as for developing a na-
tional CSIRT or other sector CSIRTs—it is important for the sector CSIRT to operate within
its scope, mission, and authority.
If the national CSIRT is the core of the national cybersecurity ecosystem, the rest of that ecosys-
tem comprises a diverse set of entities with a variety of roles. These entities can include public or
private entities or, in some cases, public-private partnerships. Regardless, the sector CSIRT
should integrate and work with existing stakeholders to build cooperation and communication
channels. If the national CSIRT is already established, it can help significantly with this task.
Another factor that affects the cybersecurity ecosystem is trust. The success of many aspects of a
sector CSIRT’s mission (e.g., information sharing) depends on trust. Therefore, the development
team must carefully consider how the new sector CSIRT will establish and maintain trust with a
variety of stakeholders from the prerequisite stage through post-implementation and beyond.
These stakeholders include constituents, information sharing partners, and the national CSIRT.
It can be difficult to establish trust among cybersecurity organizations and individuals because of
personal, political, or other longstanding reasons. Mismatched capabilities and a lack of shared
values are additional reasons that trust might erode or make it difficult to build in an information
sharing community. When developing a sector CSIRT and determining prerequisites, the develop-
ment team must consider the importance of trust, acknowledge the current state of trust in the cy-
bersecurity ecosystem, and address barriers to trust.
At this point, the development team can determine the overall purpose of the sector CSIRT (e.g.,
coordination versus information sharing versus provisioning operational incident response sup-
port), although the team can delay discussions about services until later in the process. (See Sec-
tion 4.)
Before developing a sector CSIRT, the development team must broadly understand the options for
the sector CSIRT’s mission, goals, and purpose. Clarifying and codifying these items can happen
later.
The following example illustrates how sectors can be viewed differently, depending on other fac-
tors (e.g., nature of the activity and location).
Many countries have a well-defined Energy Sector that has a sector CSIRT responsible
for providing incident response and management services to the many public and private
sector organizations active in that CI sector. However, not all countries define “Energy
Sector” in the same way; some countries define it to include energy production and dis-
tribution firms—along with government ministries, power grid operators, and oil and gas
concerns. Other countries have a more limited definition, or they separate these entities
into several different sectors. In the U.S., for example, these entities are grouped into
three areas of CI: Downstream Natural Gas, Electricity, and Oil and Gas. This approach
makes sense for planners and stakeholders in the U.S., but it may not make sense in other
locations.
____________
9
For example, CI may already be defined in legislation for a given jurisdiction, or CI sectors may be outlined in a
national strategy or similar document.
The development team must understand which organizations should be included in or consulted
about the sector CSIRT. Examples include stakeholders, constituents, and community members.
Sector CSIRT stakeholders, constituents, or community members can take many different forms,
including government agencies, private firms, or public interest groups. These groups generally
fall into either the public sector or the private sector (described below). While some organizations
(e.g., non-profit entities or public-private partnerships) may span these two definitions, it is im-
portant to understand the difference between these sectors and what each can offer the sector
CSIRT in terms of strengths and weaknesses.
• Public Organizations: Examples of public organizations include government agencies, min-
istries, local and state/provincial agencies, and other authorities. These entities answer to the
government hierarchy, which makes them subject to a number of different forces. These
forces include increased oversight, political considerations, and elections; all of these can in-
duce uncertainty and change. Conversely, public organizations have increased levels of
____________
10
For more information about constituency, see Section 2.1.2 of the Handbook for Computer Security Incident
Response Teams (CSIRTs) [West-Brown 2003].
Determining the sector CSIRT’s host entity is not a prerequisite for planning and implementing a
sector CSIRT. The development team should, however, consider the sector CSIRT’s host entity
and understand the issues and challenges that can result from determining the host entity or identi-
fying that it doesn’t exist.
Finally, considering where to host the sector CSIRT is also an opportunity to consider how it will
fit into the national cybersecurity ecosystem and how host determination will affect this relation-
ship. Understanding the expectations and needs of the ecosystem’s other members (e.g., law en-
forcement, the national CSIRT) can provide valuable information about how to best position the
sector CSIRT to be most effective.
When the development team considers where and how to host a sector CSIRT, it develops an un-
derstanding of which organizations, agencies, and other stakeholders already know the current en-
vironment as it relates to the (1) sector at large and (2) state of cybersecurity and incident re-
sponse in the sector. These sources of sector knowledge are uniquely positioned to provide
guidance on many aspects of developing and operating a successful sector CSIRT. Even organiza-
tions that do not have technical- or security-related knowledge can provide valuable input from
their deep historical knowledge of the operations, economics, politics, etc. of the sector. For ex-
ample, a banker’s association may have little insight into cybersecurity and incident response, but
it can provide important information about the financial sector, such as its critical assets.
In many cases, the host entity for the sector CSIRT is known or determined in advance. Perhaps
legislation or a government policy or directive dictates where a particular sector CSIRT should
fall within an existing incident response hierarchy. 11 Or stakeholders might want to use the place-
ment of a sector CSIRT to address another motive (e.g., maximizing funding, enhancing capabili-
ties, or appearing impartial). Regardless, if the host entity is known, there are implications for the
development team.
A predetermined host entity can eliminate other options that would be subject to stakeholder in-
put. For example, the ability to gain stakeholder buy-in can be affected since some organizations
are empowered by the decision, while others may feel excluded from the decision-making pro-
cess. A predetermined host entity can also limit funding-source options and other key inputs if the
process did not consider them before deciding (e.g., a host option having more reliable funding
streams than another).
Conversely, a predetermined host can benefit the development team, for example, by providing
the clarity of its organizational location. Another advantage is the likelihood that, along with de-
termining the host entity, the legislation or policy directive might also address issues such as
funding, staffing levels, organizational mission, constituency, or services. Addressing these issues
ahead of time can be useful in other aspects of sector CSIRT implementation.
If the development team begins work on establishing the sector CSIRT before a host entity is de-
termined, it should strive to identify the host entity as soon as possible. Identifying the host entity
reduces the need to revisit policies, procedures, and practices if the host determination is decided
later in the process. For example, the development team may assume that the host entity will have
certain legal authorities, but these authorities may be different if the sector CSIRT is hosted by an
entity that does not have those legal powers. Therefore, it is always better to determine the host
entity as early as possible.
If the development team does not determine the host entity, it should understand that the risk of
not doing so will increase as it moves through the implementation process.
____________
11
See Section 1.5 for more information about legislation.
A sector CSIRT may not have a host entity; it can operate as an independent agency or entity.
While this approach has advantages (e.g., flexibility, agility, and independence), it is also chal-
lenging. Legal authority in an area, for example, is derived from official government positioning
and affiliation in many jurisdictions. A standalone entity must find its own authority, get assis-
tance from a relevant government agency to assert its authority, or find an alternative (e.g., volun-
tary sharing and cooperation agreements). The development team must consider how important
each authority is and balance that need with the benefits of being a standalone sector CSIRT, par-
ticularly if the sector CSIRT is not a public sector (i.e., government) agency. The development
team should also consider the sector CSIRT’s role in the national cybersecurity ecosystem.
Similarly, the development team must understand that a standalone approach has important impli-
cations for funding and operating the sector CSIRT. As a standalone entity, the sector CSIRT
must secure its own funding, which might require government or other public funds. Without a
government host entity to advocate for funding, it is more difficult to get those funds. Private sec-
tor organizations might be more inclined to financially support a standalone sector CSIRT, or one
that is a non-profit or public-private partnership, but private-sector organizations can attach de-
mands or constraints on that funding.
A standalone sector CSIRT can face other challenges, including the following:
• establishing branding and public awareness
• gaining membership and community buy-in
• establishing relationships with other teams and partners
The development team does not need to address each of these challenges as a prerequisite; how-
ever, it should consider each challenge in advance to ensure it understands the implications.
There are other factors that the development team should consider when determining where and
how to host a sector CSIRT. Other factors involved in establishing and operationalizing a sector
CSIRT are described below: 12
• Mission. There should be a clear understanding of the problem that the sector CSIRT will
solve and who will directly benefit from solving the problem. The development team should
also understand how the host entity will enable or restrict the sector CSIRT’s ability to exe-
cute its mission.
• Constituency. The development team must understand the proposed constituency of the sec-
tor CSIRT. The CSIRT’s constituency is affected by its host entity since relationships, legal
authorities, and the ability to connect with constituents are all affected by this choice.
• Funding. Different host entities might have different financial resources and funding streams
available to the sector CSIRT. Government budgets can vary; one parent ministry may unlock
greater potential funding than another. Private funding can also be contentious (e.g., if larger
____________
12
These factors are discussed in more detail in Section 5.
One key item often addressed in legislation is the sector the CSIRT supports. (See Section 1.3.1
for more details.) This is especially true when the sector CSIRT is a public or government-run
body or when it supports critical infrastructure since its authority can be defined in a law or other
legally binding policy. Regardless, the development team must understand the legal and legisla-
tive environment where the sector CSIRT is established and operates. 13
Before the development team begins gathering information focused on sector cybersecurity, it
should review current and prospective legislation to uncover the following factors:
• Current authority level. What, if any, authority does the cybersecurity framework for the
nation or economy provide for managing cybersecurity in the sector that the CSIRT supports?
• Proposed authority level. Do draft policies or regulations exist? How do those draft docu-
ments alter the authority that a nation or economy has to manage cybersecurity in the sector
that the CSIRT supports?
• Enforcement. What are the current enforcement mechanisms for proposed and current legis-
lation, policy, or regulation?
____________
13
The absence of enabling legislation should not stop or slow sector CSIRT creation and implementation. Many
successful sector CSIRTs operate well without such legislation. However, particularly when the sector CSIRT is
government operated or government affiliated, enabling legislation can provide significant clarity and guidance
about assigning roles and responsibilities, among other things. While most legislation is relevant to sector
CISRTs housed within a government entity, for standalone CSIRTs, authority may come from memoranda of
understanding (MOUs) or legal agreements between the CSIRT and its members. A standalone CSIRT may
also be established as a not-for-profit entity that has different legal requirements (from a business operating
standpoint). In short, there are many options for establishing authority, and the development team should
choose the path that makes the most sense for its particular situation and environment.
The development team may also find non-mandatory, unofficial guidance that the sector’s cyber-
security stakeholders use. This guidance is especially useful for constraining information gather-
ing activities if it is widely used in particular sectors. Cybersecurity practitioners in a particular
country can move among industries, and practitioners can use known guidance even if it is not di-
rectly applicable to their industry. The development team should search for widely used cyberse-
curity guidance across a nation or economy, even if it does not serve the sector’s cybersecurity en-
vironment.
The development team must also consider international standards, regulations, and legislation.
Cybersecurity practitioners often use foreign legislation or standards as guidance for creating cy-
bersecurity requirements. Before analyzing a sector framework, the development team must
gather information about foreign regulatory or legal frameworks.
Since a sector CSIRT is often closely tied to the CI definitions of a country or economy, the de-
velopment team should be aware that these definitions can vary. Likewise, the relationship be-
tween the sector CSIRT and CI will also vary. It is common in many countries for CI to be de-
fined in legal terms. Therefore, the development team and other sector CSIRT stakeholders must
consider the legislation and legal requirements addressing these important terms.
At this point in the process, the development team should consider the following CI-related ques-
tions:
• Which critical industry sectors are priorities for the country?
• Are there documented technical and process capability requirements for individual sector
CSIRTs?
• What other members of the national cybersecurity ecosystem have equity in CI? How will the
sector CSIRT interact with them?
• What regional or international organizations cooperate with the country’s national CSIRT
and/or the country’s sector CSIRTs?
• Is there guidance for a country’s existing or potential sector CSIRTs?
• Is there guidance that can be applied to a country’s sector CSIRTs?
In addition to existing laws, policies, and other regulations, there are other factors, detailed below,
that can be tangential to forming the sector CSIRT. The development team should consider these
factors during this phase. Understanding the following factors from the onset of sector CSIRT de-
velopment can mitigate unforeseen challenges.
• What level of authority does existing legislation or regulation mandate? Legal environ-
ments can be complicated. Statutory compliance (i.e., compliance with laws) is different from
regulatory compliance (i.e., compliance with rules). Security laws can differ from privacy
laws. Legal requirements have different implications than legal guidelines. Understanding
To enable the process of establishing the sector CSIRT, these goals and objectives must consider
the as-is and to-be states:
• The as-is state defines existing cybersecurity capabilities within a nation or economy, the ab-
sorptive capacity within a country or economy, and the specific cybersecurity capabilities and
absorptive capacity within targeted CI sectors. To meet the goals and objectives of the pro-
cess, the as-is state must accurately assess the status of cybersecurity practices within the new
sector CSIRT’s national cybersecurity ecosystem and target sector.
• The to-be state defines the specific goal status of the cybersecurity capabilities and absorp-
tive capacity of the targeted CI sector within a nation or economy. The to-be state defines
generally what the end state and capabilities will be for a targeted sector.
Now is the appropriate time to understand and consider these states in the context of beginning
the process of establishing the sector CSIRT. The development team and other stakeholders
should be able to outline the current incident response capabilities in the sector (i.e., the as-is
state) and the projected capabilities once the sector CSIRT is operational (i.e., the to-be state).
Moving from one state to the other (by conducting a gap analysis, creating a roadmap, and imple-
menting changes) is covered in Sections 3 through 5 of this framework.
The development team should share the draft goals and objectives for the process with collabora-
tors and other stakeholders to get their consensus. This consensus-building process can happen in
many ways, but it should be the final step in evaluating whether all prerequisites for establishing a
sector CSIRT are in place.
This step describes the information to be gathered, how it should be gathered, and who should
gather it.
Once prerequisites are considered and the development team is certain that the context and envi-
ronment are appropriate for continuing the process, the focus shifts to executing the process. De-
fining the as-is state by gathering information helps determine current cybersecurity capabilities
and capacity in the defined sector; this is known as the gather information step of the process.
This step can be broken into two broad parts, which are described in the following sections:
• 2.1 Define the Constraints to Information Gathering
• 2.2 Understand the Process and Gather Information
Knowing and identifying sources, sector requirements, stakeholders, and national CSIRTS allows
the development team to gather information that addresses all relevant issues and stakeholders
while limiting the amount of data required for analysis.
These information gathering steps will overlap and typically are not linear. For example, infor-
mation gathered during interviews and discussions with cybersecurity practitioners may reveal
new avenues of open source research for the development team to consider. Appendix B provides
more detailed information about information gathering topics and design.
When gathering information, the scope of activities refers to identifying priority sectors or sector
CSIRTs and defining the depth of research necessary for the development effort. When defining
the scope, information gathering activities that focus on a particular sector must address the fol-
lowing issues:
• Which CI sector(s) will be assessed? Limiting CI sectors for information gathering might be
necessary due to a lack of accessible cybersecurity expertise in the sector, lack of available
information related to a sector, or disagreements about what defines particular CI sectors.
• What timeframe is available for conducting research and gathering information? As-
sessing the cybersecurity incident response capability for CI sectors is time consuming be-
cause it requires additional research. This research includes investigating sector cybersecurity
requirements and specialized cybersecurity technologies or processes that a CI sector uses.
• What vendors or cybersecurity service providers that deliver services to CI sectors are
within scope for information gathering activities? Many organizations contract with exter-
nal cybersecurity providers for some or all of their cybersecurity capabilities. The plan to
gather information about contracted services should include an action to request that infor-
mation either from the CI organizations that contract those services or from the external cy-
bersecurity providers.
Some of these scope questions (e.g. Which CI sector(s) will be assessed?), are also covered in
Step 1 of the framework, but others must be addressed during this step. Establishing the scope of
Defining the constraints and scope of information gathering enables the development team to de-
velop related goals. These goals should be limited to specific sectors or cybersecurity disciplines
across related sectors. The development team should consider what might help the sector CSIRT
become operational and effective before firmly establishing research goals.
Below are examples of the types of information that help form information gathering goals:
• as-is and to-be states of cybersecurity capabilities
• cybersecurity practitioners’ current understanding of their place in the sector and national cy-
bersecurity ecosystem
• clarity about desired roles within the sector CSIRT framework
• role of the national CSIRT in relation to sector CSIRTs
• type of collaborative network desired in the sector CSIRT
• current and desired information sharing schema
• information sharing requirements
• primary processes and technologies used by the sector CSIRT
• current conflicts or challenges related to participating in the national cybersecurity ecosystem
• principal collaborators, desired collaborators, and entities or groups with which collaboration
is limited for any reason
Research goals can shift as the team gathers information, so the development team should be flex-
ible when setting goals. These goals should initially be communicated to stakeholders, and they
must be updated immediately if there are changes. This approach ensures transparency and con-
tinued collaboration toward a common goal.
The development team now conducts open source research (i.e., the discovery of any publicly
available information) to identify current sector capabilities, absorptive capacity for creating and
maintaining new capabilities, and the policy or legal cybersecurity framework surrounding the
specific sector.
Resources from the cybersecurity governance structure of a nation or economy often provide in-
formation related to cybersecurity requirements for CI sectors. Open source research can happen
in any order. Below are general research categories, listed from the most broad to the most granu-
lar:
• legislation, policy, and regulations
• national or economy standards
• organizational or trans-organizational governance documents
• technical specifications
Open source research should include searching local news for cybersecurity incidents, CI inci-
dents, and current best practices among particular CI sectors. Other than formal incident reports
provided by sector or national incident handlers, local news may be the sole source of information
related to incident types and their severities affecting a sector. Locally reported events can also
impact the regulatory landscape and/or sectors in ways that help or hinder their ability to respond
to cybersecurity issues.
Existing sector CSIRTs or national CSIRTs can have publicly available incident information,
awareness material, or information related to the collaborative activities they participate in. Gov-
ernmental or regulatory sources can also publish information about cybersecurity incidents re-
ported within their area of responsibility or constituency. 14
After open source research is completed, interviews must be conducted to continue gathering ad-
ditional information and validate the reliability of the open source information already gathered.
The interview subjects selected should align with previously defined research goals. Interviews
should focus on personnel who can provide valuable information about technical capability, ab-
sorptive capacity, and/or the sector governance environment.
Information gathering interviews must have preplanned topics tied to each interview group. This
framework cannot provide a full list of interview topics; however, a partial list is provided below:
• as-is and to-be states of the subject’s cybersecurity capabilities
• information on cybersecurity practitioners’ current understanding of their place in a sector
and national cybersecurity ecosystem
• desired role within a sector
• role of a national CSIRT in relation to sector CSIRTs
• type of collaborative network desired in a sector CSIRT
• services desired by the subjects that the sector CSIRT could provide
• information sharing requirements
• information sharing schema
• primary processes and technologies employed or desired to be implemented
• current conflicts or challenges related to participation in the national cybersecurity ecosystem
• principal collaborators, desired collaborators, and entities or groups with whom collaboration
is limited for any reason
____________
14
The sector CSIRT framework cannot attest to the veracity of government or regulatory reporting of cybersecu-
rity incidents, but these organizations are often the sole source of quantitative information available on cyberse-
curity incidents.
Obtaining the necessary information for developing a sector CSIRT requires successfully engag-
ing with the stakeholders who possess that information. The interviews are critical activities, so
they must be carefully planned and conducted. To get the most complete information possible, the
development team should establish the format and setting of the interview.
• Format. The format of the interviews can help the development team get accurate and valua-
ble information. Example formats include virtual or in-person interviews; facilitated discus-
sions or short, structured questions; and one-on-one or group discussions.
• Setting. The development team should consider the setting carefully since it will likely im-
pact the subject’s ability and willingness to provide information. For example, some stake-
holders may be more comfortable providing information in a private, one-on-one setting;
however, group discussions can produce valuable insights from the interaction of the partici-
pants. The development team should weigh the costs and benefits of each decision about in-
terview or discussion settings.
Generally, information gathering takes place in one of two setting categories, although there are
other approaches and variations within each.
• Scripted Interview. In this setting, the development team asks the interviewees predeter-
mined questions and records their answers. While there is room for unscripted discussion in
this approach, it is limited. The interviewer retains control over the questions and the overall
direction of the discussion. Also, because similar questions are asked of every stakeholder, it
is easier to compare and contrast their responses and the efficacy of the information collected.
• Facilitated Discussion. In this setting, the development team might have a list of broad top-
ics to discuss, and it might use some prompting questions. However, the discussion is left
open and is allowed to veer in the direction that the interviewee desires. The development
The development team is now prepared to conduct interviews and should consider the following:
• Ensure the interviewees understand the purpose and intended output of the interviews.
• Highlight the importance and value of the information interviewees provide.
• Establish trust with the interviewees by demonstrating shared values, agreeing to terms of an-
onymity, and providing transparency.
• Take notes; these notes serve as the raw material to be organized and inventoried in Step 3.
The outcome of interviews and discussions should be a fairly comprehensive collection of infor-
mation that will aid in determining the as-is and to-be states.
The development team must now organize and inventory the information it gathered to determine
the differences between the as-is and to-be states, and analyze these differences (i.e., gaps).
This section describes the process the development team uses to inventory and analyze the infor-
mation, and prioritize actions.
Organizing the information gathered and evaluating the gaps consist of several steps, which are
described in the following sections:
• 3.1 Choose an Analysis Approach and Techniques for Evaluating Gaps
• 3.2 Examine the As-Is and To-Be States
• 3.3 Analyze the Gaps
• 3.4 Consolidate Gap Information and Determine Priorities
Organizing and analyzing information can be discouraging for the development team since it can
uncover gaps in areas believed to be more mature based on interviews. This disconnect is a com-
mon challenge; the interviews can leave the development team with the impression that more is
being done than the evidence indicates. Appendix C provides supplemental information to this
step of the process.
In some cases, a gap represents an item missing from the to-be state. In other cases, a gap repre-
sents an item that is not operating effectively (i.e., the item exists but is not as mature as its to-be
goal state). Development teams commonly evaluate gaps using one of the following analysis ap-
proaches:
• A Gap Analysis is an exercise that identifies areas where there are gaps measured against
specific criteria. Gaps can include missing tools, processes, or policies that hinder achieving
____________
15
This example is not a prescriptive guide; it simply provides an example of how the process works and how the
development team might apply its own selected approach. See additional details for each step in Appendix C.
The development team should briefly discuss each gap found, the nature of the gap, and identify
actions to resolve the gap. For example, Table 1 illustrates a simplified gap analysis template.
Providing an importance indicator for each gap area or section further helps the development team
establish priorities.
As-Is State To-Be State Identified Gaps and Needs Function/Focus Area
Step 1: Determine and Step 2: Determine and Step 3: Identify gaps and Step 4: Consolidate and
document the as-is state document the desired needs between the as-is prioritize gaps by
from the information state. and to-be states. These category or focus area
gathered. gaps and needs are then (e.g., governance items
prioritized and used to like a mission statement
develop the or funding, or planned
actions/activities of the incident management
roadmap. (See Section 4.) capabilities).
At the end of the gap analysis, the development team should understand the gaps between the as-
is and to-be states and what actions are needed to close the gaps. Each gap is prioritized and has a
documented set of needs for progressing to the to-be state. This documentation drives which ac-
tivities and initiatives are included in the roadmap.
Gathering, categorizing, and analyzing information are significant steps in developing a sector
CSIRT. However, the development team still must translate this information into a functioning
incident response team or capability. A key tool that the development team uses at this stage is a
roadmap. A roadmap is a step-by-step guide for implementing the capability.
To build the roadmap, the development team breaks down the information it gathered and
matches identified gaps with the actions needed to close those gaps. This section discusses several
steps, which are described in the following sections:
• 4.1 Understand the Purpose of a Roadmap
• 4.2 Outline the Steps Needed to Create a Roadmap
• 4.3 Identify Roadmap Considerations and Create the Roadmap
For sector CSIRTs, a roadmap is a tool that the development team uses to reach the desired out-
come: a functional and effective sector CSIRT. The development team’s roadmap is the mecha-
nism it uses to move the sector CSIRT from concept to reality; it is used to plan and implement
the sector CSIRT as part of Step 5.
This step of the sector CSIRT framework helps the development team apply what it learned up to
this point in the process. The first part of this section describes how to develop a roadmap. The
second part describes the components of the roadmap.
To complete these steps, the team can coordinate and collaborate with a national CSIRT or other
stakeholders.
A roadmap is not the final outcome of this framework, nor does successfully developing a
roadmap guarantee the successful creation of a sector CSIRT. Rather, the roadmap documents the
knowledge, information, and other stakeholder input required to implement a sector CSIRT that
was gathered, organized, and is ready to be put to work.
The development team must clearly understand what a roadmap is and what it is designed to do.
Understanding what should be in the roadmap, how it should be constructed, and how it will be
translated into implementation are all critical parts of the process. A roadmap for establishing a
CSIRT should also consider any constraints or stakeholder requirements that might be incompati-
ble with the sector CSIRT; incompatibilities may cause problems as sector CSIRT functions
evolve.
The development team can use multiple documents and tools to build a new capability—a
roadmap is just one of them. Others include action plans and implementation plans; they can be
used with a roadmap, but they should not replace it. A roadmap defines the as-is state, to-be state,
and the checkpoints or indicators that mark the path from one state to the other. An action plan de-
scribes the specific actions for reaching checkpoints and the to-be state. An implementation plan 16
outlines how these actions are implemented, who implements them, and when they should be im-
plemented.
Constructing an effective sector CSIRT roadmap is not possible until the development team com-
pletes the previous steps in the framework. Having prerequisites in place ensures that the condi-
tions for success are in place. Gathering information (e.g., open source research, facilitated dis-
cussions, and intensive document review) ensures that a complete picture of the environment is
developed and all relevant stakeholders are consulted, including the national CSIRT. Using
____________
16
Section 5 describes how to plan and implement the sector CSIRT; Section 5 can be used with or instead of an
implementation plan.
When developing a roadmap, the development team must leverage what it learned and defined to
develop clear as-is and to-be states for the transition process. Once these states are well defined
and the development team conducts a gap analysis, the roadmap process links these actions from
point to point. The development team should clearly define and describe how the sector CSIRT is
formed, what services it might (or might not) offer, how it works with other stakeholders in the
environment, and what timeline it expects to adhere to.
When developing a sector CSIRT and creating a roadmap, the development team must determine
which services to offer the constituency. This process involves naming and defining each desired
service to understand the activities that must be incorporated into the roadmap. The development
team must select services that support the constituents’ missions and the CSIRT’s purpose.
Each sector CSIRT is different because each provides services based on its mission, purpose, and
constituency. There are many services that a sector CSIRT can offer. Determining which services
to offer as part of the roadmap process is critical to Step 5 (Plan and Implement the Sector
CSIRT) of the framework.
The services the sector CSIRT offers determine the resources, skill sets, and partnerships the
CSIRT needs to function properly. The services offered should be those that the CSIRT can real-
istically provide based on its size and expertise. In general, CSIRTs should begin by offering a
small set of services that it can provide and support very well instead of offering many services it
might not be able to provide or properly support. As a CSIRT gains the trust and respect of its
constituency, it can expand its services as staff and funding permit.
While many teams develop their own services and frameworks, FIRST developed the CSIRT Ser-
vices Framework, depicted in Figure 7. This framework groups CSIRT services into five areas
4.3.2 Address the CSIRT’s Role Within the National Cybersecurity Ecosystem
A key function of a sector CSIRT—and a determinant of its effectiveness—is the role it plays in
sharing information within its sector and national cybersecurity ecosystem. A sector CSIRT’s
ability to collaborate, coordinate, and share information within a national cybersecurity ecosystem
ensures its success. How a sector CSIRT performs these functions must be considered while the
roadmap for the sector CSIRT implementation is being developed. Also, requirements from the
national CSIRT can help the sector CSIRT determine how it collects, uses, and shares infor-
mation.
Understanding the expectations of the national CSIRT and sector CSIRT helps develop a realistic
and achievable roadmap that aligns with national cybersecurity objectives. The development team
must understand the desired roles, responsibilities, and capabilities of the sector CSIRT—
including how the sector CSIRT will interact with the national CSIRT—to capture items that
should be a part of the roadmap. 18
To address gaps and operationalize a sector CSIRT, the development team must acknowledge and
develop internal and external organizational policies that are critical to perform the required ac-
tions and activities on the roadmap. These policies depend on the gaps identified, services offered,
____________
17
FIRST service areas are summarized in Appendix D and addressed in further detail in Section 5 of the frame-
work. More information about the FIRST CSIRT Services Framework is available on the FIRST website [FIRST
2019].
18
See Sections 1 and 5 for more information about sector CSIRT integration within the national cybersecurity eco-
system.
Sector CSIRTs operating in heavily regulated industries must adhere to specific legal require-
ments that are normally unique to the legal jurisdiction where they operate. 19 These regulations
must be considered for their incorporation into policy and the roadmap. 20
Sector CSIRT staff training is another roadmap consideration. Training should initially focus on
bringing new staff members up to the skill level needed to undertake the work and activities de-
fined in the roadmap. Follow-on activities during and after implementation can include broaden-
ing the abilities of staff members and keeping the overall CSIRT skill set up-to-date with emerg-
ing technologies and malicious actor trends. Undoubtedly, training gaps will exist; these gaps
require actions in the roadmap to identify the overall skills needed for each team member and
general skill coverage required for the sector CSIRT to complete its mission and support its con-
stituents.
In the roadmap, the development team establishes key milestones and checkpoints that document
and confirm progress. Specific metrics or measures are also developed with these milestones to
help gauge progress; milestones are different for each roadmap and should correspond to the
unique situation and needs of the sector CSIRT and its stakeholders.
In any case, the roadmap should contain a way for the development team to confirm progress on
the path from the as-is to the to-be state. Key indicators can include the following:
• identifying the constituency
• determining key roles and responsibilities
• meeting and aligning with the national cybersecurity ecosystem and regulatory requirements
• selecting key technologies to assist with information sharing and incident classification
Figure 8 provides a high-level example of a roadmap. Every environment, development team, and
sector is unique; therefore, this example is only a generic template for the development team to
tailor based on its own needs, required actions, and desired operational state.
Many development teams and sector CSIRTs have their own programs or project management ap-
proaches and/or requirements. The sector CSIRT can also have unique business requirements,
____________
19
Examples of such legal requirements include the Health Insurance Portability and Accountability Act (HIPAA)
and the Sarbanes-Oxley Act (SOX) in the U.S., and the General Data Protection Regulation (GDPR) in the Eu-
ropean Union.
20
For more information about legal considerations, see Section 1.5.
Figure 8: Roadmap Example: Parallel Work Tracks for a Sector CSIRT Development Team
The final step in establishing the sector CSIRT is implementing the roadmap. This section de-
scribes the planning and implementation process and discusses how to find help along the way.
Broadly speaking, an implementation process involves several steps, which are described in the
following sections:
• 5.1 Gather Implementation Expertise
• 5.2 Plan for Implementation
• 5.3 Consider and Execute Specific Services
• 5.4 Communicate Implementation Progress
• 5.5 Integrate with the National Cybersecurity Ecosystem
The development team can find an advisor using a global or regional forum of CSIRT organiza-
tions. FIRST maintains a publicly available database of member CSIRTs across the world [FIRST
2020a]. This database can be filtered by country or name, and contact information is provided
about the CSIRT. The best ways to find valuable advisors is to reach out to CSIRTs and leverage
the in-country national CSIRT (if applicable).
Foundational Topics
• sector CSIRT mission, goals, and governance
• shared values of the CSIRT and its stakeholders
• agreements/rules between the sector CSIRT and its constituents, as well as between the sector
CSIRT and others in the national cybersecurity ecosystem, including
− type of documentation needed
− MOUs needed and what they should include
Services
• services offered by the sector CSIRT
• resources and budget, including plans to hire and train staff based on the services offered
• initial policies and procedures
• available or needed equipment and tools to support the services offered
• guidelines and/or forms required by or for the constituency, depending on the services offered
Communications
• communications plan for sector CSIRT implementation
− How will information be disseminated to, socialized with, and made available to all
stakeholders? Include processes and tools that enable effective communications.
• formal announcements and kick-off activities
Trust Building
• approaches to building and extending trust between stakeholders
− Many benefits of sector-based collaboration about cybersecurity are predicated by some
level of trust among the sharing parties.
• approaches to building and maintaining trust with the community, including developing and
maintaining the relationship with the national CSIRT and its integration into the cybersecurity
ecosystem
• a plan for building trust at the organizational and individual level
• how to address longstanding reasons for the lack of trust between organizations
Constituency Operations. Sector CSIRTs should be familiar with, or have a basic understanding
of, their constituency’s operating environments. The constituency should be informed of the sec-
tor CSIRT’s processes for identifying events, incidents, and associated incident categorization ac-
tivities. Familiarity with a sector CSIRT’s incident management process and how to share
Technical Components. Sector CSIRTs should be familiar with common incident management
and information sharing standards used for communicating event and incident information in in-
formation sharing communities.
Incident Management Community. Sector CSIRTs should establish relationships within the
broader CSIRT information sharing community. These relationships are a source of incidents that
affect others and can be early warning indicators to assist preparations within the sector. Other
CSIRTs can also provide mentoring or advice to the sector CSIRT to help with incidents the con-
stituency experiences.
Constituent Operations. Sector CSIRTs should be familiar with, or have a basic understanding
of, their constituency’s ability to collect, compile, and transmit system and network information
related to specific timeframes or incidents.
Technical Components. Sector CSIRTs should be familiar with basic information about their
constituents’ current information security posture and the details of any incidents provided.
Incident Triage. Sector CSIRTs must be able to review and prioritize incoming constituent inci-
dents. A baseline ability to do this task does not require the process to be formalized, but a sector
CSIRT should be able to understand and explain its informal triage processes.
Incident Analysis. Sector CSIRTs must be able to perform analytical tasks that lead to the crea-
tion or discovery of information that allows constituents to mitigate or remediate incidents.
Incident Mitigation and Remediation. Sector CSIRTs must be able to perform at least one of
the following tasks:
• Mitigate incidents on behalf of their constituents.
• Present information to constituents, allowing them to mitigate incidents.
• Remediate incidents on behalf of their constituents.
• Present information to constituents, allowing them to remediate incidents.
Vulnerability Technical Components. Sector CSIRTs should be familiar with the technical lan-
guages that describe vulnerabilities. In particular, the development team should ensure that sector
CSIRT members are familiar with the Common Vulnerability and Exposure (CVE) system and
the Common Vulnerability Scoring System (CVSS).
Patch Management. Sector CSIRTs should be able to package and distribute patches for vulnera-
bility management. 21
Sector CSIRTs must understand how the constituency operates under normal circumstances and
be able to identify abnormal operational changes. Situational awareness also means keeping cur-
rent with what is happening in the greater CSIRT community so that relevant information can be
passed along to the sector CSIRT’s constituency.
Constituency Operations. Sector CSIRTs should be familiar with, or have a basic understanding
of, their constituency’s baseline operating environments to ensure they can provide effective situ-
ational awareness when needed.
Situational Awareness Technical Components. Sector CSIRTs should be familiar with the tech-
nical baselines within the constituency and how to distribute relevant information to the constitu-
ency or the global CSIRT community.
Constituent Operations. Sector CSIRTs must have known communication channels that are
open and maintained with their constituency. Constituencies must be informed of the knowledge
transfer activities the sector CSIRT undertakes, and updates should be communicated to the con-
stituency regularly. Ideally, this process should be formalized, but it is not required.
____________
21
Patch creation is excluded because it requires specific knowledge of particular applications or configurations. It
is normal for CSIRTs to package and distribute patches without input into their development.)
The progress reporting cycle can be augmented with regular discussions of the implementation as
a means for requesting feedback from stakeholders and partners. This feedback should be incor-
porated into future activities or roadmap/implementation adjustments as needed. It can also be
helpful to schedule progress discussions with advisors to get outside perspectives on how adjust-
ments might be made to an implementation iteration.
Integration into the national cybersecurity ecosystem is essential regardless of which sector (pub-
lic or private) the CSIRT supports. However, as the development team implements the sector
CSIRT, it must continually revisit the questions asked in Section 1.2.1 and address changes (indi-
cated in the right column of Table 2) to the ecosystem during the implementation phase.
What role will the national CSIRT (if there is one) play Have roles and responsibilities changed from the early
in the sector? planning and prerequisite stages?
What relationship will the sector CSIRT have with the Has this relationship changed or improved since the
national CSIRT? early planning and prerequisite stages?
If there is no national CSIRT, how does this impact the Has a national CSIRT operationalized in the time be-
sector CSIRT’s role in the national cybersecurity eco- tween the planning and implementation stages?
system?
How will the sector CSIRT address issues related to What activities have been identified on the roadmap for
working with the public and private sectors nationwide? implementation as it relates to these factors? Are there
additional factors to consider during implementation?
Have there been any developments regarding public-
private partnerships that can be leveraged?
____________
22
See Section 1.2 for a discussion of the national cybersecurity ecosystem.
Public/private considerations and relationships are considered at the start of sector CSIRT plan-
ning. However, the development team must address the following implementation and technical
considerations as well.
• Roles and Responsibilities. Which entities will serve which roles during an incident and
throughout the incident management process?
• Communication. How will the sector CSIRT communicate with stakeholders across the sec-
tor? Will there be different channels for public and private entities? How will informal com-
munications work?
• Information Sharing. What platforms will be used to share information? Who will operate
them, and how will the data be handled and protected?
The development team should be prepared to face many challenges during the implementation
stage. This stage is where actions must be established and where the “seeds” of the sector
CSIRT’s long-term sustainability (e.g., building trust) are “sown.” By reviewing all relevant con-
siderations and carefully considering each measure being implemented, the development team can
overcome these challenges.
While implementation is the final step in establishing a sector CSIRT, post-implementation tasks
are the bridge between creation and sustainment. Creating an incident response capability does
not ensure its success; there are continuing challenges and needs that the sector CSIRT must ad-
dress, ranging from assuring sustained operations to expanding capacity and capabilities to meet
future challenges. Operationalizing a sector CSIRT is just the beginning.
To ensure that a sector CSIRT can sustain operations successfully, the development team captures
what was done during the process, what went as planned, what could have been done differently,
and how expectations from the beginning of the process were or were not met. To capture this in-
formation, the team must revisit measures of success and think about what comes next for the sec-
tor CSIRT.
Gaps can be roadmap items that were not completed, low-priority items that were deemed unnec-
essary for the initial implementation, issues discovered during implementation that were deferred,
or stakeholder feedback that could not be included in the initial implementation cycle.
The development team should document and review these items with stakeholders to help priori-
tize future improvements and next steps for the sector CSIRT. The development team should also
There are many useful approaches for conducting this review. For this framework, the two most
useful approaches are After-Action Review and Post-Mortem Review. These two approaches are
described briefly below, and their characteristics are summarized in Table 3.
• After Action Review (AAR) is a process first developed by the U.S. Army for providing
feedback on training exercises [IDA 1999]. Many organizations have used the AAR and
adapted it to evaluate the success (or failure) of their projects and processes. The AAR has
several key characteristics that distinguish it from other review processes: (1) feedback is
generally limited only to the stakeholders involved in executing a project, (2) feedback tends
to be part of a cycle, and (3) feedback focuses on preparing for the next steps in the process
[IDA 1999].
• Post-Mortem Review is a less-iterative process. These reviews are common in the software
and technology industry; their purpose is determining what can be done better by evaluating
what went wrong [Collier 1996]. This process is normally conducted at the end of a project; it
asks all stakeholders to evaluate what went well and what did not. 23
Purpose Preparing for next steps or the next cycle Examining and understanding what happened
during the process
Occurrence Throughout the project, gaining insight and After project completion, looking back on the
perspective entire project
Outcome Action plan for the next steps or next cycle Complete report addressing the full process
and any issues
The development team must ensure the review is conducted to meet its needs and those of the sec-
tor CSIRT. The team can use an AAR or post-mortem review, or it can use another review pro-
cess. Regardless of the approach used, the goal remains the same: determine how successful the
sector CSIRT implementation was and if additional work is needed to ensure that the desired op-
erational capability and capacity is achieved.
____________
23
Lessons learned is another common term (used by NIST and others) in incident response. A lessons learned
exercise is similar to a post-mortem review and can be used in similar situations.
24
This table is adapted from the article Emergent Learning in Action: The After Action Review [Parry 2001].
It is important to distinguish between metrics that measure sector CSIRT performance (i.e., per-
formance metrics) and metrics that measure the process used by the development team while
gathering information, completing the roadmap, and/or operationalizing the sector CSIRT (i.e.,
process metrics). Both types of metrics are important and can be used to gauge how successful
implementation of the sector CSIRT was. However, both types of metrics should remain distinct
from each other.
The focus of this framework is answering the question Were the goals of the process met? Only
process metrics are addressed as part of the post-implementation review. As covered in Section
5.4, when implementing the roadmap, implementors should regularly report their progress toward
achieving milestones in each area of the roadmap, including progress that is related to metrics es-
tablished in the roadmap. When understood in this context, process metrics should focus on how
successful the process was in moving from the as-is to the to-be state of developing a sector
CSIRT. Final process metrics should measure if that work is complete.
If the goal of the process was to build a sector CSIRT that is capable of responding to incidents
reported by constituents within the sector, the following metrics might be useful:
• Do the governing policies address incident response roles and responsibilities?
• Does the final operational capability provide the necessary tools and equipment for incident
responders to do their jobs? 26
____________
25
This list is not comprehensive and is only meant as a guide. Like many parts of the sector CSIRT framework,
each implementation is different; therefore, the review process differs as well.
26
Examples of performance metrics that can measure similar criteria include the number of incidents reported, the
number of incidents resolved, or the time required to resolve incidents.
Other questions to consider when developing additional process metrics include the following:
• What is being measured? How precise does the measurement need to be? How will it be
measured?
• Is the metric measuring what happened during sector CSIRT implementation or what resulted
from the implementation process?
• What are the objectives for the sector CSIRT? Do the metrics reflect those objectives?
• How will the metric be used—to evaluate past action on developing the sector CSIRT or to
set the stage for future work or next steps of the sector CSIRT?
Asking these questions when developing process metrics enables the development team to adopt
metrics that are useful, accurate, and valid. This approach also increases the team’s understanding
of the process and its outcomes, thereby providing a map for the future.
____________
27
This requirement can come from an oversight body, funding body, or the future operators of the sector CSIRT.
By closely following this framework, the development team can implement a sector CSIRT. What
happens after implementation? The answer to that question lies beyond this framework, but the
development team should consider that question at the end of the implementation process. The
framework, at a minimum, provides questions to consider for future tasks.
As the development team follows the framework, it should document information the sector
CSIRT may need in the future. To identify that information, the team should consider the follow-
ing questions:
• Will there be another implementation cycle? If so, capturing lessons learned for the current
cycle ensures that mistakes are not repeated and the team can build on its successes.
• Is there an immediate goal to add capacity/capability in the near future? Adding capabil-
ities is distinct from the implementation cycle; however, it has many similarities and will ben-
efit from the lessons and data captured during implementation.
• Does anything else need to be done before the sector CSIRT moves into sustained opera-
tions? There may be tasks or requirements outside of the implementation process that must be
addressed before operations begin. Examining the implementation process in detail can help
close those gaps.
• What are the long-term goals for the sector CSIRT? Long-term, strategic considerations
should always be revisited when thinking about growing or expanding the sector CSIRT.
A sector CSIRT’s ability to adapt to changes in technology, threat mitigation, and effective re-
sponse affects the team’s sustainability and flexibility for future growth. Training is a long-term
Another factor is work habits over time. Staff members can become resistant to change or updates
in established procedures, especially if the team hasn’t changed much over time or if individuals
share overlapping cybersecurity responsibilities. Complacency can also inhibit growth and long-
term sustainability. A sector CSIRT’s ability to react to the dynamic environment of incident re-
sponse is a continuous learning process. Therefore, flexibility and innovation are necessary to deal
with changing threats and determine appropriate responses. Sector CSIRTs must also be prepared
to react to changing missions, constituents, and stakeholders due to the dynamic nature of cyber-
security and the changing national landscapes and ecosystems.
Policies and procedures must be routinely reviewed and validated to ensure they are still viable,
applicable to the changing environment, and followed by staff members. By routinely reviewing
existing policies, a team can determine if changes should be made. Often, an organization identi-
fies acceptable time intervals for policy review and/or agrees to review policies as changes are
made to the environments where the sector CSIRT is responsible.
For over 30 years, the field of cybersecurity has grown and matured significantly. One aspect of
this growth and maturation has been the rise of specialization, both in individual skill sets, and
team functions and missions. This reality holds true for CSIRTs, which have long been critical
parts of the incident response apparatus for organizations, agencies, and governments around the
world.
This framework addresses one type of CSIRT specialization—sector CSIRTs. These CSIRTs fo-
cus on specific CI sectors of a country or economy. Sector CSIRTs have evolved to address the
specific risks, threats, and challenges each CI sector faces. They assume a variety of forms (e.g.,
public or private sector, government-funded or privately funded, information sharing focused or
incident response focused).
Since no two sector CSIRTs are alike, the process for developing and implementing one is unique.
Regardless, this framework broadly outlines a path for developing a sector CSIRT and success-
fully integrating it into a national cybersecurity ecosystem.
The framework applies an adaptable, flexible process to assist those seeking to establish a sector
CSIRT regardless of how it is funded or what sector it supports. This process-based approach in-
cludes the following steps:
• Step 1: Satisfy the Prerequisites
• Step 2: Gather Information
• Step 3: Organize the Information and Evaluate the Gaps
• Step 4: Build a Roadmap
• Step 5: Plan and Implement the Sector CSIRT
• Step 6: Conduct Post-Implementation Activities
The goal of this framework is to (1) assist stakeholders in developing and implementing a sector
CSIRT and (2) ensure that the sector CSIRT, once operational, will be effective and sustainable.
Accomplishing effectiveness and sustainability requires careful consideration of the sector
CSIRT’s value, services, constituency, and stakeholders, as outlined in this framework.
The most critical determination the development team must make is how to integrate the sector
CSIRT into the national cybersecurity ecosystem. Sector CSIRTs are likely to interact with and be
involved in this national ecosystem, and there can be even more critical ties, such as CI or na-
tional security concerns. Therefore, how a sector CSIRT integrates with the national cybersecurity
ecosystem is a core consideration for any development team, a fact reflected in the framework’s
emphasis on the national cybersecurity ecosystem integration.
This framework, while extensive, is not meant to be comprehensive. Teams that want to develop
and implement a sector CSIRT should also use other guides and tools, including those referenced
by the framework. Although some teams might find the framework helpful in implementing other
types of CSIRTs, they must recognize that the framework was not developed for that purpose.
Incident response and computer security will continue to grow and evolve, as will the role of
CSIRTs. The goal of this framework is to contribute to that growth by providing a mechanism that
stakeholders can use to develop and implement sector CSIRTs. The framework provides a rich,
enduring resource for understanding (1) the purpose of sector CSIRTs, (2) the process for imple-
menting a sector CSIRT, and (3) how sector CSIRTs fit in with other incident response and com-
puter security organizations.
The Software Engineering Institute (SEI), Forum of Incident Response and Security Teams
(FIRST), and European Union Agency for Cybersecurity (ENISA) offer guidance to help organi-
zations develop CSIRTs.
FIRST
Establishing a CSIRT (handbook)
This handbook describes the entire process—from start to finish—of how to establish a CSIRT
team and how to improve the team as time goes by.
https://www.first.org/resources/guides/#Establishing-a-CSIRT
Traffic Light Protocol (TLP): FIRST Standards Definitions and Usage Guidance (web
page)
This web page describes the Traffic Light Protocol (TLP), which facilitates information sharing
and consists of designations used to ensure that sensitive information is shared appropriately.
https://www.first.org/tlp/
Interview Topics
The following list contains interview topics to consider when gathering information and planning
for different interview subject groups.
Question Design
The following considerations help the development team create its own list of questions. These
considerations apply to informal information gathering, formal written questions, and in-person or
virtual/online interviews.
Out of Bounds
What is “out of bounds” for the discussion or interview? For example, should capabilities be dis-
cussed? (Keep in mind that this process is different from an assessment; therefore, the questions
Preparatory Questions
Should any questions be provided to the interview/discussion group beforehand, possibly as a
high-level list or a simple collection of talking points? (Providing this information ahead of time
creates opportunities for participants to consult with people in other parts of the organization;
however, if the responses are canned, honest discussion and feedback might be hindered. Keep in
mind that research might be necessary before respondents can answer some questions.)
Scope of Topics
1. What broad questions, research, and discussion topics apply to any sector?
2. Which questions apply only to certain sectors?
Membership
1. How will membership in the sector CSIRT work?
2. Will membership be required?
3. What are the benefits of membership?
4. Are there potential conflicts or disadvantages for members?
Discussion Format
1. Are the stakeholders familiar with the topic?
2. Will the goals of the discussion need to be reviewed?
3. Will the goals of the process for establishing a sector CSIRT need to be reviewed?
4. How much background about the topic needs to be provided?
5. Are participants familiar with the sector?
6. Are participants familiar with the concepts of cybersecurity, incident response, and CSIRT
operations?
7. What should be done to prepare for the discussion?
Data Collection
Should any data collection be conducted? (For example, should responses to questions be
weighed? Should votes be counted for particular issues?)
This appendix is a supplement to Section 3: Organize the Information and Evaluate the Gaps. This
guidance provides baseline best practices (or a baseline to-be state) for standing up a sector
CSIRT. It can be used to determine how to best identify and close the gaps identified in Section 3.
This section provides more in-depth information about the following topics:
1. Clarify the Sector CSIRT Prerequisites and Gathered Information
2. Choose an Analysis Approach and Techniques for Evaluating Gaps
3. Examine the As-Is and To-Be States
4. Analyze the Gaps
5. Consolidate Gap Information and Determine Priorities
The development team first gathers information about the CSIRT’s purpose and other supporting
information. This activity includes defining the sector CSIRT’s scope and services, and the part-
ners that will serve as the support system for the CSIRT function. The development team should
get answers to the following questions to ensure the project starts on the right path:
• What are the sector CSIRT’s mission, goals, and scope?
• What are the proposed sector CSIRT’s activities, services, and operational functions?
• What special circumstances should be considered? For example,
− existing legislative/government prohibitions
− aligning with a national CSIRT and national cybersecurity ecosystem
− partnering with additional sector CSIRTs
• What is the sector CSIRT’s desired capacity level initially and for the next level?
• Have potential mentors, partners, and stakeholders been identified?
− in the country
− in the region
− internationally
As-Is State To-Be State Identified Gaps and Needs Function/Focus Area
Step 1: Determine and Step 2: Determine and Step 3: Identify gaps and Step 4: Consolidate and
document the as-is state document the desired needs between the as-is prioritize gaps by
from the information state. and to-be states. These category or focus area
gathered. gaps and needs are then (e.g., governance items
prioritized and used to like a mission statement
develop the or funding, or planned
actions/activities of the incident management
roadmap. (See Section 4.) capabilities).
• Foundational Items. Determine if the following foundational aspects of the CSIRT are es-
tablished, documented, and agreed on at the highest level possible.
− description of authority
− mission statement
− funding model
− organizational model
• Legislative or Policy Documents. Determine if these documents are defined and supported.
Evaluate the information gathered to determine if the following have been clearly docu-
mented, approved by the appropriate level, and published to reach the applicable parties.
− list of sectors and/or CI areas
− definition of the sector CSIRT’s formation and mission
− if the sector CSIRT has been authorized and there is an agreement for its independence
(The sector CSIRT should operate independently of industry businesses within the sector
to maintain autonomy and act equitably for all sector members.)
− clear scope and list of constituencies
− agreements (e.g., policy/procedure/memorandum of understanding) between organiza-
tions that cover sector CSIRT interactions with other CSIRTs
• National CSIRT Working Relationship. Ensure that the sector CSIRT has an established
relationship with the national CSIRT. A national CSIRT can assist with establishing the sec-
tor CSIRT and providing valuable information sharing functions. The sector CSIRT should
have an agreement with the national CSIRT and an understanding of the responsibilities di-
vided and shared between the two.
− recognition (accredited/authorized) of the sector CSIRT by the national CSIRT, if appli-
cable
− information sharing agreements
− understanding of the national CSIRT’s responsibilities and pledge to participate in na-
tional activities as needed
− clearly defined role of the national CSIRT from the sector CSIRT’s perspective, includ-
ing the following:
− Responsibilities are understood and defined in legislation.
− The mission is supported in the National Cybersecurity Strategy.
− Sector or cross-sector CSIRT information sharing is enabled and facilitated.
• Incident Management Plan. Ensure that an incident management plan exists. Examine exist-
ing processes and documentation regarding incident identification, detection, response, man-
agement, and communications among CSIRTs.
− existing documents within the sector CSIRT
− For each document listed, determine its state and the steps required to reach the de-
sired level of maturity in the to-be state.
− external agreements in place with other CSIRTs
− Common practices are documented across sectors to establish agreed-on incident in-
formation and handling.
− MOUs are established for information sharing and other working practices between
CSIRT teams.
− Relationships are established, including informal or verbal working agreements with
other teams.
− defined and documented sector CSIRT mission that describes its
− services offered
− constituency
− funding model
− organizational structure
− staffing and training plan
− Information captured from incidents, including the incident
− owner (individual leading the response activity)
− status (over time)
− information reported and ongoing updates
− audit log of changes
− reporting (for individual incidents) and trending over time for the incident manage-
ment process
Adding a priority column to the gaps list is recommended. Priorities can be documented using a
simple three-part scale (e.g., high/medium/low) or a more granular rating scale (e.g., 1-5). The
The FIRST CSIRT Services Framework describes services and functions of incident response
teams within a high-level framework to assist in community-wide standardization and the selec-
tion and establishment of a team’s services portfolio [FIRST 2019]. Teams are not expected to
provide all services; services should be selected based on the CSIRT’s mission, constituents, re-
sources, and capacity. As a best practice, CSIRTs should choose a select few services and begin
performing them well before expanding their services.
The structure of the framework is based on four elements: service areas, services, functions, and
sub-functions. When implementing a sector CSIRT, refer to the FIRST CSIRT Services Frame-
work to assist with setting organizational goals, understanding desired outcomes, and planning
implementation.
The following information is summarized from the FIRST CSIRT Services Framework [FIRST
2019]. Appendix E provides follow-on implementation considerations for each of these service
areas.
In some organizations, this service area is the responsibility of the Security Operations Center
(SOC) or a different cybersecurity operations capability. This service area depends on trustworthy
and accurate data regarding information security events; therefore, if applicable, effective interac-
tion between the SOC and CSIRT are essential. Throughout the incident management process, the
CSIRT may involve other teams as needed.
Once the CSIRT conducts the analysis of information collected, it can recommend mitigation and
recovery steps to its constituents. The CSIRT may support constituents in applying the provided
recommendations. If necessary, the CSIRT may also coordinate with external entities (e.g., peer
CSIRTs, the national CSIRT, SMEs, or vendors) to address all aspects of the incident and reduce
the attack surface for future attacks. Service offerings in this service area include incident report
This appendix provides specific implementation considerations associated with each of the five
CSIRT Service Areas outlined in the FIRST CSIRT Services Framework, including descriptions
of minimum required tasks and general knowledge for particular service areas. 28
This appendix can be used in conjunction with Appendix D to ensure that a sector CSIRT is able
to fully provide any services selected. While Appendix D provides brief summaries of each ser-
vice area, this appendix outlines what the development team (and subsequently any team operat-
ing the sector CSIRT) must do and know to offer these services.
Constituency Operations
The constituency should be informed of the sector CSIRT’s processes for identifying events and
incidents, and its associated incident categorization processes. Familiarity with a sector CSIRT’s
incident management process and how to share information ensures the constituency can provide
event information to the sector CSIRT for analysis and coordination. The development team
should build its familiarity with the following topics:
• information sharing frameworks and standards in the incident management community
• monitoring capabilities and threats common across the constituency
• identifying anomalous information security events and incident categorization schemes
• information sharing systems and incident reporting policies and procedures
Sector CSIRTs should be familiar with common incident management and information sharing
standards used for communicating incident information in information sharing communities. Sec-
tor CSIRTs should be familiar with the following:
• Common information sharing frameworks/standards (e.g., definitions and identification of
events, data used for incident categorization, and identifying and sharing incidents within the
sector and the greater CSIRT community)
• Community information sharing data feeds (e.g., systems that can notify and provide infor-
mation regarding events and incidents that CSIRTs outside the sector are experiencing)
____________
28
The summaries of each service area do not include descriptions of general networking concepts (e.g., DNS,
routing, protocols), general system administration concepts (e.g., configuration management and account man-
agement), or general information security concepts (e.g., encryption and log management).
Sector CSIRTs should establish one or more relationships within the broader CSIRT information
sharing community. These relationships are sources of incidents affecting others and can be early-
warning indicators that assist preparations within the sector. Other CSIRTs may also provide
mentoring or advice to the sector CSIRT to help with incidents experienced within the constitu-
ency. Sector CSIRTs should be familiar with the following:
• Global incident management community organizations (e.g., information categorizations and
labelling, information sharing protocols, information sharing technical requirements)
• Establishing goals and objectives for information sharing within the constituency
• Establishing technical requirements for information sharing within the constituency
Constituent Operations
Sector CSIRTs should be familiar with, or have a basic understanding of, their constituency’s
ability to collect, compile, and transmit system and network information related to specific
timeframes or incidents. Sector CSIRTs should be familiar with the following knowledge areas:
• existing system and network logging capabilities across their constituency
• incident management transmission mediums (e.g., information sharing portals, email, auto-
mated incident intake formats, telephony, and others)
Technical Components
Sector CSIRTs should be familiar with basic information that describes their constituent’s current
information security posture and the details of an incident provided.
Incident Triage
Sector CSIRTs must be able to review and prioritize incoming constituent incidents. Baseline
ability for this task does not require this process to be formalized, but a sector CSIRT should be
capable of explaining an informal triage process to developers. Specific knowledge required to
perform incident triage includes the following:
• constituent mission (i.e., understanding a constituent’s mission to a degree a sector CSIRT
can prioritize incidents)
• consistent assets (i.e., understanding a constituent’s assets and their relative importance)
Sector CSIRTs must be able to perform analytical tasks, leading to the creation or discovery of
information that allows constituents to mitigate or remediate incidents.
Sector CSIRTs must be able to perform at least one of the following tasks:
• mitigate incidents on behalf of their constituents
• present information to constituents that allows them to mitigate incidents
• remediate incidents on behalf of their constituents
• present information to constituents that allows them to remediate incidents
Vulnerability Management
Sector CSIRTs planning to offer Vulnerability Management services must consider the following
topics when determining their ability to offer a current (or future) capability, and should meet a
minimum standard of knowledge and ability in these areas.
Constituency Operations
Familiarity with a sector CSIRT’s constituency ensures a sector CSIRT can provide effective Vul-
nerability Management services. Sector CSIRTs should ensure familiarity with the following
knowledge areas:
• operating system deployment that is common across a constituency
• network appliances and architectures common across a constituency
• common administrator privileges, tools, or other administrator utilities common across a con-
stituency
Sector CSIRTs should be familiar with the technical languages that describe vulnerabilities. Sec-
tor CSIRTs should be familiar with the following terms:
• Common Vulnerability and Exposure (CVE) – enumerating vulnerabilities and providing a
common identifier for the CSIRT community
• Common Vulnerability Scoring System (CVSS) – system for describing the severity of a par-
ticular vulnerability
All of the following mitigation activities should be a capability for a sector CSIRT performing
vulnerability management:
• Mitigation Creation – using knowledge of existing vulnerabilities and a constituent’s infor-
mation technology architecture to create a technical or process mitigation for a vulnerability
• Mitigation Packaging – using existing mitigation techniques or technologies to alter mitiga-
tions into formats usable by a CSIRT’s constituency
Patch Management
All of the following patch-management tasks should be within the capabilities of a CSIRT per-
forming vulnerability management. Patch creation was excluded from this list because it requires
specific knowledge of particular applications or configurations. It is normal for CSIRTs to pack-
age and distribute patches without input into the patch’s development.
• Patch Packaging – modifying patch format and instructions into types usable by constituent
CSIRTs
• Patch Distribution – transmitting patch files to constituents with known instructions for de-
ployment
Situational Awareness
Sector CSIRTs must maintain an understanding of how the constituency operates under normal
circumstances and be able to identify abnormal operational changes. Situational awareness also
means keeping current with what is happening in the greater CSIRT community so that relevant
information can be passed along to the constituency. Situational awareness services require
knowledge of the following topics.
Constituency Operations
Sector CSIRTs should be familiar with, or have a basic understanding of, their constituency’s
baseline operating environments. Familiarity with a sector CSIRT’s constituency ensures the sec-
tor CSIRT can provide effective situational awareness when needed. Sector CSIRTs should be fa-
miliar with the following topics:
• baseline operating environments and monitoring capabilities across the constituency
• threats and known vulnerabilities across the constituency
• identification activities in the constituency that are outside normal operations
• ongoing threats present in the global community that may affect the constituency
Sector CSIRTs should be familiar with the technical baselines in the constituency and how to dis-
tribute relevant information to the constituency or to the global CSIRT community. Sector
CSIRTs should be familiar with the following:
• Monitoring and metrics within the constituency – systems and tools used, what constitutes
normal baseline activity, and metrics that are indicators of abnormal activities
• Event correlation – looking across the constituency for common issues that may be caused by
the same source or threat
• Data and knowledge management – maintaining event/incident data and threat information in
the appropriate systems to build awareness of historical activities and inform present events,
ensuring lessons learned are documented and applied where appropriate
Knowledge Transfer
Sector CSIRTs planning to offer Knowledge Transfer services must consider the following topics
when determining their ability to offer a current (or future) capability and should meet a minimum
standard of knowledge and ability in these areas.
Constituent Operations
Sector CSIRTs must have known communication channels that are open and maintained with
their constituency. Constituencies must be informed of knowledge transfer activities a sector
CSIRT undertakes and provide regular updates to the constituency. Although this process is not
required to be formalized, ideally it should be.
Technical Components
Technical components of a sector CSIRT knowledge sharing program consist of the following:
• Transmission medium – This category is necessarily broad and includes mediums like email,
telephone service, and information sharing portals. It is critical that transmission mediums are
known to constituents and used when known criteria are met.
• Content – Sector CSIRTs must distribute a subset of training and education materials, aware-
ness building materials, exercises, and advisories describing technical or policy issues to their
constituencies.
[CISA 2020]
Cybersecurity and Information Security Agency (CISA). Critical Infrastructure Sectors. June
2021 [accessed]. https://www.cisa.gov/critical-infrastructure-sectors
[Collier 1996]
Collier, Bonnie; DeMarco, Tom; & Fearey, Peter. A Defined Process for Project Postmortem Re-
view. IEEE Software. Volume 13. Number 4. July 1996. https://dl.acm.org/doi/10.1109/52.526833
[Dorofee 2005]
Dorofee, Audrey; Mundie, David; & Ruefle, Robin. Creating and Managing Computer Security
Incident Response Teams (CSIRTs). Software Engineering Institute, Carnegie Mellon University.
2005. https://www.first.org/resources/papers/conference2005/robin-ruefle-slides-1.pdf
[Dorofee 2018]
Dorofee, Audrey J.; Ruefle, Robin; Zajicek, Mark; McIntire, David; Perl, Samuel J.; Alberts,
Christopher J.; Huth, Carly L.; & Walters, Pennie. Incident Management Capability Assessment.
CMU/SEI-2018-TR-007. Software Engineering Institute, Carnegie Mellon University. 2018.
https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=538848
[ENISA 2016]
European Union Agency for Cybersecurity (ENISA). Information Sharing and Common Taxono-
mies Between CSIRTs and Law Enforcement. December 2016. https://www.enisa.europa.eu/publi-
cations/information-sharing-and-common-taxonomies-between-csirts-and-law-enforcement
[ENISA 2019]
European Union Agency for Cybersecurity (ENISA). Roadmap on the Cooperation Between
CSIRTS and Law Enforcement. December 2019. https://www.enisa.europa.eu/publications/sup-
port-the-fight-against-cybercrime-roadmap-on-csirt-le-cooperation
[ENISA 2020a]
European Union Agency for Cybersecurity (ENISA). CSIRT Maturity Assessment. June 2021
[accessed]. https://www.enisa.europa.eu/topics/csirts-in-europe/csirt-capabilities/csirt-maturity
[ENISA 2020b]
CSIRT Services. European Union Agency for Cybersecurity (ENISA) Website. June 2021
[accessed]. https://www.enisa.europa.eu/topics/csirt-cert-services
[ENISA 2020c]
European Union Agency for Cybersecurity (ENISA). Proactive Detection: Good Practices Gap
Analysis and Recommendations. ENISA. May 2020.
https://www.enisa.europa.eu/publications/proactive-detection-good-practices-gap-analysis-recom-
mendations
[FIRST 2019]
Forum of Incident Response and Security Teams (FIRST). Computer Security Incident Response
Team (CSIRT) Services Framework (Version 2.1.0). November 2019.
https://www.first.org/standards/frameworks/csirts/csirt_services_framework_v2.1
[FIRST 2020a]
Forum of Incident Response and Security Teams (FIRST). FIRST: Improving Security Together
Website. June 2021 [accessed]. https://www.first.org/members/teams/
[FIRST 2020b]
FIRST. Traffic Light Protocol (TLP): FIRST Standards Definitions and Usage Guidance. June
2021 [accessed]. https://www.first.org/tlp/
[Haller 2010]
Haller, John; Merrell, Samuel A.; Butkovic, Matthew J.; & Willke, Bradford J. Best Practices for
National Cyber Security: Building a National Computer Security Incident Management Capabil-
ity. CMU/SEI-2010-SR-009. Software Engineering Institute, Carnegie Mellon University. 2010.
https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=9221
[IDA 1999]
Institute for Defense Analyses (IDA). Foundations of the After Action Review Process. Institute
for Defense Analyses. July 1999. https://apps.dtic.mil/docs/citations/ADA368651
[InfraGard 2020]
InfraGard: Partnership for Protection. June 2021 [accessed]. https://www.infragard.org/
[Killcrece 2003]
Killcrece, Georgia; Kossakowski, Klaus-Peter; Ruefle, Robin; & Zajicek, Mark. Organizational
Models for Computer Security Incident Response Teams (CSIRTs). CMU/SEI-2003-HB-001.
Software Engineering Institute, Carnegie Mellon University. December 2003.
https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=6295
[OJEU 2016]
Official Journal of the European Union. NIS Directive (Annex II). 32016L1148. July 2016.
https://eur-lex.europa.eu/legal-content/EN/TXT/
?uri=uriserv:OJ.L_.2016.194.01.0001.01.ENG&toc=OJ:L: 2016:194:TOC
[Parry 2001]
Parry, Charles & Darling, Marilyn. Emergent Learning in Action: The After Action Review. The
Systems Thinker. October 2001. https://thesystemsthinker.com/emergent-learning-in-action-the-
after-action-review/
[SEI 2020b]
Cybersecurity Center Development. Software Engineering Institute Website. SEI Web Page. June
2021 [accessed]. https://www.sei.cmu.edu/our-work/cybersecurity-center-development/index.cfm
[SEI 2020c]
Resources for Creating a CSIRT. Software Engineering Institute Website. SEI Collection. June
2021 [accessed]. https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=485643
[Stikvoort 2019]
Stikvoort, Don. SIM3 Security Incident Management Maturity Model. May 2019.
https://opencsirt.org/csirt-maturity/sim3-and-references/
[West-Brown 2003]
West-Brown, Moira; Stikvoort, Don; Kossakowski, Klaus-Peter; Killcrece, Georgia; Ruefle,
Robin; & Zajicek, Mark. Handbook for Computer Security Incident Response Teams (CSIRTs).
CMU/SEI-2003-HB-002. Software Engineering Institute, Carnegie Mellon University. 2003.
https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=6305
[Zeltser 2008]
Zeltser, Lenny. SWOT matrix for describing security posture. SANS ISC InfoSec Forums. 2008.
https://isc.sans.edu/forums/diary/SWOT+matrix+for+describing+security+posture/4939/
The Sector CSIRT Framework is intended for individuals and organizations—including CSIRT managers, national CSIRTs, and others—
who are developing or implementing a sector CSIRT. Using this framework, these individuals or organizations can move a sector CSIRT
from a concept to the reality of a fully operational team.
14. SUBJECT TERMS 15. NUMBER OF PAGES
Computer Security Incident Response Team, CSIRT, framework, national CSIRTs 83
16. PRICE CODE
17. SECURITY CLASSIFICATION OF 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF
REPORT OF THIS PAGE OF ABSTRACT ABSTRACT
Unclassified Unclassified Unclassified UL
NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39-18
298-102