CISA unveils government cyber security response playbooks
Playbook follows President Biden's April executive order


CISA has published two playbooks for federal civilian agencies to plan and conduct cyber security vulnerability and incident response.
The Federal Government Cybersecurity Incident and Vulnerability Response Playbooks follow an executive order from President Biden in May urging the US to improve its cyber security measures following a series of data breaches in critical infrastructure and federal agencies, including the SolarWinds supply chain attack and the ransomware attacks on the Colonial pipeline.
The order from Biden urged better lines of communication between law enforcement and service providers to enhance investigations.
CISA said the playbooks should provide federal civilian agencies with a standard set of procedures to respond to vulnerabilities and incidents impacting Federal Civilian Executive Branch networks.
“The playbooks we are releasing today are intended to improve and standardize the approaches used by federal agencies to identify, remediate, and recover from vulnerabilities and incidents affecting their systems,” said Matt Hartman, deputy executive assistant director for Cybersecurity.
“This important step, set in motion by President Biden’s Cyber Executive Order, will enable more comprehensive analysis and mitigation of vulnerabilities and incidents across the civilian enterprise. We encourage our public and private sector partners to review the playbooks to take stock of their own vulnerability and incident response practices.”
RELATED RESOURCE
Tactics to overcome supply chain shocks and risks
Build better resiliency with modern IT infrastructure
Two playbooks outlined by CIS are for incident and vulnerability response. They should give agencies a standard set of procedures to identify, coordinate, remediate, recover, and track successful mitigations from incidents and vulnerabilities affecting systems, data, and networks. They also contain checklists for incident response, incident response preparation, and vulnerability response that can be adapted to any organization to track necessary activities to completion.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
CISA said the “Incident Response Playbook” applies to incidents involving confirmed malicious cyber activity and for which a major incident has been declared or not yet been reasonably ruled out. The “Vulnerability Response Playbook” applies to any vulnerability observed to be used by adversaries to gain unauthorized entry into computing resources.
“Agencies should use these playbooks to help shape overall defensive cyber operations to ensure consistent and effective response and coordinated communication of response activities,” CISA said.
The playbooks also cover response activities, such as malicious activity detection or vulnerability discovery initiated by federal agencies, CISA, or third parties. CISA warned the playbooks don’t cover threats to classified data or national security systems.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
UK cyber experts on red alert after Salt Typhoon attacks on US telcos
Analysis The UK could be next in a spate of state-sponsored attacks on telecoms infrastructure
By Solomon Klappholz Published
-
Healthcare data breaches are out of control – here's how the US plans to beef up security standards
News Changes to HIPAA security rules will require organizations to implement MFA, network segmentation, and more
By Solomon Klappholz Published
-
The US could be set to ban TP-Link routers
News US authorities could be lining up the largest equipment proscription since the 2019 ban on Huawei networking infrastructure
By Solomon Klappholz Published
-
Three ways to evolve your security operations
Whitepaper Why current approaches aren’t working
By ITPro Published
-
Beat cyber criminals at their own game
Whitepaper A guide to winning the vulnerability race and protection your organization
By ITPro Published
-
Quantifying the public vulnerability market: 2022 edition
Whitepaper An analysis of vulnerability disclosures, impact severity, and product analysis
By ITPro Published
-
Same cyberthreat, different story
Whitepaper How security, risk, and technology asset management teams collaborate to easily manage vulnerabilities
By ITPro Published
-
US government IT contractor could face death penalty over espionage charges
News The IT pro faces two espionage charges, each of which could lead to a death sentence or life imprisonment, prosecutors said
By Ross Kelly Published