Skip to main content
MuonPartners
Services
Architecture

Solution design and technology roadmapping

Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security

Security assessments, IAM, and compliance

AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform

Network architecture and cloud platforms

Network DesignCloud StrategyModernisation
Enterprise Architecture

Business-technology alignment

Business AlignmentPortfolio AnalysisGovernance
View all services
ProjectsCase StudiesInsightsToolsAbout
Contact Us

Services

Architecture
Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security
AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform
Network DesignCloud StrategyModernisation
Enterprise Architecture
Business AlignmentPortfolio AnalysisGovernance
ProjectsCase StudiesInsightsToolsAboutContact
Get in Touch
MuonPartners

Strategic technology consulting for Australian organisations navigating complexity.

Services

  • Architecture
  • Cyber Security
  • Network and Platform
  • Enterprise Architecture

Company

  • About
  • Products
  • Frameworks
  • Cross-Framework Mapping
  • Projects
  • Case Studies
  • Insights
  • Contact

Contact

  • [email protected]
  • Australia
  • LinkedIn

© 2026 Muon Partners. All rights reserved.

ABN 50 669 022 315 · A Muon Group company.

Privacy PolicyTerms of Service
  1. Frameworks
  2. >SP 800-53
  3. >Incident Response
  4. >SP800-53-IR-2(3)
SP800-53-IR-2(3)Active

Breach

Statement

Provide incident response training on how to identify and respond to a breach, including the organization’s process for reporting a breach.

Location

Control Family
Incident Response

Control Details

Identifier
SP800-53-IR-2(3)
Family
IR
Parent Control
SP800-53-IR-2

Supplemental Guidance

For federal agencies, an incident that involves personally identifiable information is considered a breach. A breach results in the loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or a similar occurrence where a person other than an authorized user accesses or potentially accesses personally identifiable information or an authorized user accesses or potentially accesses such information for other than authorized purposes. The incident response training emphasizes the obligation of individuals to report both confirmed and suspected breaches involving information in any medium or form, including paper, oral, and electronic. Incident response training includes tabletop exercises that simulate a breach. See IR-2(1).

Assessment Objective

incident response training on how to identify and respond to a breach is provided; incident response training on the organization’s process for reporting a breach is provided.

No cross-framework mappings available

← Back to Incident Response
Incident Response42 controls
SP800-53-IR-1Policy and ProceduresSP800-53-IR-2Incident Response TrainingSP800-53-IR-2(1)Simulated EventsSP800-53-IR-2(2)Automated Training EnvironmentsSP800-53-IR-2(3)BreachSP800-53-IR-3Incident Response TestingSP800-53-IR-3(1)Automated TestingSP800-53-IR-3(2)Coordination with Related PlansSP800-53-IR-3(3)Continuous ImprovementSP800-53-IR-4Incident HandlingSP800-53-IR-4(1)Automated Incident Handling ProcessesSP800-53-IR-4(2)Dynamic ReconfigurationSP800-53-IR-4(3)Continuity of OperationsSP800-53-IR-4(4)Information CorrelationSP800-53-IR-4(5)Automatic Disabling of SystemSP800-53-IR-4(6)Insider ThreatsSP800-53-IR-4(7)Insider Threats — Intra-organization CoordinationSP800-53-IR-4(8)Correlation with External OrganizationsSP800-53-IR-4(9)Dynamic Response CapabilitySP800-53-IR-4(10)Supply Chain CoordinationSP800-53-IR-4(11)Integrated Incident Response TeamSP800-53-IR-4(12)Malicious Code and Forensic AnalysisSP800-53-IR-4(13)Behavior AnalysisSP800-53-IR-4(14)Security Operations CenterSP800-53-IR-4(15)Public Relations and Reputation RepairSP800-53-IR-5Incident MonitoringSP800-53-IR-5(1)Automated Tracking, Data Collection, and AnalysisSP800-53-IR-6Incident ReportingSP800-53-IR-6(1)Automated ReportingSP800-53-IR-6(2)Vulnerabilities Related to IncidentsSP800-53-IR-6(3)Supply Chain CoordinationSP800-53-IR-7Incident Response AssistanceSP800-53-IR-7(1)Automation Support for Availability of Information and SupportSP800-53-IR-7(2)Coordination with External ProvidersSP800-53-IR-8Incident Response PlanSP800-53-IR-8(1)BreachesSP800-53-IR-9Information Spillage ResponseSP800-53-IR-9(1)Responsible PersonnelSP800-53-IR-9(2)TrainingSP800-53-IR-9(3)Post-spill OperationsSP800-53-IR-9(4)Exposure to Unauthorized PersonnelSP800-53-IR-10Integrated Information Security Analysis Team