Skip to main content
MuonPartners
Services
Architecture

Solution design and technology roadmapping

Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security

Security assessments, IAM, and compliance

AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform

Network architecture and cloud platforms

Network DesignCloud StrategyModernisation
Enterprise Architecture

Business-technology alignment

Business AlignmentPortfolio AnalysisGovernance
View all services
ProjectsCase StudiesInsightsToolsAbout
Contact Us

Services

Architecture
Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security
AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform
Network DesignCloud StrategyModernisation
Enterprise Architecture
Business AlignmentPortfolio AnalysisGovernance
ProjectsCase StudiesInsightsToolsAboutContact
Get in Touch
MuonPartners

Strategic technology consulting for Australian organisations navigating complexity.

Services

  • Architecture
  • Cyber Security
  • Network and Platform
  • Enterprise Architecture

Company

  • About
  • Products
  • Frameworks
  • Cross-Framework Mapping
  • Projects
  • Case Studies
  • Insights
  • Contact

Contact

  • [email protected]
  • Australia
  • LinkedIn

© 2026 Muon Partners. All rights reserved.

ABN 50 669 022 315 · A Muon Group company.

Privacy PolicyTerms of Service
  1. Frameworks
  2. >SP 800-53
  3. >Incident Response
  4. >SP800-53-IR-4(13)
SP800-53-IR-4(13)Active

Behavior Analysis

Statement

Analyze anomalous or suspected adversarial behavior in or related to environments or resources.

Location

Control Family
Incident Response

Control Details

Identifier
SP800-53-IR-4(13)
Family
IR
Parent Control
SP800-53-IR-4

Organisation-Defined Parameters

ir-04.13_odp
environments or resources

Supplemental Guidance

If the organization maintains a deception environment, an analysis of behaviors in that environment, including resources targeted by the adversary and timing of the incident or event, can provide insight into adversarial tactics, techniques, and procedures. External to a deception environment, the analysis of anomalous adversarial behavior (e.g., changes in system performance or usage patterns) or suspected behavior (e.g., changes in searches for the location of specific resources) can give the organization such insight.

Assessment Objective

anomalous or suspected adversarial behavior in or related to environments or resources are analyzed.

No cross-framework mappings available

← Back to Incident Response
Incident Response42 controls
SP800-53-IR-1Policy and ProceduresSP800-53-IR-2Incident Response TrainingSP800-53-IR-2(1)Simulated EventsSP800-53-IR-2(2)Automated Training EnvironmentsSP800-53-IR-2(3)BreachSP800-53-IR-3Incident Response TestingSP800-53-IR-3(1)Automated TestingSP800-53-IR-3(2)Coordination with Related PlansSP800-53-IR-3(3)Continuous ImprovementSP800-53-IR-4Incident HandlingSP800-53-IR-4(1)Automated Incident Handling ProcessesSP800-53-IR-4(2)Dynamic ReconfigurationSP800-53-IR-4(3)Continuity of OperationsSP800-53-IR-4(4)Information CorrelationSP800-53-IR-4(5)Automatic Disabling of SystemSP800-53-IR-4(6)Insider ThreatsSP800-53-IR-4(7)Insider Threats — Intra-organization CoordinationSP800-53-IR-4(8)Correlation with External OrganizationsSP800-53-IR-4(9)Dynamic Response CapabilitySP800-53-IR-4(10)Supply Chain CoordinationSP800-53-IR-4(11)Integrated Incident Response TeamSP800-53-IR-4(12)Malicious Code and Forensic AnalysisSP800-53-IR-4(13)Behavior AnalysisSP800-53-IR-4(14)Security Operations CenterSP800-53-IR-4(15)Public Relations and Reputation RepairSP800-53-IR-5Incident MonitoringSP800-53-IR-5(1)Automated Tracking, Data Collection, and AnalysisSP800-53-IR-6Incident ReportingSP800-53-IR-6(1)Automated ReportingSP800-53-IR-6(2)Vulnerabilities Related to IncidentsSP800-53-IR-6(3)Supply Chain CoordinationSP800-53-IR-7Incident Response AssistanceSP800-53-IR-7(1)Automation Support for Availability of Information and SupportSP800-53-IR-7(2)Coordination with External ProvidersSP800-53-IR-8Incident Response PlanSP800-53-IR-8(1)BreachesSP800-53-IR-9Information Spillage ResponseSP800-53-IR-9(1)Responsible PersonnelSP800-53-IR-9(2)TrainingSP800-53-IR-9(3)Post-spill OperationsSP800-53-IR-9(4)Exposure to Unauthorized PersonnelSP800-53-IR-10Integrated Information Security Analysis Team