RS.MA-02:
Incident reports are triaged and validated
Implementation Examples
Ex1:
Preliminarily review incident reports to confirm that they are cybersecurity-related and necessitate incident response activities
Ex2:
Apply criteria to estimate the severity of an incident