RS.MA-02:

Incident reports are triaged and validated

Implementation Examples

Ex1:

Preliminarily review incident reports to confirm that they are cybersecurity-related and necessitate incident response activities

Ex2:

Apply criteria to estimate the severity of an incident