“Establish an operational incident-handling capability for organizational systems that includes preparation, detection, analysis, containment, recovery, and user response activities.” — NIST SP 800-171 Rev. 2, 3.6.1
When a cybersecurity incident happens, the worst time to decide who’s in charge is during the incident.
Control 3.6.1 requires every organization to establish an operational incident-handling capability — not just a policy, but a real, functional process for managing and responding to security events.
This control has nuance because it sits squarely between technical response (often handled by service providers) and organizational accountability (which belongs to the OSC).
During an assessment, we’re looking for clear evidence that:
A well-written plan is not enough. The C3PAO will want to see that your organization has tested or used it — even if just through tabletop exercises.
Many organizations assume their MSP or SOC provider “handles incidents.” That’s partly true — your provider may detect, isolate, or mitigate technical issues.
But that’s not the same as incident handling.
An MSP can alert and assist. But only the OSC can:
In other words, your provider can help stop the fire — but you decide whether to call the fire department.
If your Shared Responsibility Matrix (SRM) doesn’t clearly define those lines, it’s a gap waiting to show up in an assessment.
Incident response is a leadership process. It requires decision-making authority, communication clarity, and accountability.
Here’s what strong incident handling looks like:
Leaders should ensure that when an incident occurs, no one says, “Who’s supposed to handle this?”
A good response plan prevents confusion. A great one prevents chaos.
CMMC and NIST frameworks treat incident response as both a security and a maturity indicator. A well-run incident response process shows that your organization understands its environment, communicates effectively with partners, and can respond decisively to protect Controlled Unclassified Information (CUI).
Incidents don’t define compliance failures — unmanaged incidents do.
So as you prepare for assessment, ensure your plan reflects how you’ll actually operate during an event — and make sure your providers know their roles just as clearly as your employees do.
Because when something goes wrong (and eventually, it will), your success depends on whether your plan becomes a checklist or a lifeline.