FAQGLOBAL

NIST SP 800-61r3 FAQ

Answers to the operational questions that matter during real incidents.

Focused on Rev. 3 changes, risk-based prioritization, evidence handling, and recovery.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Questions
6

Structured answer sets in this page tree.

Primary sources
3

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

SP 800-61r3 raises practical questions that older incident-response guidance did not handle as directly: when to declare an incident, how to prioritize by risk, whether to delay containment for observation, what evidence needs stronger protection, and when recovery should begin or end. This FAQ answers those questions using NISTs actual Rev. 3 structure and recommendations.

Question 1

What changed most from SP 800-61r2

The biggest change is scope. Rev. 3 no longer tries to be a static procedural handbook for every technology. Instead, it provides recommendations and considerations for incorporating incident response throughout cybersecurity risk management as a CSF 2.0 community profile.

That is why the document puts so much emphasis on all six CSF Functions and continuous improvement.

  • Published April 2025 and supersedes r2 from August 2012
  • Moves from a narrow incident-handling focus to a broader cyber risk management model
  • Uses CSF 2.0 categories and subcategories as the organizing structure
Question 2

What should trigger incident declaration and escalation

Rev. 3 says incidents are declared when adverse events meet defined incident criteria. Teams should not improvise these thresholds during a crisis.

Escalation and prioritization should be based on risk evaluation factors instead of first-come-first-served handling.

  • Use predefined incident criteria and known false-positive patterns during declaration
  • Estimate severity and urgency during preliminary review
  • Base prioritization on factors such as asset criticality, functional impact, data impact, stage of activity, threat actor characterization, and recoverability
Question 3

Can we delay containment to observe an attacker

Sometimes yes, but NIST warns that delaying containment to monitor an attacker can be dangerous because the attacker may escalate access or compromise additional systems.

The document says the incident team should discuss that strategy with legal before executing it.

  • Use predefined criteria for investigative delay versus immediate containment
  • Document approvals and the business-risk tradeoff
  • Fall back to containment quickly if the risk exceeds tolerance
Question 4

Do we need full chain of custody for every incident

No. Rev. 3 explicitly notes that formal evidence gathering and chain-of-custody procedures may not be used for every incident. However, collected incident data is still evidence.

Even when prosecution is unlikely, teams should preserve integrity, provenance, and access control for incident records and data.

  • Protect records, evidence, and metadata from unauthorized access or alteration
  • Follow evidence-preservation and retention procedures appropriate to the incident
  • Scale formality by legal risk, regulatory risk, and likelihood of external investigation
Question 5

How should notification and information sharing work

Rev. 3 separates communication into four categories: incident coordination, incident notification, public communication, and incident information sharing. Each needs its own procedures and approval paths.

Organizations should perform notifications in line with current laws, regulations, contracts, and internal policy.

  • Define who is notified, when, and through which channel
  • Coordinate with affected third parties, regulators, and law enforcement where criteria require it
  • Use secure information-sharing methods and approved media procedures
Question 6

When should recovery start and finish

Rev. 3 says recovery should start when incident recovery criteria are met, taking into account the possible operational disruption of the recovery actions themselves.

Recovery ends when restoration criteria are met, restored assets are verified, normal operating status is confirmed, and the incident documentation is completed.

  • Select recovery actions based on timeliness, precision, reliability, and available resources
  • Verify restored assets for indicators of compromise before production use
  • Declare the end of recovery using predefined criteria and complete the after-action report
Recommended next step

Use NIST SP 800-61r3 FAQ as a cited research workflow

Research Copilot can take NIST SP 800-61r3 FAQ from cited answers to recurring questions on this topic to a reusable workflow inside Sorena. Teams working on NIST SP 800-61r3 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Primary sources

References and citations

doi.org
Referenced sections
  • Primary source for incident response recommendations and CSF 2.0 profile alignment.
Related guides

Explore more topics