Skip to main content
← All controls
RS.CO-4 / IR-1 / CIS-17.5 NIST Cybersecurity Framework v1.1

Have you pre-engaged legal counsel familiar with breach notification, regulatory engagement, and ransomware demand handling?

Demonstrate that the organization has pre-established formal engagement with qualified legal counsel possessing specific expertise in breach notification, regulatory compliance, and ransomware incident handling, with documented readiness to provide immediate guidance during a cybersecurity incident.

Description

What this control does

This control ensures the organization has identified, vetted, and formally retained legal counsel with demonstrated expertise in cybersecurity incident response, including breach notification requirements under applicable statutes (e.g., GDPR, state breach laws), regulatory coordination with agencies like CISA or sector regulators, and ransomware negotiation and payment considerations. Pre-engagement means retainer agreements, contact information, and escalation paths are established before an incident occurs, enabling immediate legal guidance during time-sensitive decisions. This mitigates legal, regulatory, and financial exposure during high-pressure breach scenarios.

Control objective

What auditing this proves

Demonstrate that the organization has pre-established formal engagement with qualified legal counsel possessing specific expertise in breach notification, regulatory compliance, and ransomware incident handling, with documented readiness to provide immediate guidance during a cybersecurity incident.

Associated risks

Risks this control addresses

  • Delayed breach notification to regulators or affected individuals due to lack of immediate legal guidance, resulting in regulatory fines and increased liability
  • Failure to comply with jurisdiction-specific breach notification timelines (e.g., 72-hour GDPR requirement) due to inability to rapidly access qualified counsel
  • Inappropriate handling of ransomware payment decisions without legal analysis of OFAC sanctions, regulatory implications, or evidentiary preservation requirements
  • Inadequate privilege protection over incident investigation materials and communications due to lack of attorney-client relationship structure
  • Miscommunication or unauthorized statements to regulators, law enforcement, or media in absence of legal guidance, creating legal jeopardy or waiver of defenses
  • Inability to rapidly coordinate with law enforcement or regulatory agencies due to lack of established legal representation and communication protocols
  • Exposure to class-action litigation or regulatory enforcement actions due to missteps in breach response that competent counsel would have prevented

Testing procedure

How an auditor verifies this control

  1. Request and review the current retainer agreement or engagement letter with legal counsel specifically covering cybersecurity incident response services
  2. Verify counsel's qualifications by reviewing attorney biographies, case experience, or certifications related to data breach notification, OFAC compliance, and ransomware incidents
  3. Obtain and examine the incident response plan or legal engagement annex documenting contact information, escalation procedures, and decision authority for engaging legal counsel during incidents
  4. Interview the incident response manager or CISO to confirm awareness of legal counsel contact procedures and validate last contact or tabletop exercise involving counsel
  5. Review communication logs, tabletop exercise records, or retainer invoices from the past 12 months demonstrating active relationship maintenance with designated counsel
  6. Assess scope of legal services documented in retainer to confirm explicit coverage of breach notification, regulatory engagement, and ransomware negotiation scenarios
  7. Verify availability commitments by reviewing service level agreements or on-call arrangements ensuring 24/7 or rapid-response access to counsel during incidents
  8. Cross-reference incident response playbooks to confirm legal counsel is designated as a required escalation point for ransomware, data exfiltration, or regulatory-reportable events
Evidence required Collect copies of executed retainer agreements or engagement letters with legal counsel, attorney qualification documents (CVs, firm credentials), incident response plan excerpts identifying legal escalation procedures and contact details, and records of relationship maintenance activities such as tabletop exercise attendance logs, retainer invoices, or documented legal consultations within the audit period.
Pass criteria The organization has a current, executed retainer or engagement agreement with legal counsel demonstrably qualified in breach notification, regulatory engagement, and ransomware handling, with documented contact procedures and evidence of active relationship maintenance within the past 12 months.