Skip to main content
โ† All controls
IR-6 / A.16.1.5 NIST SP 800-61 Rev 2

Escalation paths to legal + insurer

Demonstrate that incident response procedures include documented, accessible, and tested escalation paths to legal counsel and cyber insurance representatives with clear triggering criteria and contact protocols.

Description

What this control does

This control ensures that incident response procedures include formally documented and tested escalation pathways to both legal counsel and cyber insurance carriers when security incidents meet predefined severity thresholds or involve regulated data. These pathways specify contact information, triggering criteria (e.g., ransomware, data exfiltration exceeding thresholds, nation-state attribution), communication templates, and maximum time-to-notification requirements. The control is critical for maintaining breach notification compliance, preserving attorney-client privilege, enabling insurance claim filing within policy windows, and coordinating external regulatory communications under legal guidance.

Control objective

What auditing this proves

Demonstrate that incident response procedures include documented, accessible, and tested escalation paths to legal counsel and cyber insurance representatives with clear triggering criteria and contact protocols.

Associated risks

Risks this control addresses

  • Failure to notify cyber insurer within policy-mandated timeframes, resulting in claim denial or reduced coverage for incident costs
  • Breach of regulatory notification deadlines (GDPR 72-hour, state breach laws) due to delayed legal counsel engagement
  • Unintentional waiver of attorney-client privilege through premature or uncoordinated external communications by technical responders
  • Inability to engage specialized legal representation during active ransomware negotiations or extortion scenarios
  • Inadequate coordination between technical responders and legal counsel leading to evidence spoliation or chain-of-custody failures
  • Insurance carrier denial of breach coaching or incident response vendor reimbursement due to lack of pre-authorization
  • Regulatory penalties from incorrect public statements or victim notifications made without legal review

Testing procedure

How an auditor verifies this control

  1. Obtain the current incident response plan, playbooks, and escalation matrices from the security operations team.
  2. Identify and extract all documented escalation paths to legal counsel and cyber insurance carrier, including contact names, titles, phone numbers, email addresses, and communication channels.
  3. Review triggering criteria documented for legal and insurer escalation, confirming thresholds for incident severity, data types involved, geographic scope, and attack vectors.
  4. Verify that maximum time-to-notification requirements are specified for both legal and insurance escalations, cross-referencing policy terms and regulatory obligations.
  5. Interview the incident response manager to confirm awareness of escalation paths, accessibility of contact information during after-hours incidents, and recent updates to contacts.
  6. Request records of the most recent tabletop exercise or real incident involving legal or insurer escalation, examining timestamps, communications, and decision logs.
  7. Test accessibility of documented contact information by validating that legal counsel and insurer emergency contacts are reachable through the documented channels (e.g., 24/7 hotline confirmation).
  8. Confirm that incident response personnel have received training on escalation criteria and procedures within the last 12 months, reviewing attendance records and training materials.
Evidence required Auditor collects the incident response plan and escalation matrices showing legal and insurer contact details and triggering criteria; tabletop exercise after-action reports or actual incident logs demonstrating escalation invocation with timestamps; cyber insurance policy excerpts specifying notification windows; training records and acknowledgments from incident response personnel; screenshots or exports of centralized incident tracking systems showing escalation workflow configurations.
Pass criteria The control passes if documented escalation paths to legal counsel and cyber insurer exist with specific triggering criteria and contact information, evidence shows escalation procedures were tested or invoked within the past 12 months, and incident response personnel demonstrate awareness of the paths.

Where this control is tested

Audit programs including this control