Skip to main content
← All controls
IR-4(13) / CA-8 NIST SP 800-53 Rev 5

Post-incident review feeds the red-team backlog

Demonstrate that incident post-mortems systematically generate red team exercises that validate whether remediation actions have effectively closed identified security gaps.

Description

What this control does

This control ensures that findings from post-incident reviews—including attack vectors, detection gaps, and response weaknesses—are systematically translated into offensive security testing scenarios and added to the red team's backlog. Post-incident analysis provides real-world attacker tactics and organizational blind spots that can be used to validate defensive posture improvements. By feeding these insights directly into red team exercises, the organization creates a closed-loop validation mechanism where defensive lessons learned are tested before the next real adversary exploits them.

Control objective

What auditing this proves

Demonstrate that incident post-mortems systematically generate red team exercises that validate whether remediation actions have effectively closed identified security gaps.

Associated risks

Risks this control addresses

  • Adversaries exploit the same attack vector repeatedly because post-incident remediation was never validated through offensive testing
  • Detection gaps identified during incident response remain unaddressed because no testing confirms whether monitoring improvements are effective
  • Security investments prioritize theoretical threats rather than attack patterns proven feasible in the organization's actual environment
  • Remediation actions are marked complete based on configuration changes without validating that adversarial techniques are now detectable or preventable
  • Red team exercises test generic attack scenarios that do not reflect the organization's demonstrated vulnerabilities and incident history
  • Knowledge from high-severity incidents is siloed within the incident response team and never translated into actionable security testing requirements
  • Defensive improvements create a false sense of security because adversarial simulation never attempts to bypass the new controls using the original attack method

Testing procedure

How an auditor verifies this control

  1. Obtain the list of completed post-incident reviews from the past 12 months, including incident reports and documented lessons learned.
  2. Retrieve the red team or purple team backlog, exercise plan, or work tracking system covering the same 12-month period.
  3. Select a sample of 5-7 moderate-to-high severity incidents that involved successful attacker techniques or detection gaps.
  4. For each sampled incident, trace whether specific attack vectors, detection failures, or control weaknesses were documented in the post-incident review.
  5. Review the red team backlog to identify corresponding entries that reference each sampled incident and describe planned adversarial simulations of the same techniques.
  6. Examine red team exercise reports to verify that backlog items derived from incidents were executed and documented the effectiveness of remediation actions.
  7. Interview incident response leads and red team leads to validate the documented workflow for translating incident findings into red team scenarios.
  8. Review meeting minutes, change requests, or ticketing system links that demonstrate formal handoff or collaboration between incident response and offensive security teams.
Evidence required Auditor collects incident post-mortem reports with documented attack techniques and remediation actions, red team backlog or task management system exports showing incident-derived test cases with traceability references, and completed red team exercise reports that validate whether specific post-incident remediations prevented simulated attacks. Supporting evidence includes email threads or meeting records showing collaboration between IR and red team functions, and workflow documentation describing the process for creating red team tasks from incident findings.
Pass criteria For at least 80% of sampled moderate-to-high severity incidents, there is documented evidence that attack vectors or detection gaps identified in post-incident reviews generated corresponding red team exercises that were planned, executed, and validated remediation effectiveness within 6 months of the incident closure.

Where this control is tested

Audit programs including this control