Skip to main content

NIST CSF 2.0 Respond – Incident Analysis (RS.AN) Explained


If Incident Management is about orchestrating the response, then Incident Analysis is about making sure you are responding to the right problem.

I’ve seen organizations execute incident response plans flawlessly—only to later discover they misunderstood what actually happened. They contained the wrong systems, preserved the wrong evidence, and briefed executives with incomplete narratives.

That is why NIST CSF 2.0 Respond – Incident Analysis (RS.AN) is a distinct and critical category. It exists to ensure that decisions made during response are grounded in accurate, evolving understanding of the incident.


What Is Incident Analysis (RS.AN) in NIST CSF 2.0?

RS.AN focuses on the organization’s ability to investigate and analyze cybersecurity incidents to understand cause, scope, impact, and attacker behavior.

Put simply, RS.AN answers:

“What actually happened, how did it happen, and what does it mean?”

Incident analysis builds on detection and adverse event analysis, but goes further by:

  • Confirming root cause

  • Determining the full blast radius

  • Identifying attacker objectives and progression

  • Validating containment and eradication decisions

Without strong analysis, response becomes guesswork.


Why Incident Analysis Matters to CISOs

From an executive perspective, incident analysis drives:

  • Correct containment decisions

  • Regulatory and legal accuracy

  • Credible executive and board briefings

  • Lasting security improvements

Poor analysis leads to:

  • Incomplete containment

  • Repeated incidents

  • Incorrect disclosures

  • Loss of trust with leadership and regulators

Analysis is what turns activity into understanding.


Core Objectives of RS.AN

A mature Incident Analysis capability ensures that:

  1. Incidents are fully understood, not just closed

  2. Root causes are identified and validated

  3. Scope and impact estimates improve over time

  4. Response actions are continuously adjusted based on evidence

This is a dynamic process, not a one-time task.


How to Implement RS.AN Effectively

1. Separate Analysis From Initial Triage

Early triage is about speed. Incident analysis is about accuracy.

RS.AN requires deliberate investigation focused on:

  • Timeline reconstruction

  • Evidence validation

  • Hypothesis testing

  • Peer review of conclusions

Aspiring CISOs should ensure analysts are given time and authority to analyze—not just react.


2. Preserve and Correlate Evidence Early

Analysis depends on evidence quality.

Organizations should ensure:

  • Log retention is sufficient

  • Forensic artifacts are preserved

  • Cloud, identity, and endpoint data are correlated

  • Chain-of-custody procedures exist when needed

You cannot analyze what you didn’t collect.


3. Understand Adversary Behavior and Intent

RS.AN is not just technical troubleshooting.

Effective programs:

  • Map activity to attack techniques

  • Assess attacker objectives

  • Identify pivot points and missed detections

  • Understand how the attacker entered, moved, and persisted

This prevents repeating the same failures.


4. Continuously Re-Assess Scope and Impact

One of the most common response failures is locking into an early conclusion.

Strong RS.AN practices include:

  • Expanding scope checks proactively

  • Re-validating containment effectiveness

  • Updating executives as understanding evolves

  • Adjusting response actions based on new findings

Analysis should evolve as the incident evolves.


5. Feed Analysis Directly Into Improvement

RS.AN findings must directly influence:

  • Detection tuning

  • Control gaps

  • Architectural changes

  • Training priorities

  • Risk assessments

If analysis does not change the program, it is purely academic.


Metrics to Measure Incident Analysis Effectiveness

Operational Metrics

  • Time to confirmed root cause

  • Analysis backlog per incident

  • Evidence completeness rate

  • Analyst peer review frequency


Effectiveness Metrics

  • Incidents with validated root causes

  • Scope expansions after initial analysis

  • Missed detection points identified

  • Repeated incidents tied to known causes


Maturity Metrics

  • % of incidents with formal analysis reports

  • % of incidents with attacker TTP mapping

  • Time between containment and full understanding

  • Executive confidence ratings post-incident

Strong metrics emphasize confidence and correctness, not just speed.


Common RS.AN Pitfalls

These issues consistently weaken programs:

  • Rushing analysis to “close” incidents

  • Over-trusting automated conclusions

  • Failing to reassess assumptions

  • Not involving experienced analysts

  • Treating analysis as post-incident only

Incident analysis should run in parallel with response, not after it.


Final Thoughts for Aspiring CISOs

Incident Analysis is where security programs mature.

It requires:

  • Patience under pressure

  • Intellectual honesty

  • Willingness to challenge early conclusions

  • Discipline to document uncomfortable truths

If Incident Management is about leadership, Incident Analysis is about judgment.

Master RS.AN, and you move from reacting to incidents to truly learning from them—which is the hallmark of resilient organizations.

Comments

Popular posts from this blog

Asset Management - Physical Devices - What do you have? Do you know?

Asset management and inventorying your physical systems, we all know we should do it, and I am sure most try.  I am not going to talk about the should have, would have or could have. Instead, I am going to focus on the risks associated with the NIST CSF control ID-AM.1.   The control simply states, “Physical devices and systems within the organization are inventoried.”  At the simplest level, this control is saying that the organization inventories all physical systems that are apart of the information system. In my opinion, the control is foundational because how can you secure something if you don't know it exists.  If you are not inventorying your systems, how do you know if they have adequate controls to protect the data and network.   If you had a breach of data, would you know what type of data was involved, or would you even know if you had a breach?  To further extend this, how can you perform a risk assessment on the system to understand and relay ...

Vulnerability Management… It’s easy - Planning

I am sure you have had either consultants, vendors, or heard at a conference that vulnerability management is foundational security control.  While I agree that it is an essential control, I also understand that it is challenging to implement.  Vulnerability management is not just to pick a tool, scan, and fix issues.  Many components make it a complicated journey.  This series will attempt to help break it down and give you ideas on how this complex service and be delivered effectively.    Planning   Objective When you start, I recommend creating a targeted objective and set of measures against your objective.   Ensure that you keep in mind your organization’s culture, politics, and risk appetite as you are developing your objective.   I have seen some target just “critical” systems for regulatory compliance, whereas others have targeted their entire enterprise.   No matter your scope, keep in mind your team’s current resource...

The Detect Function in NIST CSF 2.0: The Risk of Seeing Too Late—or Too Much

In NIST Cybersecurity Framework 2.0 (CSF 2.0) , the Detect function represents the organization’s ability to identify the occurrence of a cybersecurity event in a timely and reliable manner . While Protect focuses on reducing the likelihood of compromise, Detect determines how quickly and how accurately an organization recognizes that something has gone wrong. For CISOs and security leaders, detection is where many programs quietly fail. Not due to a lack of tools, but due to poor signal quality, unclear objectives, and misalignment with business impact. Detection that is late, noisy, or misunderstood can be as damaging as no detection at all. Official NIST CSF 2.0 guidance is available here: https://www.nist.gov/publications/nist-cybersecurity-framework-csf-20 What the Detect Function Is (and What It Enables) Under CSF 2.0, the Detect (DE) function focuses on outcomes related to: Continuous monitoring Anomalies and event detection Security logging and analysis Threat intelligence ...