🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build an Approved Incident & Threat Management Policy for Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-13-1 (Template + Approval Workflow)

Step-by-step guidance and a ready-to-adapt template with an approval workflow to meet ECC–2:2024 Control 2-13-1 for incident & threat management and make audits straightforward.

April 14, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

The Essential Cybersecurity Controls (ECC – 2 : 2024) Control 2-13-1 requires an approved Incident & Threat Management Policy that defines how an organization identifies, classifies, responds to, and reports security incidents and threats; this post gives a practical, audit-ready template and an approval workflow tailored to the Compliance Framework so small businesses can implement the control quickly and consistently.

What Control 2-13-1 requires and key objectives

Control 2-13-1 expects the organization to maintain a documented and approved policy that: (1) defines incident and threat categories and severity levels; (2) assigns roles and responsibilities (including escalation points); (3) specifies detection, containment, eradication, recovery and reporting requirements; (4) mandates evidence preservation and chain-of-custody; and (5) provides timelines for internal and external notifications. Key objectives are consistent detection/response, timely reporting to stakeholders, defensible evidence handling for investigations and regulatory notification, and measurable performance (MTTD/MTTR) that auditors can verify against defined metrics.

Practical policy template (how to structure your document)

Use a clear, modular layout so auditors and staff can find elements quickly. At minimum include: Purpose & Scope (systems, locations, data classes covered), Definitions (incident, near miss, threat actor, data breach), Roles & Responsibilities (CISO, Incident Response Lead, IT Ops, Legal, HR, PR), Incident Lifecycle (Detection, Triage & Classification, Containment, Eradication, Recovery, Lessons Learned), Reporting & Notification (internal timelines, regulator breach notification triggers), Evidence Preservation (hashing, imaging, chain-of-custody), Tools & Integrations (SIEM/EDR/ticketing/forensics), Training & Exercises, Metrics & Review (MTTD, MTTR, exercises per year), and Document Control (versioning, review cadence, approval list). Example short snippet you can drop into your policy: "Incidents classified as High/Severe must be reported to the CISO within 1 hour and to external regulators per statutory timelines; forensic imaging must be performed before systems are remediated where feasible."

Sample sections — specifics to include

In the Evidence Preservation section specify technical steps: collect volatile memory via approved tools (e.g., dump using Belkasoft or OS-specific tools), create forensic disk images with hashes (SHA-256), store images in an encrypted evidence repository, log actions in a tamper-evident chain-of-custody record, and maintain logs for at least 12 months (or longer if your Compliance Framework or sector requires). Under Detection, list log sources and retention: firewall NGFW logs (90 days online, 1 year archived), proxy and web gateway (90 days), Active Directory auth logs (12 months), EDR telemetry (90 days hot, 12 months cold), and syslog forwarding to SIEM with timezone normalization to UTC for consistency during investigations.

Approval workflow — role-based, auditable, and lightweight for small businesses

Design an approval workflow that is clear but not bureaucratic. Suggested workflow: Draft by IT Security Owner → Technical review by IT Ops & EDR/SIEM lead (3 business days) → Legal & Privacy review for notification obligations (3 business days) → Executive review (CISO/CEO) for risk acceptance (5 business days) → Formal sign-off by CISO and archived copy stored in a policy repository with signed email evidence. Use version control naming like vYYYY.MM.DD-# and record approver name, role, date, and rationale for changes. For small businesses the total approval cycle can be targeted to 10 business days; include an emergency fast-track approval path for immediate policy changes after a major incident (documented post-facto review required).

Workflow artifacts to maintain for compliance evidence

Keep an approvals log (PDF of the signed policy plus timestamped sign-off emails), change control tickets (e.g., Jira or ServiceNow change request with ID), meeting minutes from the review committee, tabletop exercise reports demonstrating the policy in action, and training completion records. Auditors will look for these items: the signed policy, version history, evidence of distribution (intranet, email), training rosters, and at least one exercise or incident report that showed the policy was followed.

Technical integration and implementation notes specific to Compliance Framework

Integrate the policy into your toolchain: map incident categories to SIEM correlation rules and EDR playbooks so that the policy's classification levels trigger the correct automation (e.g., High severity → isolate host via EDR, create high-priority ticket, notify IR lead). Define retention and access controls consistent with the Compliance Framework — logs must be immutable for the minimum period defined by the framework (commonly 12 months); use WORM storage when long-term retention is required. Implement automated evidence collection scripts that capture relevant artifacts (system logs, process lists, network connections) into a secure bucket with write-once permissions and record the SHA-256 hash to the investigation ticket.

Real-world small business scenarios and actionable steps

Scenario A — Phishing that leads to credential compromise: Triage the event as Moderate if only credentials suspected, High if lateral movement is detected. Actions: force password reset for affected accounts, enable MFA if not already present, run EDR scans on logged-in endpoints, preserve mailbox logs (export PST), and review authentication logs in AD/RADIUS. Collect screenshots, email headers, and message trace as evidence. Scenario B — Suspected ransomware: Immediately isolate impacted hosts via EDR, capture memory and disk images, collect network flow logs to identify exfiltration, check backups for integrity and recovery readiness, and notify legal if regulated data is involved. Document each step in the ticket and preserve hashes for later forensic validation. Both scenarios should be exercised in a tabletop at least annually; small businesses should do focused tabletop exercises every 6 months for high-risk scenarios.

Compliance tips, best practices, and risk if not implemented

Best practices: keep the policy concise (2–6 pages ideal for small teams), map each policy requirement to a control in the Compliance Framework, automate evidence capture where possible, and tie training to performance objectives. Track KPIs (MTTD < 24 hours, MTTR target based on business impact) and report them quarterly to executives. Risks of not implementing Control 2-13-1 include delayed detection and containment leading to larger breaches, inability to demonstrate due diligence during regulatory investigations, higher forensic costs, loss of customer trust, and potential fines. For example, failing to preserve evidence can invalidate an insurance claim or impede law enforcement involvement after a ransomware attack.

Summary: Build the Incident & Threat Management Policy with clear scope, classification, roles, technical requirements (SIEM/EDR/log retention/evidence handling), and a lean but auditable approval workflow that includes technical, legal, and executive sign-off; maintain artifacts (signed policy, approvals log, change tickets, tabletop reports) and integrate policy actions into automated detection and response playbooks. Following this template and workflow will help small businesses meet ECC – 2 : 2024 Control 2-13-1, reduce incident impact, and provide the documentation auditors and regulators expect.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes