🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement an Incident Tracking System to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - IR.L2-3.6.2

Practical, step-by-step guidance for designing and operating an incident tracking system that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 IR.L2-3.6.2 for small businesses handling CUI.

•
April 03, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Implementing an incident tracking system that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control IR.L2-3.6.2 is about more than deploying a ticketing tool — it requires mapping to the Compliance Framework, defining workflows, preserving evidence, and producing auditable artifacts that show you "track, document, and report" incidents involving Controlled Unclassified Information (CUI).

What IR.L2-3.6.2 requires and how to scope your system

IR.L2-3.6.2 expects an organization to track and document incidents and report them to appropriate stakeholders and authorities as required. For small businesses this means: identify all systems that process or store CUI, ensure every incident that affects those systems is recorded, and make sure records are sufficient to support a CMMC assessment or a DoD/Contracting Officer notification (for example, DFARS 252.204-7012 reporting timelines — typically within 72 hours of discovery for DoD-affiliated incidents).

Step-by-step implementation plan

1) Inventory & scope: start by exporting your asset inventory and tagging assets that handle CUI. 2) Select a tracking platform: options vary by budget — TheHive, RTIR/Request Tracker, Jira Service Management, Freshservice, Zendesk, or even a simple SharePoint list for the smallest shops. 3) Define a mandatory schema for incident records (see the technical details section). 4) Integrate detection sources: connect EDR (e.g., CrowdStrike, SentinelOne), SIEM/Log store (Wazuh + Elastic, Splunk, Azure Sentinel), mail gateways, and vulnerability scanners so incidents can be auto-created. 5) Build workflows and SLAs: triage, containment, eradication, recovery, and post-incident review. 6) Test and tune using tabletop exercises and capture sample incident records as evidence.

Minimum fields and technical data to capture

Configure your system to capture structured metadata for every incident: unique incident ID (ISO 8601 timestamp + incremental ID), discovery timestamp (UTC), source of detection, incident type (malware, phishing, unauthorized access, data exfiltration), impacted CUI (Y/N + classification), affected systems/asset IDs, user accounts involved, evidence links (log exports, screenshots, EDR artifacts), containment actions taken, remediation steps, responsible incident handler, and resolution timestamp. Store all artifacts with immutable timestamps — e.g., write-once storage or send logs to an external SIEM over TLS 1.2+ and archive to WORM or cloud object storage with versioning and object lock (AES-256 at rest). Keep audit trails of who modified the ticket and when (RBAC + MFA for handlers).

Integration and automation details

Automate incident creation and enrichment where possible: configure EDR to push detections via webhook to your ticketing system with a pre-built playbook that sets severity and attaches raw artifacts. Use SIEM correlation rules to escalate multi-source events into a single incident. Include crash dumps or PCAP extracts as attachments but keep large forensic files in a secure evidence repository and reference them from the ticket. Use API keys with least privilege for integrations and rotate keys every 90 days. Ensure transport security (HTTPS/TLS) and enable logging on the integration endpoints so every auto-created ticket is auditable.

Real-world small-business scenarios

Example 1 — 25-person subcontractor: uses Office 365, Azure AD, and a handful of Windows servers. Implementation: set up a simple incident template in Jira Service Management with required fields, integrate Defender for Endpoint via Azure Logic Apps to create tickets on high-severity alerts, and funnel EDR artifacts into an Azure Storage account with object lock. Run quarterly tabletop exercises and keep three recent incident reports plus a rolling 18-month archive for assessments. Example 2 — small engineering firm with minimal budget: uses TheHive (open source) + Wazuh SIEM. Configure Wazuh to generate alerts and TheHive to record incidents; assign a single IR lead and define escalation to the CEO and Contracting Officer for any incident that involves confirmed CUI exfiltration.

Compliance evidence, reporting, and assessor expectations

Assessors will look for: documented incident response policy that references IR.L2-3.6.2, an incident log or ticketing database with entries showing discovery, actions, and closure, evidence of notifications to appropriate stakeholders (emails, Change Requests, DoD report receipts), and retention of supporting artifacts (logs, screenshots, EDR evidence). Produce a standard incident report template for external reporting that includes timelines, scope of impact on CUI, mitigation actions, and lessons learned. If DFARS reporting is required, be ready to extract the incident record and associated artifacts within the 72-hour window.

Risk of not implementing an incident tracking system

Without a formal tracking system you risk failing to meet CMMC/NIST requirements, missing contractual reporting deadlines (which can lead to penalties or loss of contracts), losing forensic evidence, and being unable to demonstrate remediation during an assessment. Operationally, incidents can recur if lessons learned are not captured and tracked; from a security perspective, lack of chain-of-custody for evidence weakens your ability to prove scope and containment and increases recovery time and cost.

Best practices and compliance tips

Enforce RBAC and MFA on the incident system, implement immutable logging and off-site backups for artifacts, and maintain a documented incident handling playbook that maps to NIST SP 800-61 and SP 800-171 control families. Define a severity matrix that explicitly ties escalation thresholds to CUI impact, run quarterly tabletop exercises with legal/PR and contracting staff, and keep a checklist for DFARS/DoD reporting. Retention: retain incident records and supporting logs per contract requirements — in many cases retain for at least 1–3 years and longer if required by the contract. Finally, capture metrics (MTTD, MTTC, number of CUI-impacting incidents) and review them in monthly security meetings to show continuous improvement.

In summary, meeting IR.L2-3.6.2 requires a combination of the right tools, defined workflows, automation, and documented evidence — not just good intentions. For small businesses, practical implementations can be lightweight and cost-effective (e.g., TheHive + Wazuh, Jira + Defender + Azure storage), but they must include mandatory incident fields, secure evidence handling, defined SLAs, and the ability to extract reports for assessors or DoD reporting within required timeframes. Implement, test, document, and continuously improve your incident tracking system to satisfy the Compliance Framework and reduce real operational risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes