can be used by federal civilian executive branch agencies to shape their defensive cyber security operations .
www . AmericanSecurityToday . com July 2022 - Edition 62
The playbooks also serve as a helpful guide for state and local organizations and critical infrastructure partners , fur- ther enhancing cooperation with private industry .
However , the playbooks only go so far .
CISA ’ s incident response play- book , for example , only applies to “ a major incident ” such as credential access , data exfiltration , and network intrusions in- volving lateral movement .
It excludes other incidents which can escalate quickly , such
To ensure a more coordinated and centralized approach , CISA has been charged with developing a standard set of operational procedures to plan and conduct vulnerability and response activity .
32