🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-13-2

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-13-2

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-13-2 – The requirements for cybersecurity incidents and threat management must be implemented.

Understanding the Requirement

This control requires an operational capability to detect, classify, respond to, report and learn from cybersecurity incidents and threats. In practical terms for an SMB, that means documenting an incident response plan, defining severity levels and clear roles and communication paths (including how and when to notify the National Cybersecurity Authority), collecting and using threat intelligence, sharing relevant notifications and indicators with the NCA, and periodically reviewing and exercising the plan. This aligns with the Essential Cybersecurity Controls (ECC – 2 : 2024) framework and focuses on making incident response repeatable, measurable and compliant.

Technical Implementation

  • Create a concise Incident Response Plan and runbook: write a one-page incident response summary and a companion runbook that lists steps for detection, containment, eradication, recovery and post-incident review. Include required time targets (e.g., initial triage within 30–60 minutes for high/critical incidents), an evidence-handling checklist (logs, disk imaging, chain-of-custody), and escalation criteria tied to severity levels.

  • Classify incidents by severity and map actions: define at least four severity levels (Low, Medium, High, Critical). For each level specify who is notified, response SLAs, containment measures and whether NCA notification is required. Example: "Critical" = data exfiltration or ransomware affecting production systems → immediate executive and NCA notification, activate full IR team and isolate affected hosts.

  • Assign clear roles & communications: designate an Incident Lead, Technical Responder(s), Legal/Privacy POC and a Communications POC. Publish a contact list and preferred secure channels (e.g., encrypted email, secure portal or telephone tree). Prepare standardized notification templates for internal stakeholders, customers (if applicable) and the NCA to speed reporting under pressure.

  • Collect and use threat intelligence: subscribe to affordable commercial feeds or free sources relevant to your sector, and ingest indicators into your endpoint detection/response (EDR) or SIEM. Automate IOC matching where possible and assign a weekly owner to triage new intelligence and tune detection rules.

  • Establish a mechanism to notify the National Cybersecurity Authority (NCA): determine the NCA's preferred submission channel (portal, email, or hotline), record the NCA contact details in the runbook, and test the notification process in tabletop exercises. Ensure you can securely share incident notifications, reports and IOCs in formats accepted by the NCA (e.g., STIX/TAXII or structured CSV) or via their portal.

  • Review and exercise regularly: run tabletop exercises every 6–12 months, update the plan after real incidents, and maintain an incident register with lessons learned. Track metrics (time to detect, time to contain, number of incidents by severity) to inform improvements and board reporting.

Example in a Small or Medium Business

Acme Manufacturing, a 150-person SMB, implements this control by drafting a one-page Incident Response Plan and a linked runbook for IT staff. They define four severity levels and map response actions: Low for routine malware on a single workstation, Critical for ransomware affecting production systems. The IT manager is named Incident Lead, with the COO as executive escalation and an external MDR vendor on retainer for 24/7 technical containment. Acme subscribes to a sector-specific threat feed and configures their EDR to automatically flag and quarantine matching IOCs. They record the National Cybersecurity Authority contact details and notification template within the runbook and run a quarterly tabletop that includes practicing an NCA notification. After an actual phishing-driven credential compromise, Acme followed the runbook, contained the breach within hours, submitted a structured notification and indicators to the NCA, and updated detection rules based on the root cause. The post-incident review produced three concrete actions—improve MFA coverage, tighten email filtering, and add a quarterly tabletop—which were implemented within two months.

Summary

By combining a documented incident response plan, clear severity classifications, assigned roles and communication templates, a tested mechanism for notifying the National Cybersecurity Authority, operational threat intelligence ingestion, and periodic reviews/exercises, SMBs can meet the control's requirements in a practical, repeatable way. These policy and technical measures ensure faster detection, more consistent response, compliant reporting and continuous improvement—reducing business impact when incidents occur.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes