CyberSecurity SEE

Lessons learned from CrowdStrike outage: Key questions for vendors

Lessons learned from CrowdStrike outage: Key questions for vendors

The CrowdStrike Channel File 291 incident in July 2024 caused significant disruptions across various sectors, impacting air traffic, healthcare, banking, retail, and entertainment industries. While the number of affected devices was relatively small, with around 8.5 million devices affected, the consequences were far-reaching.

In the aftermath of such a major incident, security practitioners, including Chief Information Security Officers (CISOs), must reflect on the event and assess how they can enhance their organizational security measures. Learning from such incidents is crucial to minimizing the risk of future outages and strengthening cybersecurity protocols.

One key takeaway from the Channel File 291 incident is the importance of understanding when vendors can initiate changes to their software. Many organizations have robust change control processes in place to prevent unauthorized modifications to production environments. However, in the case of CrowdStrike, the update was deployed directly to production environments without proper testing and vetting procedures.

Another crucial aspect to consider is the ability to control, halt, or gate updates and changes. Being able to manage the release of enhancements into controlled environments allows for thorough testing and review before deployment to critical systems.

Staggering updates over a period of time can also be beneficial in mitigating risks. By releasing updates to only a percentage of systems at a time, organizations can ensure that redundant systems are in place in case of adverse effects from the updates.

Furthermore, understanding the circumstances under which vendors can access organizational environments is essential for security purposes. Maintaining records of vendor actions and access is crucial for accountability and tracking in the event of any security incidents.

Additionally, having a clear communication strategy and internal emergency communication channel is vital for efficient response during outages. Revisiting crisis communication plans and ensuring internal teams are prepared for emergency situations can help minimize the impact of disruptions.

Lastly, organizations should consider creating threat models to assess the risks associated with the services and tools they bring into critical environments. By adopting threat modeling processes, businesses can better understand potential vulnerabilities and develop risk control strategies to strengthen their cybersecurity posture.

In conclusion, the CrowdStrike Channel File 291 incident serves as a critical reminder for organizations to evaluate their security practices, engage with vendors on update processes, and prioritize communication and risk mitigation strategies to safeguard against future outages and security breaches.

Source link

Exit mobile version