HomeCyber BalkansNavigating Your Way to Resiliency: A Four-Step Guide

Navigating Your Way to Resiliency: A Four-Step Guide

Published on

spot_img

The concept of cyber resiliency has been long recognized as a crucial aspect of protecting organizations from cyber attacks. It goes beyond simply repelling attackers and focuses on ensuring that businesses and missions can continue to operate even in the face of a cyberattack. To achieve cyber resiliency, organizations need to anticipate attacks, withstand them, recover from them, and adapt to future threats.

To simplify this complex challenge, MITRE, a leading cybersecurity company, has developed the Cyber Resiliency Engineering Framework (CREF) NavigatorTM. This free visualization tool helps organizations customize their cyber resiliency goals and techniques in alignment with the National Institute of Standards and Technology’s (NIST) publication on developing cyber-resilient systems.

The first step in achieving cyber resiliency is to anticipate attacks. Organizations must have a plan in place and understand their high-value assets and critical points in their cyber infrastructure. It’s essential to determine what systems and services are necessary for the business or mission to operate. By learning from the experiences of others in the same sector, organizations can better prepare for potential cyber events. Regular testing, such as simulated tabletop exercises, can also help uncover any gaps in planning. It’s crucial to plan for worst-case scenarios and consider external factors that could exacerbate cyber risk.

The second step is to withstand attacks and continue essential business or mission functions. If a cyberattack occurs, organizations need to assess the impact on their assets and determine if they can be moved physically or logically. Redundancy and diversification of systems can help ensure that some functionality is maintained even if certain systems are targeted. Access to backup systems and a cyber resiliency plan is crucial during this phase. Taking time to assess the situation and understand the extent of the attack is important to formulate an effective response.

The third step is to recover from the attack and restore normal functionality. This involves restoring systems from backups or building new systems that are not vulnerable to the same attacks. Organizations should consider segmenting or repositioning their systems to restrict access and prevent re-compromising. The recovery process often happens during a fog of adversity, and having forensic tools in place can help organizations understand the event and ensure a trustworthy recovery.

The final step is to adapt business or mission functions and supporting capabilities to account for potential changes in the threat landscape. Making systems and services unpredictable for future attackers can enhance cyber resiliency. Distributing different tools across the environment in waves can provide insights into potential threats. Creating non-persistent systems or services that are destroyed after use can also reduce vulnerability. Additionally, organizations can incorporate deceptive information or capabilities into their systems, acting as “canary in the coal mine” or trip wires to detect active threats.

The CREF Navigator provides organizations with definitions, mappings, relationships, and visualizations to other frameworks and standards, making it easier to navigate the cyber resiliency journey.

In conclusion, cyber resiliency is a crucial aspect of cybersecurity, allowing organizations to continue their operations even in the face of cyber attacks. By following the steps outlined in the CREF Framework, organizations can better anticipate, withstand, recover, and adapt to cyber threats. It’s essential to have a solid plan in place, regularly test and update it, and be prepared for worst-case scenarios. With the right approach, organizations can achieve cyber resiliency and ensure their business or mission is not compromised by cyberattacks.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...