A Practical Approach to Cyber Resilience – Developing solutions (Part 3 of 3)

In the third and last part of the blog series on Practical Cyber Resilience, I will cover the Approaches, Tactics and Techniques that an organization should use when developing options for improving cyber resilience. In the previous blog, I detailed the practical five-step Cyber Resilience Analysis Process recommended both by NIST and MITRE for enhancing cyber resilience.


The fourth step of the Cyber Resiliency Analysis is centered on/around identifying specific ways to make desired improvements. These alternatives include implementing cyber resiliency techniques (such as Adaptive Response or Analytic Monitoring) in the context of the existing architecture but may also involve significant changes to the security architecture if needed. The potential solutions can be purely technical, purely procedural, or combinations of the two.

The NIST framework provides a wealth of details on how cyber resilience techniques translate into cyber resiliency approaches. A cyber resiliency approach is a subset of the technologies and processes that defines how the capabilities are implemented or how the intended consequences are achieved.

Let us take an example of how to identify potential solutions for increasing resilience. Let’s assume that during the cyber risk baselining phase we identified Analytic Monitoring as an area of high importance with significant room for improvements. To help defining improvement options, the NIST framework provides three corresponding resiliency approaches for this technique: Monitoring and Damage Assessment, Sensor Fusion and Analysis plus Forensic and Behavior Analysis. The three approaches translate into:

  • Monitoring and analyzing the behavior and characteristics of components and resources. This helps improving the ability to detect indicators of attacks and for assessing the potential damages.
  • Combining and analyzing data, collected from different information sources over extended timeframes, to provide visibility and insights.
  • Analyzing the attacker tactics, techniques, and procedures (TTPs), including malware and other artifacts left behind by security events. This provides better understanding of the impact and helps guiding the response actions.

Having these directions set, let’s shift to identify technical solutions. Contrary to the initial instinct of most security practitioners, the best time for choosing security technologies is near the end of the cyber resiliency analysis process. Making technology choices too early often leads to spending resources on technology that is not effective in the context of the overall scope of increasing resilience. Or it leads to missing the chance to allocate resources where they matter the most.

For our example, you can probably recognize that some of these capabilities described above fall within Endpoint Detection and Response solutions. EDR is an excellent choice for implementing Analytic Monitoring especially for endpoints (physical or virtual). It enables monitoring of events across all endpoints in the infrastructure, strong analytics capabilities, and detailed incident investigation to get a clear picture of adversarial TTPs.

What (pure) EDR is missing in the context of the Analytic Monitoring cyber resilience technique, is the sensor fusion (EDR is focused on endpoint only). However, EDR is expanding to include data from other infrastructure elements: like network and email. This is the eXtended Detection and Response (XDR) solution. XDR provides detection and response capabilities for a much larger area of the enterprise infrastructure and scores well for Analytic Monitoring cyber resilience technique. In the case of our example, it is a good technology to consider.

As mentioned, enhancing cyber resilience may require both adding/replacing technology and changing processes. An organization could build the corresponding processes for analytic monitoring in-house or outsource to a third party. For operating an EDR/XDR solution, an enterprise should have an internal security operations team but may also consider using Managed Detection and Response (MDR) as an alternative. MDR includes both the technology and high-level security expertise to deliver security outcomes that map directly to cyber resilience objectives.

This example provides just one option for implementing the Analytic Monitoring cyber-resilience technique. An organization should always consider multiple alternatives and feed them into the last step of the Cyber Resilience Analysis process – that is value of using the framework. Solutions will be assessed in the light of the larger context to identify the best recommended course of action. This process should be repeated and applied regularly to keep pace with cyber resiliency needs as the threat landscape continues to evolve.

Wrapping up the series, the three blogs covered some important practical aspects to consider for enhancing the cyber resilience of the organization. In the first blog I covered the four key characteristics (or guiding principles) of cyber resilience while in the second I reviewed the main objectives and the five-step Cyber Resilience Analysis methodology. The last part was dedicated to how an organization should approach the task of identifying the best solutions to apply for enhancing the resilience of the organization when faced with common and advanced cyber threats.

Initially posted on Bitdefender Business Insights: https://businessinsights.bitdefender.com/cyber-resilience-developing-solutions

A Practical Approach to Cyber Resilience – The five-step process (Part 2 of 3)

This is the second of a 3-blog series on Practical Cyber Resilience. In the first part, I covered the four key characteristics (or guiding principles) of cyber resilience. In this blog we will review the main objectives and 5-step Cyber Resilience Analysis methodology, as defined by the NIST Special Publication 800-160, Developing Cyber Resilient Systems.

Within the context of this framework, cyber resilience efforts should focus on four key goals: Anticipate, Withstand, Recover from incidents, and Adapt. Sometimes with different wording, these goals are included in most cyber-resilience definitions. But their meaning is always the same:

  • Anticipate – maintain a state of informed preparedness for adversity.
  • Withstand – continue essential mission or business functions despite adversity.
  • Recover – restore mission or business functions during and after adversity.
  • Adapt – modify business functions and/or support capabilities to predicted changes in the technical, operational, or threat environments.

Because cyber resiliency is a concern at multiple levels in an organization, the four goals are essential in providing linkage between various functions and levels of the organization such as program managers, mission owners or cyber defenders. These different audiences need to learn whether cyber resources for which they are responsible for, or which they depend on, are sufficiently resilient against advanced cyber threats and, if not, what can be done to improve resiliency.

To help achieve the goals, NIST provides a structured approach in the form of the cyber resiliency analysis process. In developing this process, NIST leveraged previous work done by MITRE: The Structured Cyber Resiliency Analysis Methodology (SCRAM). Both methodologies rely on five key steps:

  1. Understand the context
  2. Establish the initial cyber resiliency baseline
  3. Analyze the systems
  4. Define and analyze specific alternatives
  5. Develop recommendations

Each step focuses on a specific problem:

Step 1: What do we care about? This step establishes the purpose of the cyber resiliency analysis. Those performing the analysis and the stakeholders who will use the results of the analysis must establish a common understanding of the context. They must agree on what information will be provided to analysts and on what will be assumed. They also must identify factors that constrain the selection of cyber resiliency solutions.

Step 2: What can we build on? As I mentioned in a previous blog, cyber resiliency overlaps with cybersecurity but also with other business continuity planning efforts. Activities in this step establish a baseline assessment of the system, which includes existing capabilities that can contribute to cyber resiliency.

Step 3: How do cyber risks affect overall business risks? Now is the moment to have a closer look at the business architecture (including systems architecture) to identify how advanced cyber attackers, by taking advantage of architectural and design decisions, could affect the business effectiveness. In other words, this is risk analysis.

Step 4: What could we do to improve cyber resilience? A wide variety of cyber resiliency techniques, with corresponding approaches and technologies, can be identified. Some of these will and some will not be feasible in the context for which the cyber resiliency analysis is performed. Activities in this step identify and analyze specific alternatives for improving cyber resiliency.

Step 5: What do we recommend? Cyber resiliency techniques are interdependent and interact with techniques for cybersecurity and business continuity. Thus, we need to analyze combinations of specific alternatives and provide potential courses of action. All of these in the context of the constraining factors identified earlier. This step produces recommendations consistent with the defined purpose of the cyber resilience analysis.

What is obvious looking at these steps is the criticality of stakeholder engagement. Program management office, user community, operations, security, all need to be engaged in various stages of the process. Without strong engagement of these stakeholders, the results of the analysis can easily become useless.

Not so obvious is the complexity hidden behind the five steps. To help on executing the process, NIST (and MITRE SCRAM) includes detailed activities that need to be carried out in each step.

While the diagram looks busy, keep in mind that this is a blueprint, a general approach that can and should be tailored for the needs of each organization.

In the final part of this blog series, I will cover approaches, techniques, and technologies to be considered when developing specific alternatives to improve resilience.

Initially posted on Bitdefender Business Insights:  https://businessinsights.bitdefender.com/practical-approach-cyber-resilience-the-five-step-process-2

Three takeaways for a Small Business from the Microsoft Exchange hack

I heard this so many times: “My company is too small to be the target of an advanced attack”. Unfortunately, this is not true and the recent cyber-attacks on Microsoft Exchange servers clearly show it. Compared to the recent SolarWinds Orion security breach that directly affected mostly large organizations, the Exchange vulnerabilities were used to attack in excess of 30.000 organizations in the US alone, mostly small businesses and local government offices. 

Here are the three lessons that a small business should learn from this incident:

  1. Every organization (and person) is a potential victim of advanced cyber-threats. This highly automated attack that used four zero-day vulnerabilities shows that virtually no organization (large or small) is safe. Either to be used as a pivot point toward larger targets or simply by chance, it is only a matter of time until a sophisticated attack will “knock” on the doors.
  2. Cloud services are a safer choice, especially for small organizations. This is due to at least two reasons. First, many software providers (Microsoft included) have a “cloud-first” policy. That means the cloud solutions will get the new features, enhancements, and even bug fixes first. For example, in this case, the Microsoft Exchange Online is not affected by the attack. Additionally, the large cloud infrastructures benefit from the most advanced security options in the market and are staffed with the “creme-de-la-creme” in terms of cybersecurity personnel. Does this make them bullet-proof? No, but the likelihood of a breach is smaller. Second reason: small organizations are typically slow in applying security patches even when these become available. Many of the Microsoft Exchange servers affected by the zero-day vulnerabilities exploited in this attack will remain unpatched for months, leaving them vulnerable to attacks.
  3. Cybersecurity is getting professionalized. Highly professionalized. Advanced attacks are becoming increasingly common and are affecting a large number of organizations around the world. Basic cybersecurity skills are no match for the security challenges of today’s world. Small organizations cannot typically afford to spend resources on skilled cybersecurity professionals (not to mention that we are currently facing a significant shortage of cyber defense talents). Alongside the use of cloud services instead of on-premises infrastructure, an SMB should also consider relying on Managed Security Services and Managed Detection and Response Services to keep their IT infrastructure running and secure.

These three points should be considered for increasing the cyber-resiliency of the organization. But they are NOT replacing the actions required to check if your infrastructure was affected by the attack. For more context on the breach and the recommended remediation steps check this Microsoft blog post.

A Practical Approach to Cyber Resilience – Part 1 of a 3 Part Series

In a previous blog, I looked at the key differences between cybersecurity and cyber-resilience, and why cyber-resilience is a better approach for organizations to follow in 2021 because it is holistic.

The IT cyber-resilience is a complex objective requiring a solid understanding and a structured approach. NIST Special Publication 800-160, Developing Cyber Resilient Systems, is one the most comprehensive resources available for those enrolled on this journey. Although a bit difficult to navigate, the value of this publication is in its ability to provide the why, the what, and indications for how to approach the topic of cyber resilience.

Over the course of several blogs, I will extract several key learnings, with practical value for any organization looking to improve their resiliency to attacks.

NIST defines cyber-resilience as “the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.” The systems and environments that are cyber-resilient can withstand cyber-attacks, faults, and failures and can continue to operate even in a degraded or debilitated state. Also, of great importance, they can continue delivering mission-essential functions while ensuring that safety and information security are preserved during an incident.

To bring further clarity on the topic, four key cyber resilience characteristics (or guiding principles) are defined within the framework:

  • Focus on the mission or key business functions
  • Focus on the effects of Advanced Persistent Threats (APTs)
  • Assume an adversary will compromise or breach the system or organization
  • Assume an adversary will maintain a presence in the system or organization

Why are these principles important? They have a special practical significance as they help to correctly frame any approach to cyber-resilience. Here is what these characteristics are stating:

  1. Focus on the mission or key business functions – Cyber resiliency initiatives must focus on the capabilities supporting organizational missions or key business functions. Critical business elements should continue operating despite an attacker’s presence in systems and infrastructure, threatening mission-critical systems, and system components.
  2. Focus on the effects of APTs – Cyber resiliency has in scope all threats related to systems, but the focus must be on the effects of APT. Why APTs? Because of the persistence and long-term effects on the organization. The longer an attacker dwell time, the higher the likelihood to access sensitive data or influence the behavior of systems in ways that can directly or indirectly inflict damage to the organization.
  3. Assume an adversary will compromise or breach the system or organization – The framework states that a sophisticated adversary cannot always be kept out of a system or be quickly detected and removed, despite the quality of the system design and the functional effectiveness of the security components. This assumption acknowledges that modern systems are large and complex, and adversaries will always be able to find and exploit weaknesses in the systems, environments, or supply chains.
  4. Assume an adversary will maintain a presence in the system or organization – Lastly, any discussion on cyber resiliency must assume that the adversary presence may be a long-term issue because of the stealthy nature of the APTs. An extreme example is the attack on a major hotel chain’s reservation system that started in 2014 and maintained persistence for four years, before being detected.

In other words, any cyber-resilience initiative should be focused on advanced attacks that target critical business functions, with a special consideration for the attacker’s stealthy actions and persistence in the environment. These are key premises that organization looking to improve its cyber resilience should always consider.

In the next part of this series, I will explore the 5 steps Cyber Resiliency Analysis Process and provide a practical and effective way to address cyber resiliency.

To learn more on the importance of cyber resilience for organizations and how to improve the ability to withstand advanced threats, check-out the on-demand webinar: How to increase the cyber-resilience of your business.

Initially posted on Bitdefender Business Insights: https://businessinsights.bitdefender.com/practical-approach-to-cyber-resilience-1

Cybersecurity or Cyber-resilience: Which one should be the prime objective for 2021?

Given the increased dependency on digital technologies for daily operations it’s not a surprise that organizations are concerned about cyber threats and the risks these are posing to their operations. But what is the best approach to this problem? Should an organization focus on cybersecurity or on cyber-resilience? Which of the two can be consider a prime objective for 2021? 

Cybersecurity is the more established term of the two and refers to the people, technologies and processes that serve as the line of defense against threats. Cybersecurity is centered on the idea that attacks can be prevented. It creates the expectation that the organization will be able to avoid being hit by attackers and it will not suffer cyber-breaches. Although preventing breaches from happening is something everyone wants, 100% protection effectiveness is not achievable. The recent years proved again and again that cyber threats are getting increasingly sophisticated and organizations, as well as individuals, are affected in a direct or indirect manner. 

Opposite to the core idea of preventing breaches, cyber-resilience is centered on the principle that some attacks will go through and the organizations must prepare themselves to quickly and effectively deal with the consequences. Cyber-resilience represents the organization’s ability to avoid, prepare for, respond, and recover after a cyber attack. Being ready to respond to security incidents, enables organizations to mitigate the consequences of cyber breaches and quickly resume the normal state of business operations. This make cyber-resilience an integral part of business continuity planning. 

What are the steps an organization should take to improve cyber-resiliency? The comprehensive path is through a cybersecurity program that addresses key four phases: preparation, detection, response, and recovery from an attack. When implemented thoroughly, this four-phase framework enhances the organization’s capacity to sustain operations through a cyber-attack while minimizing both disruption and reputational harm. A very good resource for the organizations on the way to cyber-resilience is the NIST Special Publication 800-160.

In conclusion, what is the best way forward? Are cybersecurity and cyber-resilience fully distinct approaches? Not completely. Both cybersecurity and cyber-resilience strive to limit the effects of cyber threats on businesses. They have in common some of the tools, processes and procedures. Both are good objectives for organizations to focus on, but cyber-resilience offers a holistic and more realistic approach. That makes it a more suitable (and an achievable) objective for organizations to follow in 2021 and beyond.