The cyber security threat landscape is constantly changing with the ever growing number and scale of attacks. The consequent measures necessary to combat the threats need to be robust, comprehensive and agile. Simply put, it is about developing an effective approach and constantly testing and refining it. The sections below cover the second 5 sections of some 10 essential recommended steps that should be taken to achieve an effective level of cybersecurity and is based on guidance from NCSC.
Incident Management
A security incident is inevitable for all organisations. An effective systems of incident management policies and processes will reduce any likely impact, enable speedier recovery and improve business resilience. Without an effective management system in place, some of the possible risks of an attack include;
- Greater business impact of an attack through failure to realise the attack early enough and consequent slowness to respond resulting in more significant and ongoing impact
- Potential for continuous or repeated disruption due to failure to find the root cause
- Failure to conform with legal and regulatory standards which could result in financial penalties
- Establish an incident management capability using in-house or specialist external service provider, create a plan and test its effectiveness.
- Define reporting requirements
- Define roles and arrange specialist training to ensure the correct skill base
- Establish and regularly test a data recovery strategy including offsite recovery
- Collect and analyse post incident evidence for root cause analysis, lessons learned and evidence for crime and/or compliance reporting
- Create and implement effective malware policies
- Control import and export of data and incorporate malware scanning
- Use blacklisting to block access to known malicious sites
- Establish a defence in depth approach which includes security controls for endpoints, anti-virus, content filtering to detect malicious code, disable browser plugins and auto run features, ensure baseline security configurations are in place
- Users should be educated regularly to understand the risk of malware, their role in preventing it and the procedure for incident reporting
- Develop and implement a monitoring strategy based on the business risk assessment
- Ensure that all systems are monitored, should include the ability to detect known attacks as well as having heuristic capabilities
- Monitor network traffic to identify unusual traffic or large uncharacteristic data transfers
- Monitor user activity for unauthorised use of systems
- Fine tune monitoring systems to collect relevant events and alerts
- Deploy a centralised logging solution with collection and analysis capability, and automated anomaly and high priority alerts
- Align policies and processes to manage and respond to incidents detected by monitoring systems
- Devise and implement a policy to govern the use of removable media. A standard for information exchanged on corporate systems should use appropriate and protected measures
- If essential, the use of removable media should be limited only to designated devices
- Automatically scan removable media for malware before any data transfer
- Issue removable media formally to users and prohibit use of personal media sticks
- Encrypt information at rest on removable media
- Manage reuse and disposal of media to ensure data is effectively deleted or media destroyed and data retrieval prevented
- Create a robust policy to address the risk, this should include identifying who is authorised, what kind of information they can access, increased monitoring for remote connections
- User training to include; awareness of the risks, securely storing and managing credentials, incident reporting
- Develop and apply a secure baseline for remote devices
- Encrypt data at rest and data in transit for remote/mobile devices