<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Baptistin Buchet, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/baptistin-buchet/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/baptistin-buchet/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 18 Jul 2024 09:00:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Baptistin Buchet, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/baptistin-buchet/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Timeline Update: CMMC 2.0 and the Phenomenon of Midnight Rulemaking</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/#respond</comments>
		
		<dc:creator><![CDATA[Baptistin Buchet]]></dc:creator>
		<pubDate>Wed, 17 Jul 2024 10:12:40 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[Cybersecurity Maturity Model Certification]]></category>
		<category><![CDATA[Department of Defense]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[FCI]]></category>
		<category><![CDATA[Midnight Rulemaking]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[supply chain attacks]]></category>
		<category><![CDATA[third party]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23608</guid>

					<description><![CDATA[<p>Not familiar with CMMC 2.0? For more information regarding CMMC 2.0, please refer to this article. The Cybersecurity Maturity Model Certification (CMMC) is a comprehensive framework designed to protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI), shared with...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/">Timeline Update: CMMC 2.0 and the Phenomenon of Midnight Rulemaking</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><em>Not familiar with CMMC 2.0? For more information regarding CMMC 2.0, please refer to </em><a href="https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/"><em>this article</em></a><em>.</em></p>
<p style="text-align: justify;">The Cybersecurity Maturity Model Certification (CMMC) is a <strong>comprehensive framework </strong>designed to <strong>protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI), shared with contractors and subcontractors </strong>of the <strong>Department of Defense (DoD) </strong>through acquisition programs<strong>, as defined by Executive Order 13556</strong>.</p>
<p style="text-align: justify;">The CMMC 2.0 Proposed Rule, published on December 26, 2023, represents the latest evolution of the CMMC cybersecurity model.</p>
<p style="text-align: justify;">On June 27, 2024, after adjudicating nearly 2,000 comments, following a 60-day open-comment period, the <a href="https://cmmcinfo.org/cmmc-regulations-move-closer-to-final/">DoD submitted a draft of the CMMC 2.0 Final Rule</a> (32 CFR) to the Office of Information and Regulatory Affairs (OIRA) at the White House.</p>
<p style="text-align: justify;"><strong>The summited draft represents <span style="font-weight: normal !msorm;">the </span>final step before the CMMC 2.0 rule is published<span style="font-weight: normal !msorm;"> in the Federal Register</span>. As the final draft has been submitted the<span style="font-weight: normal !msorm;"> focus </span>now <span style="font-weight: normal !msorm;">shifts to the timeline for </span>when the CMMC 2.0 regulation will take effect and be enforced.</strong></p>
<p style="text-align: justify;">Before addressing this shift in focus, it is essential to understand that the security requirements, upon which CMMC 2.0 Level 2 is founded (NIST SP 800-171), <strong>have been mandatory</strong> for DoD contractors handling sensitive information <strong>since December 2017</strong>, when the DFARS clause 252.204-7012 was included in DoD contracts. However, during this period, compliance mostly relied on self-attestation <strong>without a robust enforcement mechanism</strong>, leaving the <strong>DoD unable to verify adherence.</strong> As a result, many contractors <span style="font-weight: normal !msorm;"><strong>neglected</strong></span> to fully implement the required controls.</p>
<p style="text-align: justify;">To address this issue, the DoD launched the <strong>CMMC program</strong>, which essentially serves as the <strong>mechanism through which the DoD will verify compliance</strong> with the requirements outlined in DFARS clause 252.204-7012 (NIST SP 800-171), mandated in contracts since 2017.</p>
<p style="text-align: justify;">As the DoD puts it: &#8220;<a href="https://www.federalregister.gov/documents/2023/12/26/2023-27280/cybersecurity-maturity-model-certification-cmmc-program"><em>A key difference between the DFARS 252.204-7012 and CMMC Level 2 requirements is that compliance with NIST SP 800-171 under DFARS 252.204-7012 has not been consistently verified. <strong>Under CMMC, compliance will be checked by independent third-party assessors certified by DoD</strong></em></a><strong><em>.</em></strong>&#8220;</p>
<p style="text-align: justify;">The <strong>significant change</strong> <strong>introduced by CMMC</strong>, requires contractors to <strong>obtain certification through assessments</strong> conducted by a CMMC Third Party Assessment Organization (C3PAO) to <strong>demonstrate compliance</strong> to retain and secure DoD contracts.</p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #50067a;"><strong>CMMC Rulemaking Timeline</strong></span></h2>
<p style="text-align: justify;">The CMMC rulemaking timeline is summarized below based on publicly available information as of July 17, 2024.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-23612" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN.png" alt="" width="3935" height="1545" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN.png 3935w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-437x172.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-768x302.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-1536x603.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/Timeline-EN-2048x804.png 2048w" sizes="(max-width: 3935px) 100vw, 3935px" /></p>
<p style="text-align: justify;">As with all federal regulations, CMMC requires a legal basis for implementation. Therefore, to determine when the CMMC 2.0 regulation will come into effect, we need to understand the rulemaking process behind CMMC 2.0, involving two rules from the <a href="https://www.ecfr.gov/">Code of Federal Regulations</a>: 32 CFR and 48 CFR.</p>
<p style="text-align: justify;">For the CMMC 2.0 regulation to come fully into effect, <strong>two things need to happen</strong>.</p>
<ol style="text-align: justify;">
<li>The <a href="https://www.reginfo.gov/public/do/eAgendaViewRule?pubId=202210&amp;RIN=0790-AL49">32 CFR CMMC</a> Final Rule has to come into effect. This rule outlines and codifies the CMMC program and will allow CMMC third-party assessments to begin, known as the &#8220;<strong>market rollout</strong>&#8220;.</li>
</ol>
<p style="text-align: justify;">The 32 CFR CMMC Final Rule is estimated to be published no later than October 26, 2024, after OIRA&#8217;s review of up to 120 days, and will come into <strong>effect approximately 60 days later, in late Q3 or early Q4 2024</strong>.</p>
<ol style="text-align: justify;" start="2">
<li><a href="https://www.reginfo.gov/public/do/eAgendaViewRule?pubId=202210&amp;RIN=0750-AK81">48 CFR CMMC</a> Final Rule must come into effect. This rule revises the DFARS clause 252.204-7021 to point to the CMMC program (32 CFR) and will introduce CMMC compliance as a contractual clause gradually over 3 years, known as the &#8220;<strong>phased rollout</strong>&#8220;.</li>
</ol>
<p style="text-align: justify;">The 48 CFR Proposed Rule was <strong>submitted to OIRA</strong> in May 2024. After a 90 to 120-day regulatory review and an initial 60-day public comment period, the Proposed Rule will undergo another 60-day public comment period, followed by a Final Rule review and adjudication process, estimated to take 150 to 280 business days. The 48 CFR Final Rule is <strong>expected to come into effect around Q3 or Q4 2025</strong> but could be sooner, as it revises an existing, small clause (DFARS clause 252.204-7021).</p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #50067a;"><strong>The 32 CFR is the Starting Gun for the CMMC Race</strong></span></h2>
<p style="text-align: justify;">While the effective date of the 48 CFR Final Rule (expected in Q3 or Q4 2025) will determine when the CMMC 2.0 regulation is mandatorily included in contracts, known as the &#8220;<strong>phase-rollout</strong>,&#8221; it&#8217;s a <strong>significant misconception</strong> that the pivotal milestone for the start of the CMMC race is the effective date of the 48 CFR.</p>
<p style="text-align: justify;">Indeed, the <strong>kickoff for the CMMC race will be determined by the effective date of the 32 CFR Final Rule</strong> (expected late Q3 or early Q4 2024), not the 48 CFR Final Rule.</p>
<p style="text-align: justify;">The 32 CFR Final Rule will trigger the &#8220;<strong>market rollout</strong>&#8220;, which will <strong>allow CMMC assessments to begin</strong>. Once these assessments are available, prime contractors (e.g., Lockheed Martin, Boeing, Raytheon) will likely <strong>require subcontractors to obtain CMMC certification</strong> as soon as possible, <strong>well before DoD does </strong>through the &#8220;<strong>phased rollout</strong>&#8220;, to maintain their competitive edge and mitigate the risk of non-certified suppliers jeopardizing their own certification status.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-23615" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN.png" alt="" width="3100" height="2277" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN.png 3100w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-260x191.png 260w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-53x39.png 53w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-768x564.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-1536x1128.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/07/32-CFR-EN-2048x1504.png 2048w" sizes="(max-width: 3100px) 100vw, 3100px" /></p>
<p> </p>
<h2 style="text-align: justify;"><span style="color: #50067a;"><strong>Midnight Rulemaking and CMMC 2.0</strong></span></h2>
<p style="text-align: justify;">In the past 6 months, there has been a <strong>notable acceleration in the CMMC rulemaking process</strong>. This is evident in several key milestones, including the publication of the 32 CFR Proposed Rule in December 2023, the submission of a 48 CFR Proposed Rule to OIRA in May 2024, and most recently, the submission of the 32 CFR Final Rule to OIRA in June 2024. This <strong>phenomenon is often referred to as </strong>&#8220;<a href="https://www.gao.gov/products/gao-23-105510">Midnight Rulemaking</a>&#8220;, which describes the rush to finalize regulations in the final months before a presidential administration concludes.</p>
<p style="text-align: justify;">Thus, if we anticipate the 32 CFR Final Rule to be finalized and effective in late Q3 or early Q4 2024, given the Department of Defense&#8217;s strong motivation to complete the CMMC regulations before the U.S. 2024 elections, there is a very strong possibility it will <strong>become effective before November 5, 2024</strong>.</p>
<p> </p>
<h2 style="text-align: justify;"><strong><span style="color: #50067a;">Don’t Wait for the Starting Gun to Begin the CMMC Compliance Journey</span></strong></h2>
<p style="text-align: justify;">The DoD anticipates that it will take <a href="https://www.federalregister.gov/documents/2023/12/26/2023-27280/cybersecurity-maturity-model-certification-cmmc-program">two years</a> for companies with existing contracts to become CMMC certified, <strong>assuming they have already implemented the NIST SP 800-171 Rev. 2 requirements </strong>as per DFARS clause 252.204-7012. This extended timeline is due to several factors:</p>
<ol style="text-align: justify;">
<li>Once 32 CFR becomes effective, CMMC third-party assessments for CMMC Level 2 will commence, requiring organizations to achieve <strong>100% self-attestation readiness before undergoing assessment</strong>. This preparatory phase demands significant time and effort.</li>
<li>On average, organizations <strong>spend between 12 to 18 months preparing</strong> for a CMMC Level 2 assessment.</li>
<li>Due to a <strong>shortage</strong> of CMMC assessors, organizations may expect to <strong>wait approximately 9 to 15 months</strong> (3 to 5 quarters) for a CMMC assessment.</li>
</ol>
<p style="text-align: justify;">Therefore, to stay prepared for future DoD contract opportunities and maintain a competitive edge, it is recommended that organizations <strong>begin their CMMC compliance process today. </strong></p>
<p style="text-align: justify;">Feel free to <a href="https://www.wavestone.com/en/get-in-touch/">reach out</a> to discuss your CMMC journey with us and explore how #Wavestone can assist you in navigating the intricate landscape of CMMC 2.0 compliance, supporting your path to certification, and enhancing your cybersecurity readiness into a strategic advantage.</p>
<h3 style="text-align: justify;"><strong>Our CMMC 2.0 Compliance Services:</strong></h3>
<ol style="text-align: justify;">
<li><u>CUI Identification:</u>
<ul>
<li>We assist in identifying Controlled Unclassified Information (CUI) within your organization to ensure compliance with CMMC requirements.</li>
</ul>
</li>
<li><u>CMMC Assessment Scope Identification:</u>
<ul>
<li>We help define and minimize your CMMC Assessment Scope to stay cost-effective and pragmatic. By clearly identifying the scope, we ensure that all necessary systems and processes are included while avoiding unnecessary complexity and costs.</li>
</ul>
</li>
<li><u>CMMC Readiness Assessments</u>:
<ul>
<li>Our experts conduct CMMC Level 1 and 2 readiness assessments, evaluating your current state against the respective assessment objectives (e.g., NIST SP 800-171A) to provide you with actionable recommendations.</li>
</ul>
</li>
<li><u>CMMC Compliance Roadmap Definition</u>:
<ul>
<li>We work with you to define a clear roadmap to achieve CMMC compliance, tailored to your needs, whether for CMMC clusters or all-in scenarios.</li>
</ul>
</li>
<li><u>CMMC Implementation Support</u>:
<ul>
<li>We offer comprehensive guidance and support throughout the implementation phase, helping you effectively integrate the required controls and reach CMMC 2.0 compliance.</li>
</ul>
</li>
</ol>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/">Timeline Update: CMMC 2.0 and the Phenomenon of Midnight Rulemaking</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/07/timeline-update-cmmc-2-0-and-the-phenomenon-of-midnight-rulemaking/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The DoD Strikes Back: Enhancing Supply Chain Cybersecurity with CMMC 2.0</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/#respond</comments>
		
		<dc:creator><![CDATA[Baptistin Buchet]]></dc:creator>
		<pubDate>Wed, 24 Apr 2024 08:25:00 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[CMMC]]></category>
		<category><![CDATA[CUI]]></category>
		<category><![CDATA[Cybersecurity Maturity Model Certification]]></category>
		<category><![CDATA[DoD]]></category>
		<category><![CDATA[FCI]]></category>
		<category><![CDATA[règlementation]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[Supply-chain attacks]]></category>
		<category><![CDATA[third party]]></category>
		<category><![CDATA[TPRM]]></category>
		<category><![CDATA[US Department of Defense]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23048</guid>

					<description><![CDATA[<p>In late October 2023, a third-party data breach incident sent shockwaves through the business world, affecting over 57,000 entities engaged in business with Bank of America. This breach exposed sensitive personal and financial information, underscoring the pivotal role that third-party...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/">The DoD Strikes Back: Enhancing Supply Chain Cybersecurity with CMMC 2.0</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">In late October 2023, a <span style="color: #53548a;"><strong>third-party data breach incident</strong> </span>sent shockwaves through the business world, affecting over <span style="color: #53548a;"><strong>57,000 entities</strong></span> engaged in business with <span style="color: #53548a;"><strong>Bank of America</strong>.</span> This breach exposed sensitive personal and financial information, underscoring the pivotal role that third-party suppliers play in an organization’s cybersecurity infrastructure.</p>
<p style="text-align: justify;">These incidents, commonly referred to as “<span style="color: #53548a;"><strong>supply-chain attacks</strong></span>”, involve targeting an organization’s downstream <span style="color: #53548a;"><strong>third parties</strong></span> (e.g., partners, vendors) to gain access to valuable systems. In the Bank of America case, the compromised third party responsible for this breach, was Infosys McCamish Systems (IMS), an insurance process management services provider.</p>
<p style="text-align: justify;">This breach resonates with the infamous <span style="color: #53548a;"><strong>SolarWinds</strong> </span>cyberattack, where Nobelium hackers inserted malicious code into the SolarWinds Orion platform, enabling them to infiltrate numerous government systems, including the U.S.’ Homeland Security, State, Commerce, and Treasury, as well as private systems worldwide.</p>
<p style="text-align: justify;">As corporate IT architectures are arguably a mere reflection of a company’s intricate web of business relationships, these events serve as a stark reminder that <span style="color: #53548a;"><strong>organizations are not isolated entities</strong> </span>but rather <span style="color: #53548a;"><strong>hubs of interconnected and co-dependent partners</strong> </span>and third parties. Achieving a robust cybersecurity posture requires more than individual efforts; it demands cultivating a <span style="color: #53548a;"><strong>secure ecosystem</strong></span> of thoroughly vetted trusted partners to effectively safeguard the entire supply chain required for product delivery (TPRM).</p>
<p style="text-align: justify;">However, building such an ecosystem poses challenges. Many companies lack the resources to exclusively select leading, cutting-edge, and trusted third parties or may lack the leverage to demand transparency from existing partners.</p>
<p style="text-align: justify;">Drawing lessons from the SolarWinds cyberattack, and amid heightened geopolitical tensions (see <a href="https://www.wsj.com/politics/national-security/fbi-director-says-china-cyberattacks-on-u-s-infrastructure-now-at-unprecedented-scale-c8de5983">Chinese cyberattacks on U.S. infrastructure at an unprecedented scale</a>), the Department of Defense recognized this challenge and responded with the development of a solution for securing the supply-chain ecosystem of the Defense Industrial Base (DIB) called the <span style="color: #53548a;"><strong>CMMC</strong></span>.</p>
<p style="text-align: justify;">The Cybersecurity Maturity Model Certification (CMMC) is a <span style="color: #53548a;"><strong>comprehensive framework </strong></span>designed to <span style="color: #53548a;"><strong>protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI)</strong></span>, that is <strong><span style="color: #53548a;">shared with contractors and subcontractors of the Department of Defense (DoD) </span></strong>through acquisition programs.</p>
<p style="text-align: justify;">The CMMC 2.0 Proposed Rule Release, published on December 26, 2023, represents the latest evolution of the CMMC cybersecurity model, poised to supplant the preceding CMMC 1.0 with a <span style="color: #53548a;"><strong>more pragmatic approach</strong></span>. Following its release, the proposed policy underwent a <span style="color: #53548a;"><strong>60-day open-comment period</strong></span>, which <span style="color: #53548a;"><strong>concluded on February 26, 2024</strong>.</span> The new regulation is anticipated <span style="color: #666699;"><strong>to <span class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak" dir="ltr">be finalized by late 2024 or early 2025</span>.</strong></span></p>
<p style="text-align: justify;">The CMMC 2.0 is aimed at <span style="color: #53548a;"><strong>safeguarding sensitive national security information</strong></span> by protecting the Defense Industrial Base&#8217;s (DIB) sensitive unclassified information from frequent and increasingly complex cyberattacks. It streamlines requirements to <span style="color: #53548a;"><strong>three levels </strong></span>of compliance and aligns the requirements at each level with well-known and widely accepted NIST cybersecurity standards. The specific security requirements and assessment types (self-assessment, third-party assessment, or DoD assessment) vary based on the level.</p>
<ul style="text-align: justify;">
<li><span style="color: #53548a;"><strong>Foundational</strong> </span>(Level 1): Targets organizations handling FCI (e.g., contract performance reports, organizational charts). Compliance mandates strict adherence to the 15 security requirements outlined in FAR clause 52.204-21, through an annual self-assessment.</li>
<li><span style="color: #53548a;"><strong>Advanced</strong> </span>(Level 2): Targets organizations handling CUI, including Controlled Technical Information, DoD Critical Infrastructure Security Information, Naval Nuclear Propulsion Information, and Personally Identifiable Information (PIIs). Compliance requires adherence to 110 security requirements based on NIST SP 800-171 Rev. 2. Assessments are conducted by third-party organizations known as CMMC Third Party Assessment Organizations (C3PAO) tri-annually or through an annual self-assessment, depending on the sensitivity of the underlying CUIs.</li>
<li><span style="color: #53548a;"><strong>Expert</strong> </span>(Level 3): Targets organizations handling CUI for DoD programs with the highest priority. Compliance entails adhering to the 110 security requirements based on NIST SP 800-171 Rev 2 and an <span style="color: #53548a;"><strong>additional 24 security requirements</strong></span> based on NIST SP 800-172. These organizations undergo tri-annual assessments conducted by the DoD’s Defense Industrial Base Cybersecurity Assessment Center (DIBCAC).</li>
</ul>
<p style="text-align: justify;">Organizations must obtain a CMMC Level 2 Final Certification before scheduling a DIBCAC assessment for CMMC Level 3.</p>
<p style="text-align: justify;">The results of all assessments conducted on DIB organizations are consolidated within the <strong><span style="color: #53548a;">Supplier Performance Risk System (SPRS)</span></strong>. The SPRS (pronounced “Spurs”) is Department of Defense’s web platform that collects, processes, and retrieves data on supplier performance within the Defense Industrial Base, enabling the DoD to map the DIB&#8217;s business network cyber maturity, assess supplier performance, and evaluate risks related to contractual obligations.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-23041" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN.png" alt="" width="3557" height="1719" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN.png 3557w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-768x371.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-1536x742.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/04/CMMC-EN-2048x990.png 2048w" sizes="(max-width: 3557px) 100vw, 3557px" /></p>
<p style="text-align: justify;">By deploying this mandatory certification model, the DoD is at the forefront of establishing a comprehensive, secure, end-to-end supply chain framework within the DIB, hopefully enhancing long-term U.S. national security. Simultaneously, the DoD underscores that security is no longer optional; it is an integral aspect of business operations.</p>
<p><span style="color: #666699;"><strong>CMMC 2.0 assessments are expected to become available around Q4 2024</strong> </span>(once 32 CFR is finalized). <span style="color: #666699;"><strong>Prime contractors will expect sub-contractors to achieve CMMC compliance before Q3 2025</strong></span>, when CMMC 2.0 takes effect. Starting October 1, 2025, CMMC certification will be mandatory at the time of contract award.</p>
<p style="text-align: justify;"><strong> </strong></p>
<p style="text-align: justify;">If you require assistance navigating the intricate landscape of CMMC 2.0 compliance or need support on your path to certification, <span style="color: #53548a;"><strong>#Wavestone is ready to empower your journey</strong>.</span> Reach out today and elevate your cybersecurity readiness into a strategic advantage.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/">The DoD Strikes Back: Enhancing Supply Chain Cybersecurity with CMMC 2.0</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/04/the-dod-strikes-back-enhancing-supply-chain-cybersecurity-with-cmmc-2-0/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NIST and FSSCC Team Up for Financial Services Cybersecurity</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/08/nist-fsscc-team-up/</link>
		
		<dc:creator><![CDATA[Baptistin Buchet]]></dc:creator>
		<pubDate>Thu, 02 Aug 2018 16:07:22 +0000</pubDate>
				<category><![CDATA[Cyber for Financial Services]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[financial services cyber]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11151/</guid>

					<description><![CDATA[<p>The NIST Cybersecurity Framework (CSF) is widely recognized as a landmark in the evolution of the cybersecurity industry. Given the rapidly-changing cybersecurity landscape, it is vital to keep up-to-date with new developments. To this effect, NIST recently released the long-awaited...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/08/nist-fsscc-team-up/">NIST and FSSCC Team Up for Financial Services Cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The NIST Cybersecurity Framework (CSF) is widely recognized as a landmark in the evolution of the cybersecurity industry. Given the rapidly-changing cybersecurity landscape, it is vital to keep up-to-date with new developments. To this effect, NIST recently released the long-awaited version 1.1. However, more needs to be done.</p>
<p>In response to industry feedback, including Wavestone’s continuous involvement in the framework development (see our most recent contributions <a href="https://www.nist.gov/sites/default/files/documents/2018/01/31/2018-01-19_-_wavestone.pdf" target="_blank" rel="nofollow noopener noreferrer">here</a> and <a href="https://www.nist.gov/sites/default/files/documents/2017/04/21/2017-04-10_-_wavestone.pdf" target="_blank" rel="nofollow noopener noreferrer">here</a>), NIST is now working hard to allow the guidelines to more easily apply to organizations, thanks to sector-specific “Profiles” (e.g., <a href="https://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8183.pdf" target="_blank" rel="nofollow noopener noreferrer">Manufacturing Profile</a> released in September 2017).</p>
<p>The Financial Services Sector Coordinating Council (FSSCC) recently held a workshop hosted by NIST in Washington, D.C., to further develop the Financial Services Profile of the framework. It gathered not only industry members but also regulators such as the FED and the OCC. While it is still preliminary, here are few takeaways…</p>
<p>&nbsp;</p>
<h2><strong>A new risk-tiering methodology</strong></h2>
<p>First and foremost, the profile introduces the concept of risk tiering similar to that of the FFIEC <a href="https://www.ffiec.gov/cyberassessmenttool.htm" target="_blank" rel="nofollow noopener noreferrer">Cybersecurity Assessment Tool</a> (CAT), but with qualitative rather than quantitative criteria. It proposes thirteen questions to determine the organization’s criticality level from 1 (Critical) to 4 (Relevant) based on criteria such as systemic importance, as well as geographical and geopolitical considerations. This criticality level then determines applicable “diagnostic statements” to assess.</p>
<p>&nbsp;</p>
<figure id="post-11152 media-11152" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-11152 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image-1-1.png" alt="" width="1355" height="311" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image-1-1.png 1355w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image-1-1-437x100.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image-1-1-768x176.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image-1-1-71x16.png 71w" sizes="auto, (max-width: 1355px) 100vw, 1355px" /></figure>
<p>&nbsp;</p>
<p>The methodology aligns well with industry best practices and is tailored to financial services. However, the sequence of questions to determine an organization’s inherent risk is likely to have most if not all financial institutions rated at Level 1 or 2. For example, any organization collecting and/or managing end-consumer Personally Identifiable Information (PII) would be designated a Level 2: Significant risk. While coverage of PII and privacy in general is welcome in a context of increased privacy concerns, it may not be so relevant from an inherent risk perspective.</p>
<p>Qualitative assessments, such as the one proposed here, are relevant for smaller institutions, but bringing cybersecurity risk management practices closer in maturity to those of credit and market risk management would require leveraging quantitative assessment methodologies. The recent paper <a href="https://www.imf.org/en/Publications/WP/Issues/2018/06/22/Cyber-Risk-for-the-Financial-Sector-A-Framework-for-Quantitative-Assessment-45924" target="_blank" rel="nofollow noopener noreferrer">Cyber Risk for the Financial Sector: A Framework for Quantitative Assessment</a> from an IMF economist points in that direction.</p>
<p>&nbsp;</p>
<h2><strong>Significant changes to the Framework Core and diagnostic statements</strong></h2>
<p>The profile builds on to the Framework Core with two new functions: “Governance” and “Supply Chain/Dependency Management.” These additions put more emphasis on key areas, but at the cost of changing the well-known “Identify-Protect-Detect-Respond-Recover” structure, which is helpful for communicating with business and senior management.</p>
<p>The profile does not stop here, as it also increases the number of Categories and Subcategories, +8 and +20 respectively. While these additions are mostly relevant, they are not specific to Financial Services and could therefore be added to the Framework Core itself.</p>
<p>Based on this structure, the profile defines 300 diagnostic statements leveraging again the FFIEC CAT and other resources from NYS DFS, FSB, and CPMI-IOSCO.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-11154 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image2.png" alt="" width="1356" height="848" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image2.png 1356w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image2-305x191.png 305w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image2-768x480.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image2-62x39.png 62w" sizes="auto, (max-width: 1356px) 100vw, 1356px" /></p>
<p>&nbsp;</p>
<h2><strong>More precise assessment criteria</strong></h2>
<p>When utilizing the NIST CSF, the FFIEC CAT, or any other generic framework or tool, most firms at some point end up defining specific potential answers to assessment criteria. Indeed, firms may have protection mechanisms in place, but they may not be consistently deployed across all assets. Similarly, while a measure may not yet be in place, a clear path forward may have been defined. Such scenarios are relevant to reflect an organization’s cybersecurity maturity.</p>
<p>The profile addresses this issue by proposing seven possible answers which successfully address common scenarios: “Not Applicable,” “Yes,” “Yes-Risk Based,” “Yes-Compensating Controls Used,” “Partial-Ongoing Project w/Action Plan,” “Not Tested,” and “No.” This addition is certainly an important step toward more consistent framework use and a foundation for maturity measures across organizations and across industries.</p>
<p>&nbsp;</p>
<h2><strong>The need to think global</strong></h2>
<p>The proposed profile is currently presented as U.S.-centric. Indeed, most questions in the risk-tiering section and most diagnostic statement references relate to U.S. references. While this focus would be helpful for initial adoption in the U.S. market, it could be a barrier to expansion moving forward. Country-specific references are helpful, but the Profile itself should be kept as generic as possible, with U.S. references provided as add-ons only. FSSCC peers could then develop other add-ons at the country or region-level.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-11156 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image3.png" alt="" width="1358" height="167" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image3.png 1358w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image3-437x54.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image3-768x94.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/08/image3-71x9.png 71w" sizes="auto, (max-width: 1358px) 100vw, 1358px" /></p>
<p>&nbsp;</p>
<p>Moreover, the proposed profile must further address the challenge of managing different maturity levels across geographies. Given the pervasive nature of cyber risk, shouldn’t organizations ensure a consistent maturity across geographies unless sufficient segregation is ensured? As challenging as it sounds, the magnitude of risk certainly justifies this approach.</p>
<p>As regulations are introduced worldwide and organizations are more and more global, managing complexity and avoiding inconsistencies necessitate a common framework. The Financial Services Profile as intended by the FSSCC has an important role to play in this respect. More than a pragmatic approach to leverage the NIST CSF, it aims at greater regulatory harmonization and streamlined regulatory compliance efforts. It is laudable and certainly long-anticipated by organizations.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/08/nist-fsscc-team-up/">NIST and FSSCC Team Up for Financial Services Cybersecurity</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Lutte anti-DDoS : la technique ne suffit pas, organisons-nous !</title>
		<link>https://www.riskinsight-wavestone.com/en/2014/11/lutte-anti-ddos-technique-suffit-pas-organisons/</link>
		
		<dc:creator><![CDATA[Baptistin Buchet]]></dc:creator>
		<pubDate>Fri, 07 Nov 2014 09:34:34 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[attaque DDoS]]></category>
		<category><![CDATA[Cybercriminalité]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=5949</guid>

					<description><![CDATA[<p>Depuis quelques années, les attaques par déni de service distribué (Distributed Denial of Service) se sont démocratisées ; leur facilité d’accès et d’usage, leur efficacité prouvée et leur grande variété les propulsent aujourd’hui en tête des tactiques de diversion et...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/11/lutte-anti-ddos-technique-suffit-pas-organisons/">Lutte anti-DDoS : la technique ne suffit pas, organisons-nous !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Depuis quelques années, les attaques par déni de service distribué (Distributed Denial of Service) se sont démocratisées ; leur facilité d’accès et d’usage, leur efficacité prouvée et leur grande variété les propulsent aujourd’hui en tête des tactiques de diversion et des moyens d’atteinte à l’image. Une aubaine pour les cyber-attaquants qui font progresser à la fois la durée et la force des attaques.</em></p>
<p>Face à ce constat, les entreprises se sont rapidement interrogées sur les moyens de protection possibles.  Le marché s’est adapté. Aujourd’hui, deux stratégies se dessinent, entre solutions historiques manuelles et solutions novatrices hybrides (Cloud et/ou on-premise).</p>
<p>Une question se pose toutefois : la mise en œuvre d’une telle solution de protection, certes adaptée aux besoins, suffit-elle pour s’assurer d’une efficacité solide en cas d’attaque avérée ? La réponse est non !</p>
<p>Imaginez, vous avez subi pendant plusieurs jours les effets d’une attaque DDoS, avec des conséquences inacceptables pour le maintien de vos activités. Vous décidez de mettre en place une solution de protection ad hoc. Le projet démarre, vous choisissez une solution, elle est installée et fonctionne. Vous voilà enfin équipé d’une solution d’une efficacité prometteuse. Avec un simple ordre de bascule à donner à votre équipe de production ou à un fournisseur, la solution sera mise en route. Vous êtes confiant.</p>
<h2>Activation, surveillance, désactivation : les 3 piliers d’une stratégie de protection anti DDoS</h2>
<p>Pour autant, vous pourriez avoir oublié de répondre à un certain nombre de questions clés.</p>
<p>Sur quels critères de détection et à quels seuils serez-vous en mesure de passer l’ordre d’activation de la solution ? Serez-vous assez réactif pour qu’il ne soit pas trop tard vis-à-vis des impacts business ? L’échelle du temps DDoS est proche du ¼ d’heure&#8230; Une fois la solution activée, quelles seront les premières actions à entreprendre ? Avez-vous identifié ou contrôlerez-vous les effets de bord qu’elles pourront engendrer sur votre environnement de production ? Faudra-il communiquer aux clients, au réseau commercial ? Durant l’attaque, êtes-vous certain d’être apte à communiquer efficacement avec votre prestataire en charge de la solution ? Pourrez-vous aisément constater l’efficacité de ses services ? Connait-il votre contexte, votre infrastructure ? Est-il à jour des derniers changements pour éviter une protection partielle ? Par analogie avec l’ordre d’activation, saurez-vous quand et comment décider du retour à la normale ? Enfin, avez-vous suffisamment de visibilité pour déterminer si l’attaque continue ou non en amont des barrières défensives ?</p>
<p>Les retours d’expérience montrent que la mise en place d’une solution protectrice seule, sans réponse à l’ensemble de ces questions, ne suffit pas.</p>
<p>Aussi ne faut-il pas se cantonner à la simple souscription d’un service de protection : des moyens et des processus de détection, d’activation, de communication, d’arbitrage et retour à la normale devront être élaborés et régulièrement expérimentés. Les actions majeures devront être rigoureusement formalisées : le déclenchement de la solution de protection et le retour à la normale (qui décide, qui réalise, sur quelles informations, avec quelle réactivité…). Par ailleurs, le volet surveillance et gestion de crise pendant l’attaque ne doit pas être négligé (quels moyens pour vérifier que l’attaque a toujours lieu, avec quel effet, quels seuils/indicateurs pour déclencher les escalades).</p>
<h2>Tests et exercices : les garant de la bonne gestion d’une attaque DDoS</h2>
<p>Au-delà de la formalisation, trois types de tests s’avèrent indispensables.</p>
<p>Les plus simples sont les tests de « bascule à vide » : sans contrainte de temps particulière, il s’agit de mettre en action les différents modes opératoires liés à l’activation, au maintien ou à la désactivation de la solution de protection. Au-delà de permettre la formation des équipes concernées, ces tests permettent de juger la qualité des procédures techniques ; ils permettront également leur amélioration continue afin d’assurer au mieux leur efficacité en cas d’attaque.</p>
<p>Des tests de « bascule en conditions réelles » sont ensuite requis : à l’opposé de la « bascule à vide », une attaque simulée sera ici commanditée auprès d’un organisme tiers afin que les équipes techniques puissent s’exercer en conditions réelles. Les mêmes modes opératoires techniques seront mis à l’épreuve, dans un objectif cependant différent : le respect des échéances théoriques.</p>
<p>Des exercices de « gestion de crise » sont également à prévoir. Complémentaires des deux premières séries ci-dessus, il s’agit là de se focaliser sur l’expérimentation de la gestion de crise et non sur les aspects techniques. Ces tests permettront de juger la qualité de la gestion en répondant notamment aux bonnes questions en dehors de la sphère technique et en intégrant la communication, le juridique ou encore la relation clients. Chaque tâche trouve-t-elle rapidement son porteur ? L’ordonnancement prévu est-il respecté ? Les moyens nécessaires sont-ils accessibles (matériels, salles, interlocuteurs, etc.) ? Les rôles prédéfinis de chacun sont-ils connus de tous et à l’avance ? La remontée des informations au Responsable de crise est-elle correctement réalisée ?</p>
<p>Les solutions techniques ne peuvent suffire à gérer toutes les composantes d’une attaque DDos. Nécessaire et complémentaire, la mise en place d’une organisation interne apte à gérer l’attaque et la crise doit être considérée par les entreprises pour se protéger correctement et efficacement.</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/11/lutte-anti-ddos-technique-suffit-pas-organisons/">Lutte anti-DDoS : la technique ne suffit pas, organisons-nous !</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Faille critique Heartbleed : recommandations du CERT-Solucom</title>
		<link>https://www.riskinsight-wavestone.com/en/2014/04/faille-critique-heartbleed-recommandations-du-cert-solucom/</link>
		
		<dc:creator><![CDATA[Baptistin Buchet]]></dc:creator>
		<pubDate>Wed, 09 Apr 2014 15:22:31 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=5320</guid>

					<description><![CDATA[<p>[Cet article sera mis à jour régulièrement] Une faille de sécurité critique Heartbleed a été identifiée dans les bibliothèques OpenSSL. Elle permet à un attaquant externe, non authentifié, de récupérer le contenu de la mémoire du serveur. Les tests que...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/04/faille-critique-heartbleed-recommandations-du-cert-solucom/">Faille critique Heartbleed : recommandations du CERT-Solucom</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>[Cet article sera mis à jour régulièrement]</p>
<p>Une faille de sécurité critique <a href=" http://heartbleed.com/" target="_blank" rel="noopener noreferrer">Heartbleed</a> a été identifiée dans les bibliothèques OpenSSL. Elle permet à un attaquant externe, non authentifié, de récupérer le contenu de la mémoire du serveur.</p>
<p>Les tests que nous avons menés ont montré qu’il était possible de récupérer les données échangées avec le serveur (dont les <em>logins</em> / mots de passe des utilisateurs), ainsi que des fichiers de configuration.</p>
<p><span style="text-decoration: underline;">Recommandations</span></p>
<p>1- Nous recommandons dans un premier  temps de réaliser un inventaire des équipements utilisant ces bibliothèques, et de procéder à un test de vulnérabilité : soit par l’analyse de la version installée , soit via l’utilisation d’un script ;</p>
<p>2- Ensuite, d’appliquer les correctifs de sécurité ;</p>
<p>3- Il est également recommandé de considérer comme compromises les informations ayant transité par ces équipements, et de forcer un renouvellement des mots de passe (utilisateurs, serveurs, etc) ;</p>
<p>4- La clé privée du serveur pouvant également être impactée, il est recommandé de considérer la révocation et le renouvellement des certificats concernés, à minima sur les systèmes sensibles.</p>
<p><span style="text-decoration: underline;">Produits concernés</span></p>
<ul>
<li> OpenSSL 1.0.1 à 1.0.1f et OpenSSL 1.0.2-beta</li>
</ul>
<ul>
<li> Les branches 0.9.8 et 1.0.0 ne sont pas vulnérables</li>
</ul>
<p><b>Attention, de nombreuses solutions packagées et appliances reposent sur ces bibliothèques et sont vulnérables : reverse proxy, passerelle VPN, etc.</b></p>
<p>Cet article sera complété dans les prochaines heures ; pour plus de précisions, vous pouvez contacter le <a title="HeartBleed" href="mailto:cert@solucom.fr" target="_blank" rel="noopener noreferrer">CERT-Solucom</a>.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/04/faille-critique-heartbleed-recommandations-du-cert-solucom/">Faille critique Heartbleed : recommandations du CERT-Solucom</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>DDoS, quelle stratégie de protection ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/07/ddos-quelle-strategie-de-protection/</link>
		
		<dc:creator><![CDATA[Baptistin Buchet]]></dc:creator>
		<pubDate>Fri, 19 Jul 2013 12:33:02 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[attaque DDoS]]></category>
		<category><![CDATA[Cybercriminalité]]></category>
		<category><![CDATA[incident response CERT-W]]></category>
		<category><![CDATA[protection des données]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=3945</guid>

					<description><![CDATA[<p>Au vu de la multiplication et de la démocratisation des attaques par déni de service, la question de la « protection anti-DDoS » entre au cœur des décisions SSI pour les grandes entreprises. Il est aujourd’hui nécessaire d’allier des mesures à la...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/07/ddos-quelle-strategie-de-protection/">DDoS, quelle stratégie de protection ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Au vu de la multiplication et de la démocratisation des <a title="DDoS, les attaques se diversifient !" href="http://www.solucominsight.fr/2013/06/ddos-les-attaques-se-diversifient/">attaques par déni de service</a>, la question de la « protection anti-DDoS » entre au cœur des décisions SSI pour les grandes entreprises.</p>
<p>Il est aujourd’hui nécessaire d’allier des mesures à la fois techniques et organisationnelles permettant de répondre à deux enjeux cruciaux : la détection (avant l’attaque) et la réaction (après l’attaque).</p>
<h2>Un choix technologique et stratégique</h2>
<p>Les mesures techniques visent à mettre en place une protection physique par le biais d’équipements de sécurité, pouvant s’opérer à deux niveaux : en amont du SI (au niveau des réseaux de l’opérateur) et directement en frontal (sur le site à protéger).</p>
<p>Plusieurs stratégies sont alors possibles :</p>
<ul>
<li>Une protection exclusivement manuelle : il s’agit de la mise en place de filtrages spécifiques par l’opérateur et de la configuration d’équipements de sécurité du SI. Cette stratégie à faible coût, pouvant être qualifiée de « protection par défaut », est aujourd’hui la plus communément utilisée.</li>
<li>Un « boîtier anti-DDoS » en frontal : proche du SI, ce boîtier sert de « bouclier » et permet une protection immédiate, avec réinjection du trafic légitime. Il nécessite en revanche une expertise interne conséquente etpeut ainsi entraîner d’importants coûts récurrents, en plus des coûts liés à l’investissement . De plus, sans protection en amont du SI, le niveau de protection offert par le boîtier face aux attaques volumétriques est limité à la capacité du lien réseau qui le précède. Utilisé seul, un tel boîtier montre rapidement ses limites.</li>
</ul>
<ul>
<li>Une protection Cloud, en amont : située dans le Cloud ou le réseau opérateur, cette protection permet de bénéficier d’un service et d’une expertise externalisés. Grâce à ses mécanismes de redirection ponctuelle ou permanente, de nettoyage du trafic et de réinjection, elle permet la gestion d’attaques à forte volumétrie. Cette solution entraîne en revanche des coûts élevés et ne permet pas de se protéger contre l’ensemble des différents types d’attaques.</li>
</ul>
<ul>
<li>Une stratégie hybride : il s’agit ici d’allier deux des trois premières stratégies, à savoir une protection distante dite « Cloud » et un boîtier physique, en frontal du SI. Malgré un coût logiquement le plus élevé, les avantages viennent s’additionner et permettent de faire face à l’évolution de la menace. Les attaques à la fois volumétriques et par saturation de table d’état, aux niveaux réseau ou applicatif peuvent ici être maîtrisées et la continuité du service est assurée.</li>
</ul>
<p>&nbsp;</p>
<p><figure id="attachment_4012" aria-describedby="caption-attachment-4012" style="width: 419px" class="wp-caption aligncenter"><a href="http://www.solucominsight.fr/2013/07/ddos-quelle-strategie-de-protection/protection-hybride-2/" rel="attachment wp-att-4012"><img loading="lazy" decoding="async" class=" wp-image-4012" title="protection hybride" src="http://www.solucominsight.fr/wp-content/uploads/2013/07/protection-hybride1.jpg" alt="" width="419" height="177" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2013/07/protection-hybride1.jpg 1224w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/07/protection-hybride1-437x185.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/07/protection-hybride1-71x30.jpg 71w" sizes="auto, (max-width: 419px) 100vw, 419px" /></a><figcaption id="caption-attachment-4012" class="wp-caption-text">Schématisation d’une solution de protection hybride</figcaption></figure></p>
<p>Ce choix de stratégie reste complexe et diffèrera évidemment d’une entreprise à l’autre en fonction des besoins en matière de sécurité. Il dépendra en effet de son niveau d’exposition à la menace et de la gravité des impacts en cas d’attaque.</p>
<h2>Des réponses également organisationnelles</h2>
<p>Au-delà de la protection physique, il est important d’acquérir un certain nombre de bonnes pratiques permettant une gestion de crise optimale en cas d’attaque.</p>
<p>Ces mesures organisationnelles peuvent être classées en<strong> trois étapes chronologiques</strong> :</p>
<p align="center"> <a href="http://www.solucominsight.fr/2013/07/ddos-quelle-strategie-de-protection/etapes-ddos/" rel="attachment wp-att-3946"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-3946" title="Classement chronologique des mesures" src="http://www.solucominsight.fr/wp-content/uploads/2013/07/etapes-Ddos.jpg" alt="" width="650" height="198" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2013/07/etapes-Ddos.jpg 650w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/07/etapes-Ddos-437x133.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2013/07/etapes-Ddos-71x22.jpg 71w" sizes="auto, (max-width: 650px) 100vw, 650px" /></a></p>
<p>Bien qu’elles soient aujourd’hui démocratisées, inévitables pour la plupart et parfois ravageuses, les attaques par déni de service distribué engendrent des impacts pouvant être relativement maîtrisés, pourvu que la question de la protection ait été traitée à temps par l’entreprise.</p>
<p>Malheureusement, force est de constater que peu d’entreprises ont aujourd’hui procédé à l’acquisition d’une protection adaptée à la menace cybercriminelle actuelle.</p>
<p>L’actualité forte dans ce domaine les sensibilise néanmoins et sera sans doute un catalyseur de la mise en place de ces mesures</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/07/ddos-quelle-strategie-de-protection/">DDoS, quelle stratégie de protection ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
