<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cyber resilience - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/cyber-resilience/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/cyber-resilience/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 04 Jul 2025 08:27:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>cyber resilience - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/cyber-resilience/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Resilience Entra ID</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/#respond</comments>
		
		<dc:creator><![CDATA[Pierre LALIN]]></dc:creator>
		<pubDate>Thu, 03 Jul 2025 08:42:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Active directory]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[Entra ID]]></category>
		<category><![CDATA[risk management strategy & governance]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=26544</guid>

					<description><![CDATA[<p>Entra ID (formally known as Azure AD) is an Identity and Access Management solution. Through a Cloud-based directory, administrators provision and manage the lifecycle of various identities from Users, Applications to Devices. Unlike Microsoft Active Directory, Entra ID extends its...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/">Resilience Entra ID</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Entra ID (formally known as Azure AD) is an Identity and Access Management solution. Through a Cloud-based directory, administrators provision and manage the lifecycle of various identities from Users, Applications to Devices. Unlike Microsoft Active Directory, Entra ID extends its authentication and authorization capabilities beyond the company&#8217;s network to cover SaaS applications, on-premises and Cloud workloads using either company-owned devices or BYOD. These new features and connections are achieved thanks to web-based protocols like SAML and simplified identity structure (AD forest vs Entra ID tenant).</p>
<p style="text-align: justify;">In this article, we will expose the cyber-resilience challenge of Entra ID, explain why native features are incomplete and present the result of a PoC conducted on an open-source tool, Microsoft 365 DSC, to backup and recover Entra ID’s data.</p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">The challenge of cyber-resilience in managed Cloud services</h2>
<p> </p>
<p style="text-align: justify;">With Entra ID, the directory management strategy is in line with the Cloud paradigm. It means that the various network, storage, computer, OS and application layers are handled by Microsoft, leaving the customer to focus solely on his identity data.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-26527 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1.jpg" alt="" width="1280" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1.jpg 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1-340x191.jpg 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1-69x39.jpg 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1-768x432.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/07/Diapositive1-800x450.jpg 800w" sizes="(max-width: 1280px) 100vw, 1280px" /></p>
<p style="text-align: justify;">This fundamental difference has an impact on the resiliency of the service. Indeed, the creation of snapshots to back up the integrality of the system, which is a common practice on AD, is not native on a managed service such as Entra ID. Thus, in order to face a disaster recovery scenario linked to malicious activities, we can only rely on native Microsoft functionalities: the identity lifecycle model, RBAC administration model and import/export capabilities.</p>
<p> </p>
<h2 style="text-align: justify;">The incomplete soft delete model</h2>
<p> </p>
<p style="text-align: justify;">To ensure resilience, Cloud services are widely using a soft delete mechanism. Its main purpose is to recover data in the event of an accidental deletion. For example, in Azure Recovery Service Vault, the soft delete is the last safeguard in the event of intentional or unintentional deletion of the vault. Combined with immutability parameters, the vault cannot be erased regardless of admin permissions.</p>
<p style="text-align: justify;">In Entra ID, the concept of soft delete exists but is insufficient to ensure data resilience for two reasons. On the one hand, there is neither role distinction between soft-delete and hard-delete nor Recovery role, i.e. the permissions required to delete an object are sufficient to allow for permanent deletion. On the other hand, the life cycle of objects in Entra ID (create, manage, delete) is governed by the same role:</p>
<ul>
<li>The role User Administrator can both create and hard-delete a user</li>
<li>The role Cloud Application Administrator can register an application, configure all aspects of the application and hard-delete the application</li>
<li>The role Cloud Device Administrator can add a device, configure all aspects of the device and unregister a device</li>
</ul>
<h2> </h2>
<h2 style="text-align: justify;">The impact of a deletion on Entra ID</h2>
<p> </p>
<p style="text-align: justify;">This design makes the User Administrator, Privileged Authentication Administrator, Cloud Application Administrator, Application Administrator, Cloud Device Administrator, Intune Administrator and Windows 365 Administrator roles all the more critical, as their compromise can lead to the permanent loss of identity data. The impact of such a deletion can be a loss of access to applications and data, a loss of permissions, and an inability to administrate.</p>
<p style="text-align: justify;">Although the deletion of hybrid users synchronized with an on-premise AD is reversible, information such as role assignment will be lost, threatening the rights and access model. This is not the case for Cloud identities, which are generally part of the Control Plane. As part of the Enterprise Access Model, the Control Plane includes the most sensitive access, leading to a global compromise of an Information System.</p>
<p style="text-align: justify;">In a disaster recovery scenario, some assets are more critical than others and should be backed up as a priority. These include:</p>
<ul>
<li>Control Plane users, groups and roles assigned</li>
<li>Enterprise Applications (service principals) with critical permissions over Azure or Microsoft 365</li>
<li>Administrative workstations</li>
</ul>
<h2> </h2>
<h2 style="text-align: justify;">Comparison of backup open-source methods</h2>
<p> </p>
<p style="text-align: justify;">To reduce the likelihood of Entra ID malicious data loss risk, the implementation of a backup solution seems essential, at least for the Control Plane in order to maintain control over your Information System and rebuild. We have therefore analyzed 3 open-source methods for ensuring data backup:</p>
<ul style="text-align: justify;">
<li><strong>Microsoft Graph PowerShell</strong>: this is the PowerShell library for Microsoft Graph APIs. You can build your own script(s) to export and import Entra ID objects attributes that fit with organization needs</li>
<li><strong>Microsoft Entra Exporter</strong>: this is a PowerShell module that export a local copy of some Entra ID attributes (Users, Applications, Service Principals, Roles, etc.) into JSON file</li>
<li><strong>Microsoft 365 Desired State Configuration (DSC)</strong>: this is a PowerShell module for declarative configuration, deployment and management of Microsoft 365 services</li>
</ul>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Backing up Entra ID objects with Microsoft 365 DSC</h2>
<p> </p>
<p style="text-align: justify;">In this part, we will explain how we tested the open-source solution Microsoft 365 DSC and share the results and conclusions we got.</p>
<p style="text-align: justify;">Our PoC</p>
<p style="text-align: justify;">Microsoft 365 DSC enables the management of the configuration and state of Microsoft 365 services following a declarative approach. By defining the desired state rather than specific steps, it simplifies the management of complex cloud configurations and ensures consistency across the environment.</p>
<p style="text-align: justify;">In the context of a PoC, the test population deployed in our test tenant is as follows:</p>
<ul style="text-align: justify;">
<li>30 Cloud Only Users (randomly generated by Microsoft as part of the test’s tenant creation process)</li>
<li>10 Security Groups (randomly assigned to Users)</li>
</ul>
<p style="text-align: justify;">The purpose of this PoC is to identify the benefits and limitations of the solution through a series of tested and documented uses cases:</p>
<table>
<tbody>
<tr>
<td style="text-align: center;" colspan="3" width="623">
<p><strong>Users</strong></p>
</td>
</tr>
<tr>
<td style="text-align: center;" colspan="2" width="365">
<p><strong>Use cases</strong></p>
</td>
<td style="text-align: center;" width="257">
<p><strong>Findings</strong></p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if we delete a user and then restore a backup?</strong></p>
</td>
<td width="204">
<p>Does the user return with all the data that was attached to them?</p>
<p>Does their password come back, or do they have a new password?</p>
<p>Do their information return or not?</p>
</td>
<td width="257">
<p>Not all the attributes related to deleted users are retrieved. However, their password is replaced with a default password. In case of inconsistency, a non-blocking error occurs in the script, preventing the user from being set with attributes that point to non-existent object.</p>
<p>If the user has the “Ensure” attribute set to “Absent”, then they will not be retrieved.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if a user is deactivated but, in the backup, they are active?</strong></p>
</td>
<td width="204">
<p>Do they get reactivated?</p>
</td>
<td rowspan="2" width="257">
<p>We cannot know the state of users (active or deactivated) from the backup.</p>
<p>Depending on the situation, we can set the “Ensure” parameter to “Absent” or “Present” to ensure consistency between our tenant state and our export.</p>
<p>When set to “Absent”, the user will be considered as deactivated and not be deployed during the restoration process. When set to “Present”, the user will be considered as active and be deployed during the restoration process.</p>
<p>If we attempt to recover a user marked as &#8216;Absent&#8217; and they do not exist on Entra ID, we simply get a confirmation of their non-existence.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if a user is active but, in the backup, they are deactivated?</strong></p>
</td>
<td width="204">
<p>Do they get deactivated?</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if we add a user, and the backup doesn&#8217;t contain this new user?</strong></p>
</td>
<td width="204">
<p>Does the user get deleted?</p>
<p>Do their data remain intact?</p>
</td>
<td width="257">
<p>There is no impact observed on the new user.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if we make a backup without changing the user?</strong></p>
</td>
<td width="204">
<p>If nothing changed, what happens?</p>
<p>If only an attribute of the user (like a group) was deleted, what happens?</p>
<p>If an attribute of the user (like a group) was added, what happens?</p>
<p>If an attribute was modified (like a password), what happens?</p>
<p>If a group they belonged to was deleted, what happens?</p>
<p>What happens with the licenses assigned to a user if a backup is made before the modification?</p>
<p>What happens if we modify a user’s role before making the backup?</p>
</td>
<td width="257">
<p>Because the username is used to associate attributes with the user, if it changes, the user cannot be found from the backup (unless it is also changed there).</p>
<p>The attributes from the backup overwrite the existing ones. Everything else remains untouched. Therefore, if an attribute is not included in the snapshot, it will stay as it was.</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"> </p>
<table>
<tbody>
<tr>
<td style="text-align: center;" colspan="3" width="623">
<p><strong>Groups</strong></p>
</td>
</tr>
<tr>
<td style="text-align: center;" colspan="2" width="365">
<p><strong>Use cases</strong></p>
</td>
<td style="text-align: center;" width="257">
<p><strong>Findings</strong></p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if I delete a group and then restore a backup?</strong></p>
</td>
<td width="204">
<p>Does the group return with all the data that was attached to it?</p>
<p>Are the members of this group reintegrated?</p>
<p>Does the snapshot save who belongs to which group?</p>
<p>Are all groups saved in the snapshot?</p>
<p>Does the snapshot save the rights within the group?</p>
</td>
<td width="257">
<p>Only the security groups and Microsoft 365 groups with the right confidentiality label are backed-up.</p>
<p>The snapshot contains the members of the group and the owner but does not save the rights within the group.</p>
<p>It is necessary to redo the snapshot as the newly created group no longer has the same ID as the previous one. It won’t be recognized by the snapshot which will consider that the group does not exist.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if I back up a group that already exists but has modified attributes?</strong></p>
</td>
<td width="204">
<p>What happens if the name has changed?</p>
<p>What happens if a user has left the group after the snapshot?</p>
<p>What happens if there are new users after the snapshot?</p>
</td>
<td width="257">
<p>The backup overwrites the old attributes except for the name.</p>
</td>
</tr>
<tr>
<td width="161">
<p><strong>What happens if a group exists in the tenant but not in the backup?</strong></p>
</td>
<td width="204">
<p>Does it get deleted or impacted after restoration?</p>
</td>
<td width="257">
<p>There is no impact observed apart from the information defined in the configuration file.</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">The process required configuring a service account with the right permissions (<em>User.ReadWrite.All,</em> <em>Group.ReadWrite.All</em>) in Entra ID to interact with Microsoft Graph API for data export and import.</p>
<p style="text-align: justify;">These permissions enabled the service account to retrieve the necessary configuration and data from Entra ID and later re-import it.</p>
<p style="text-align: justify;">Result of the PoC Microsoft 365 DSC</p>
<p style="text-align: justify;">As a result of these tests, we were able to gather conclusive information on the solution’s benefits and limitations. On the positive side:</p>
<ul>
<li><strong>Granular Configuration Selection: </strong>The solution allows precise targeting of configurations for backup, enabling users to select specific settings.</li>
<li><strong>Recovery without deletion: </strong>During recovery, current users and groups are retained, preventing accidental deletion.</li>
<li><strong>Overwrite of Outdated Attributes: </strong>Backed-up attributes replace the old ones.</li>
<li><strong>Language of the Data Storage: </strong>Data is stored in JSON format, making it easy to manipulate and modify backup files.</li>
<li><strong>Automation Capabilities: </strong>Once the necessary tools are installed, the solution is easy to automate.</li>
<li><strong>Monitoring and Alerts: </strong>Microsoft 365 DSC can be used to monitor data consistency and receive alerts in the event of suspicious changes</li>
<li><strong>Snapshot Versions management: </strong>It enables easy maintenance and administration of multiple snapshot versions</li>
<li><strong>Detailed Logging Functionality: </strong>It offers the possibility to generate highly detailed logs, providing records of all operations for enhanced oversight.</li>
</ul>
<p style="text-align: justify;">Despite these advantages, the study revealed several limitations:</p>
<ul>
<li><strong>Incomplete Data in Backup: </strong>The backup process does not capture all attributes, leading to potential loss of important information.</li>
<li><strong>Backup Size Limit: </strong>The backup size is capped at 11MB, which may be insufficient for larger configurations or datasets.</li>
<li><strong>Deactivation Status Not Captured: </strong>Snapshots do not store deactivation statuses for users, potentially re-enabling disabled users during recovery.</li>
<li><strong>Unencrypted Data and Credentials: </strong>Security concerns arise from data and credentials being stored unencrypted, posing risks to sensitive information.</li>
<li><strong>Object IDs’ Loss: </strong>During imports, object IDs are lost, causing recreated objects to have new IDs, which can lead to duplicate entries in subsequent imports.</li>
<li><strong>Privileged Service Principal: </strong>The service principal involved has elevated privileges, increasing the risk of security vulnerabilities if not properly managed.</li>
</ul>
<p style="text-align: justify;">It is important to note that this tool does not really support “restoration” as it is possible to re-create objects, but it does not ensure service restoration and continuity. The reason being that it currently cannot restore links between new ID objects and applications, which is an issue native to Entra ID.</p>
<p style="text-align: justify;">Our opinion about Microsoft 365 DSC</p>
<p style="text-align: justify;">Microsoft 365 DSC is a great tool when it comes to basic uses and documentation as it is simple to use and to deploy on test environments. It is also quite efficient as a monitoring tool thanks to its version control and detailed logs. However, it is not adapted to large environments because of the limited scalability, the poor user experience and security issues related to configurations and credentials. It can also lead to inconsistencies or duplication as object IDs that can be referenced elsewhere are unrecoverable.</p>
<p style="text-align: justify;">Additional solutions may be required such as scripting for handling configuration files and ensuring the consistency of the modifications, as well as well-defined encryption and backup processes. Therefore, we recommend always carefully evaluating the specific needs, planning additional developments and mainly using the solution for supervision and testing purposes.</p>
<p style="text-align: justify;">Given the limitations of Microsoft&#8217;s open-source tools, it could be worthwhile to explore what third-party vendors, such as Semperis or Quest who are pure players on the subject, have to offer. These alternatives might address some of the challenges related to scalability, reliability and security, providing options that better suit larger environments. It is important to remain open to these possibilities and evaluate them based on the specific requirements of your organization.</p>
<p style="text-align: justify;"> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/">Resilience Entra ID</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/07/resilience-entra-id/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber resilience in an industrial environment</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/03/cyber-resilience-in-an-industrial-environment/</link>
		
		<dc:creator><![CDATA[Alexandrine Torrents]]></dc:creator>
		<pubDate>Mon, 15 Mar 2021 10:30:33 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[industrial IS]]></category>
		<category><![CDATA[Industry]]></category>
		<category><![CDATA[Operational Resilience]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Reconstruction]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15352</guid>

					<description><![CDATA[<p>For the most impatient readers, you can go directly to the Key Elements at the end of the article. Reminder of the state of the threat ANSSI states in ÉTAT DE LA MENACE RANÇONGICIEL &#8211; À L&#8217;ENCONTRE DES ENTREPRISES ET...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/cyber-resilience-in-an-industrial-environment/">Cyber resilience in an industrial environment</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">For the most impatient readers, you can go directly to the <a href="#key">Key Elements</a> at the end of the article.</p>
<h3 style="text-align: justify;">Reminder of the state of the threat</h3>
<p style="text-align: justify;">ANSSI states in <em>ÉTAT DE LA MENACE RANÇONGICIEL &#8211; À L&#8217;ENCONTRE DES ENTREPRISES ET INSTITUTIONS<a href="#_ftn1" name="_ftnref1">[1] </a></em><a href="#_ftnref1" name="_ftn1"></a>published on 05/02/2020: «  Since 2018, ANSSI and its partners have observed that more and more cybercriminal groups with significant financial resources and technical skills favour the targeting of particular companies and institutions in their ransomware attacks. ».</p>
<p style="text-align: justify;">Faced with this observation, it is more necessary than ever to secure information systems. This involves applying the fundamentals of security: applying patches, managing accounts and passwords, managing network segmentation etc. As a reminder, the application of these initial measures permits a significant reduction in the probability that an information system will be subject to a ransomware but can in no way guarantee that this will not happen.</p>
<h3 style="text-align: justify;">Specificity of the industrial sector</h3>
<p style="text-align: justify;">However, even though new defensive solutions are continually being developed, the cost and complexity of deploying some of them ultimately make them little used. This is truer in an industrial environment, where their integration can be complex, as some systems are fixed in a functional configuration. Moreover, the budgets allocated to IT security in an industrial environment, although increasing in recent years, are still not sufficient for many sites.</p>
<p style="text-align: justify;">Furthermore, an industrial information system shares a common base with a conventional information system and is therefore subject to the same attacks. Of course, attacks such as Stuxnet, Triton, or BlackEnergy (on a smaller scale) require additional skills. However, it is always worth remembering that the targets of interest for groups possessing this type of means are generally already subject to regulatory obligations (LPM in France, NIS directive etc.), which if respected, greatly limit the risks of a successful attack against them. However, these systems are not invulnerable, and must therefore also be prepared to respond to an attack.</p>
<h3 style="text-align: justify;">Inevitable attack on industrial systems: how to minimise the impact and restart operations quickly?</h3>
<p style="text-align: justify;">It therefore appears that:</p>
<ul style="text-align: justify;">
<li>Protecting oneself from the threat is often limited to the application of basic security measures if there is no regulatory obligation applicable to the target information system;</li>
<li>Identifying the sources of threat and detecting an attack before it reaches its objective requires in most cases resources that are too important in relation to the budgets of current industrial information systems.</li>
</ul>
<p style="text-align: justify;">If the probability of an information system undergoing a successful cyber-attack, and more specifically a ransomware, is almost certain, the following question arises: &#8220;How can we prepare for a major cyber-attack, maintain critical activities in a degraded mode, while rapidly regaining confidence in the industrial information system? ».</p>
<p style="text-align: justify;">The answer to this question is covered by the last two pillars of computer security according to the NIST framework: respond and recover. An attempt to answer this question is presented in this article.</p>
<p style="text-align: justify;">Note: the first part of this article &#8220;How to respond to an attack before it is too late?&#8221; is not necessary to implement the recommendations detailed in the second part &#8220;How to recover after an attack if it could not be contained? ». Although the implementation of network filtering measures is highly recommended, it may be interesting for sites where the implementation of such filtering measures takes too long to implement, to start with the preparation part of the remediation of a cyber-attack, which is easier to implement.</p>
<h2 style="text-align: justify;">How to respond to an attack before it is too late?</h2>
<h3 style="text-align: justify;">Involving industrial teams</h3>
<p style="text-align: justify;">Before talking about the measures that can be put in place to respond to a digital security incident, it may be interesting to remember that industrial staff are used to crisis management.</p>
<p style="text-align: justify;">Indeed, many industries regularly organise crisis management exercises (fire, chemical risk, natural disasters, etc.). On many sensitive sites, procedures are therefore already available to respond to this type of incident, under the direction of a dedicated manager. In addition, autonomous physical protection is generally available: pressure relief valve, non-return valve, sprinkler etc., although these are sometimes replaced by connected instrumented safety systems.</p>
<p style="text-align: justify;">The context is therefore appropriate for adding a new procedure in order to respond to a computer attack. This will generally consist of isolating the industrial information system from the outside via a procedure known as the &#8220;red button&#8221;. In order to draw up the associated procedure, the involvement of site personnel will be essential, particularly to ensure that the application is not more harmful than the attack itself.</p>
<h3 style="text-align: justify;">A prerequisite for the implementation of the isolation posture: the control of its flows and the implementation of network partitioning/filtering.</h3>
<p style="text-align: justify;">It is necessary to measure the impacts generated using the &#8220;red button&#8221;. To do this, it is necessary to list the interconnections of the industrial site with other systems.</p>
<p style="text-align: justify;"><strong>List the interconnections with other information systems.</strong></p>
<p style="text-align: justify;">It may be interesting to start by listing the flows between the industrial information system and the outside. First of all, it is necessary to define what this system contains. In a basic case, it includes the PLCs, the supervision, as well as the equipment necessary for the interconnection of the first two.</p>
<p style="text-align: justify;">Other equipment can then be added: an Historian server, client stations for supervision, a NAS, etc. This network, later called an industrial network, is generally connected with other networks in order to share information with the equipment of the latter.</p>
<p style="text-align: justify;">It is possible to mention:</p>
<ul>
<li style="text-align: justify;">Exchanges with the company&#8217;s ERP (whether an MES &#8211; Manufacturing Execution System is present or not), generally located on the office network;</li>
<li style="text-align: justify;">Exchanges with partners: regulation of electricity, water and gas networks, etc.;</li>
<li style="text-align: justify;">Exchanges with service providers: weather, cloud solutions for energy optimisation, predictive maintenance, etc.</li>
</ul>
<p style="text-align: justify;">These flows, although useful to simplify operations, can generally be temporarily cut off or replaced by alternative means (telephone call to indicate production levels for example).</p>
<p style="text-align: justify;">Moreover, each industrial site is different, and therefore manages these interconnections differently. It is common to see MPLS networks dedicated to industrial sites when the company owns several of them. In other cases, the office network will be used to federate them. It is also true for the connection needs between these industrial networks and the Internet, which sometimes pass first through the office network, or benefit from a direct output.</p>
<p style="text-align: justify;"><strong>List its internal flows</strong></p>
<p style="text-align: justify;">After listing the interconnections between the industrial network and the outside, the internal flows remain to be listed. Most of these flows should be strictly necessary for the proper functioning of the industrial process, such as those between supervision and PLCs. Cutting off these connections would therefore require stopping the industrial process, or at least making it safe.</p>
<p style="text-align: justify;">It may then be interesting to separate the equipment and associated flows into several zones:</p>
<ul>
<li style="text-align: justify;">Supervision;</li>
<li style="text-align: justify;">Field network;</li>
<li style="text-align: justify;">Others (supervision client stations, historian server, etc.).</li>
</ul>
<p style="text-align: justify;">Setting up these zones allows the exposure of these components to be drastically reduced. Indeed, only the supervision should have access to the field networks, while the &#8220;Others&#8221; category should only have access to the supervision.</p>
<p style="text-align: justify;">Other zones may be necessary to implement such as:</p>
<ul style="text-align: justify;">
<li>An administration zone: which could also be used to program the PLCs according to the distribution of roles and responsibilities on site;</li>
<li>A DMZ: which can accommodate a relay server so that equipment outside the industrial site does not connect directly to the supervision system to retrieve production data, etc.</li>
</ul>
<p style="text-align: justify;">Depending on the services offered (WSUS server, antivirus server, Terminal Server for remote access etc.) other zones can of course be added.</p>
<p style="text-align: justify;"><strong>Evaluate the real need for these flows</strong></p>
<p style="text-align: justify;">After listing all these flows, it is interesting to identify the real need for each of them. For example, is it necessary to be able to access e-mails from a supervision server?</p>
<p style="text-align: justify;">In order to limit the exposure of the industrial network to the outside, it could also be necessary to take some equipment out of it. For example, if a database accessed from the office network is fed by the supervision, but not useful to it, hosting it directly on the office network may prove simpler than trying to limit access.</p>
<p style="text-align: justify;">Once the necessary flows have been clearly identified, the associated filtering rules must be configured in detail (source IP address, destination IP address, destination port). This work generally requires a significant human investment, mainly from the teams in charge of the industrial site, as well as a significant material cost to acquire security equipment. However, it is a prerequisite for setting up the fallback postures described below. In an ideal case, application filtering (level 7 of the OSI model) could also be implemented.</p>
<p style="text-align: justify;">This work, although essential to the implementation of isolation postures, is also one of the fundamental actions to be carried out within the framework of securing an information system (industrial or not). Indeed, each flow cut off is a flow that does not need to be monitored, as well as one that is less exploitable by an attacker.</p>
<h3>Preparing fallback postures</h3>
<p style="text-align: justify;">Complete isolation of all the equipment in an industrial information system is not always desirable, even in the event of an attack. After having listed these flows, it may be interesting not to set up a single isolation posture, but several fallback postures, allowing in some cases to continue working almost normally.</p>
<p style="text-align: justify;"><strong>Preventive fallback posture: isolate the plant in the event of an attack on an external network</strong></p>
<p style="text-align: justify;">After identifying the flows between the industrial network and the outside, it is possible to create an associated fallback posture in order to deactivate them if necessary. The objective of this posture is to cut all interconnections of the industrial network with the outside in order to prevent any propagation of an attack. A proven solution is to group these flows on a few dedicated Ethernet ports. Thus, it is sufficient to indicate in the associated procedures to disconnect the associated cables to activate the fallback posture. This also avoids having to intervene on the configuration of firewalls in the event of a cyber security incident.</p>
<p style="text-align: justify;">In addition, it is also necessary to define the cases in which this posture should be activated. If it can be activated without posing any problem to production, or adding too much work to the site staff, the question may arise as to whether these flows are necessary.</p>
<p style="text-align: justify;">If this posture does have an impact on the site&#8217;s industrial activities, a good balance must be found between triggering it too early (as soon as the antivirus software on an office workstation raises an alert), or too late (after the first industrial workstations have been encrypted). This will also depend on the context of the company and its resources (dedicated or non-dedicated security monitoring team, etc.).</p>
<p style="text-align: justify;"><strong>Specificity (distributed sites, non-autonomous sites, etc.)</strong></p>
<p style="text-align: justify;">If all flows with the outside do not have the same destination, it may also be interesting to define several specific fallback positions. Indeed, if the service provider in charge of managing the site&#8217;s cameras warns that he is undergoing a ransomware attack, it seems more optimal to disconnect only the flows between this service provider and the factory network, rather than all the flows, including those to the ERP.</p>
<p style="text-align: justify;">In the case where the industrial process is distributed over several sites (production and distribution plant in particular), the activation of the preventive fallback posture should not cut off the flows between these different sites. Indeed, specific links should be dedicated to this. If this is not the case, use of the office network to ensure these connections, for example, a project to overhaul the industrial network is probably to be expected (deployment of a dedicated VRF, or a SDWAN network for example).</p>
<p style="text-align: justify;">Finally, it is always good to remember that each factory is different, so a local study will have to be carried out on each one to understand its specificities.</p>
<p style="text-align: justify;"><strong>Last resort fallback position: switch off the information system in the event of a proven attack on the plant</strong></p>
<p style="text-align: justify;">Finally, it may be interesting to prepare a last resort fallback posture. This should consist of isolating each VLAN (if defined, preferably with a local HMI per VLAN to ensure a degraded mode) or each piece of equipment (turn off the switches) in order to prevent the attacker from continuing his actions, which in the most advanced cases of attack, could directly target the site&#8217;s industrial process.</p>
<p style="text-align: justify;">The objective is then to secure the site or ensure its essential services. The activation of this posture implies working without an information system and should only be applied in the event of proven compromise of at least one piece of equipment on the site, since it leads to the same immediate result as a ransomware, if not worse.</p>
<p style="text-align: justify;">An upstream work with the operators will be necessary in order to list all the actions to be carried out when this posture is activated and to define degraded modes. Indeed, this will generally require the activation of on-call duty in order to manually perform certain tasks: checking the correct operation of equipment, especially on remote sites, use of local HMIs, etc. Moreover, some industrial processes are no longer manually controllable today, and will therefore have to be stopped since no degraded mode is available.</p>
<p style="text-align: justify;">In order to estimate the impacts of activating such a posture, it may be interesting to look at the impacts listed in the event of fire or a general power failure. Moreover, only a real test of this posture can ensure its operational impacts.</p>
<h2 style="text-align: justify;">How to recover after an attack if it has not been contained?</h2>
<p style="text-align: justify;">In some cases, the activation of fallback postures may not be sufficient to protect the entire industrial information system, especially if they are activated too late. It is then essential to be able to proceed with the reconstruction of all or part of the said system in a sufficiently short time to limit the associated impacts.</p>
<p style="text-align: justify;">The main prerequisites for restoring an industrial information system are listed below.</p>
<h3 style="text-align: justify;">What must be backed up to be able to restore its PLCs?</h3>
<p style="text-align: justify;">In order to be able to restart the factory, it is necessary in most cases to start restoring PLCs, which requires two main elements.</p>
<p style="text-align: justify;"><strong>Having an up-to-date copy of your PLC programs</strong></p>
<p style="text-align: justify;">PLCs are spared in most current attacks, probably because targeting Windows workstations is enough for attackers to achieve their intended objectives. However, attacks are likely to be increasingly targeted, and most PLCs currently in use are not secure (unencrypted and unauthenticated communications, default passwords, administration functionality that cannot be deactivated, etc.).</p>
<p style="text-align: justify;">It is therefore necessary to save these programs, which is already generally the case, particularly on the programming station (sometimes belonging to a service provider) used when the device is commissioned. It should be noted that these backups should be stored on at least one off-line medium, so that they are not encrypted in the same way as the workstation hosting them.</p>
<p style="text-align: justify;">These observations remain valid even for the new generations of PLCs, which, although benefiting from a level of security that is far superior to that of their predecessors, are not invulnerable.</p>
<p style="text-align: justify;"><strong>Save a means of downloading these programs to the PLCs</strong></p>
<p style="text-align: justify;">Many PLCs require dedicated software to be programmed. This is even the case if you just want to download an already written program. It is therefore advisable to have a copy of these programs.</p>
<p style="text-align: justify;">In some cases, a programming station disconnected from the network and reserved for this purpose can be a solution. It should be noted, however, that maintaining such a station in a safe condition can quickly become complex. If this solution is selected, this station could also host the copy of the PLC programs. Keeping a second backup set off-line (external hard disk for example) would however be an additional security measure.</p>
<p style="text-align: justify;">Furthermore, if new generations of PLCs are used, with the latest security features enabled, other elements should be backed up such as: PLC program passwords, certificates used for certain communications (or a means of regenerating them) etc.</p>
<p style="text-align: justify;">These prerequisites are also valid for network equipment (firewalls, switches etc.).</p>
<h3 style="text-align: justify;">What needs to be backed up to be able to restore essential computer hardware?</h3>
<p style="text-align: justify;"><strong>Identifying what is really needed</strong></p>
<p style="text-align: justify;">Restoring SCADA system, and associated client workstations, is generally equivalent to restoring a Windows system and associated programs. Several questions must be asked to identify the items to be backed up:</p>
<ul style="text-align: justify;">
<li>What equipment is needed? An engineering workstation, a SCADA server, a few operator workstations?</li>
<li>Is it possible to reinstall the SCADA system from scratch (new installations of Windows and the supervision software) and then deposit a backup of the SCADA configuration? Is this feasible in a sufficiently short time?</li>
<li>Would not a complete copy of the SCADA server disk be simpler? It would indeed be sufficient to insert the saved disk to reboot.</li>
<li>Are changes regularly made to the supervision software? If yes, is it necessary to back them all up? In this case, it seems complex to make a complete copy of the disk each time.</li>
</ul>
<p style="text-align: justify;"><strong>Backing up intelligently</strong></p>
<p style="text-align: justify;">In many cases, backups of Windows workstations are made in the same way as those of PLC programs, by copy/paste. It could then be interesting to look at automatic backup mechanisms. However, these are probably to be avoided for factories starting from scratch and not having enough budget to install them serenely. Indeed, implementing this type of solution in a secure manner is generally more complex than making a simple bit-by-bit copy of a hard disk.</p>
<h3 style="text-align: justify;">Do not neglect documentation and training</h3>
<p style="text-align: justify;">However, it is not enough to have complete backups available. It is also necessary to draw up detailed operating procedures for restoring these backups. Indeed, if a crisis were to occur, the stress of the teams and the potential unavailability of some of the knowledge could lead to handling errors in the absence of documentation.</p>
<p style="text-align: justify;">These procedures are not intended to enable a complete restoration of all systems, but at least to enable the essential elements previously identified to be restarted:</p>
<ul style="text-align: justify;">
<li>An engineering workstation with the associated PLC programming software;</li>
<li>A SCADA server;</li>
<li>Two to three operator workstations;</li>
<li>The plant&#8217;s essential PLCs.</li>
</ul>
<p style="text-align: justify;">In addition, it is generally recommended to have at least two sets of backups, one to be stored near the equipment concerned, the other to be stored on another physical site, with access limited to a limited number of people. It may be tempting to store an additional set of backups online, but it should be noted that in the event of a cyber-attack, and activation of fallback procedures, it is complex to download these backups and deposit them on the systems to be restored.</p>
<p style="text-align: justify;">Finally, it is essential to test all these procedures to ensure that they are exhaustive. A test could, for example, be the opportunity to realise that the backup of the SCADA configuration does not include the licence key, or that the passwords configured when the complete disk was copied have since been modified without keeping the history.</p>
<h2 style="text-align: justify;">Conclusion</h2>
<p style="text-align: justify;">Crisis management is an important component of the business for many industrial system operators. These same people are also the most experienced in their perimeter. However, they are generally not IT experts. Pragmatic measures, adapted to their context, will therefore be far more useful than a generic 200-page guide containing all the good practices to be applied to an information system.</p>
<p style="text-align: justify;">As in development with the KISS principle (<em>Keep it simple, stupid),</em> <strong>fallback postures, as well as restoration procedures, should be kept simple to understand, and stupid to apply.</strong></p>
<p style="text-align: justify;">Furthermore, although the application of a strict network filtering policy can only be advised, it is not strictly necessary for the implementation of backup and recovery actions. Thus, even if the probability of a successful attack is increased, it will still be possible to restore critical systems.</p>
<p style="text-align: justify;">Finally, it should be noted that more and more industrial processes are nowadays operating in a just-in-time mode. In this type of context, the preservation of the industrial system from an attack, or the ability to restore it quickly, would not be sufficient to maintain the level of production if the management of orders or distribution, for example, are unavailable. Cyber resilience must therefore be considered at the company level, and not only at the level of the industrial site.</p>
<h2 id="key" style="text-align: justify;">Key elements</h2>
<p style="text-align: justify;">To respond to an attack before it is late, it is necessary:</p>
<ul style="text-align: justify;">
<li>To involve the industrial teams (without which it is highly likely that the computer will survive the attack, but without the factory continuing to fulfil its primary mission);</li>
<li>To control its flows and implement network partitioning/filtering in order to be able to set up fallback postures:
<ul>
<li>Preventive, in order to isolate the factory in the event of an attack on an external network without having too significant an impact on the industrial process;</li>
<li>As a last resort, in order to shut down the information system in the event of a proven attack on the factory before the attacker modifies the industrial process.</li>
</ul>
</li>
<li>To test these fallback postures, in order to ensure that their activation is not worse than the attack.</li>
</ul>
<p style="text-align: justify;">And in the case where the attack could not be contained, the following elements are generally necessary in order to recover from the said attack:</p>
<ul style="text-align: justify;">
<li>Possess an up-to-date copy of your PLC programs;</li>
<li>Save a means of downloading these programs to the PLCs;</li>
<li>Have at least one copy of all critical backups on an off-line medium (external hard disk for example);</li>
<li>Identify its essential computer equipment (in particular so as not to restore the history server before the supervision server, etc.);</li>
<li>Backing up intelligently, sometimes a bit-by-bit copy of the hard disk is more efficient than an automatic copy on a dedicated server, generally encrypted at the same time as the system whose backups it hosts;</li>
<li>Don&#8217;t neglect documentation and training (otherwise a forgotten license key, or someone on holiday could quickly sign the end of the restore&#8230;).</li>
</ul>
<p style="text-align: justify;"><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="http://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-001.pdf">www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-001.pdf</a></p>
<p style="text-align: justify;">A new version of the threat assessment was published at the beginning of the year: <a href="https://www.cert.ssi.gouv.fr/uploads/CERTFR-2021-CTI-001.pdf">https://www.cert.ssi.gouv.fr/uploads/CERTFR-2021-CTI-001.pdf</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/03/cyber-resilience-in-an-industrial-environment/">Cyber resilience in an industrial environment</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Decrypting DORA: what does it mean for Resilience of financial organisations?</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/12/decrypting-dora-what-does-it-mean-for-resilience-of-financial-organisations/</link>
		
		<dc:creator><![CDATA[m@THIEU]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 14:51:32 +0000</pubDate>
				<category><![CDATA[Cyber for Financial Services]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[Digital compliance]]></category>
		<category><![CDATA[DORA]]></category>
		<category><![CDATA[Financial regulation]]></category>
		<category><![CDATA[ICT]]></category>
		<category><![CDATA[Operational Resilience]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14837</guid>

					<description><![CDATA[<p>With the release of the Digital Operational Resilience Act (DORA), the European Union is taking a strong stand to strengthen the financial sector’s resilience to ICT-related major incidents. With prescriptive requirements on both financial entities and critical ICT services provider, and an aggressive timeline...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/decrypting-dora-what-does-it-mean-for-resilience-of-financial-organisations/">Decrypting DORA: what does it mean for Resilience of financial organisations?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><span data-contrast="auto">With the release of the Digital Operational Resilience Act (DORA), the European Union is taking a strong stan</span><span data-contrast="auto">d</span><span data-contrast="auto"> to strengthen</span><span data-contrast="auto"> the financial sector’s</span><span data-contrast="auto"> resilience to ICT</span><span data-contrast="auto">-related</span><span data-contrast="auto"> major incidents. With prescriptive requirements on both financial entities and critical ICT services provider, and an aggressive timeline for compliance (estimated at the end of 2022), organisations must start planning now. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">Why Digital Operational Resilience Act (DORA)?</h2>
<p style="text-align: justify;"><span data-contrast="auto">DORA is p</span><span data-contrast="auto">art of </span><span data-contrast="auto">an </span><span data-contrast="auto">EU-wide “Digital Finance Package”, aimed at </span><span data-contrast="auto">making sure the financial sector can </span><span data-contrast="auto">levera</span><span data-contrast="auto">ge</span><span data-contrast="auto"> opportunities brought by technology</span><span data-contrast="auto"> and innovation</span><span data-contrast="auto"> whilst mitigating </span><span data-contrast="auto">the </span><span data-contrast="auto">new risks</span><span data-contrast="auto"> associated.</span><span data-contrast="auto"> </span><span data-contrast="auto">This package involves regulation on crypto assets, blockchain technology, and digital operational resilience. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">With </span><span data-contrast="auto">the Digital Operational Resilience Act</span><span data-contrast="auto">, the EU aims to make sure financial organisations mitigate the risks arising from increasing reliance on ICT systems and third parties for critical operations</span><span data-contrast="auto">. Organisations</span><span data-contrast="auto"> need to be able </span><span data-contrast="auto">to </span><span data-contrast="auto">“</span><span data-contrast="auto">withstand, respond and recover</span><span data-contrast="auto">”</span><span data-contrast="auto"> from </span><span data-contrast="auto">the </span><span data-contrast="auto">impacts of ICT incidents</span><span data-contrast="auto">, thereby continuing to deliver </span><span data-contrast="auto">critical and important functions </span><span data-contrast="auto">and minimising</span><span data-contrast="auto"> disruption for customers and for the financial system.</span><b><span data-contrast="auto"> </span></b><span data-contrast="auto">This means establishing </span><span data-contrast="auto">robust </span><span data-contrast="auto">measures and controls on systems</span><span data-contrast="auto">, </span><span data-contrast="auto">tools</span><span data-contrast="auto"> and third parties,</span><span data-contrast="auto"> </span><span data-contrast="auto">having the right continuity plans in place, and testing their effectiveness. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This global, large scope regulation </span><span data-contrast="auto">is coming in</span><span data-contrast="auto"> to rationalise an increasingly fragmented regulatory landscape on the topic</span><span data-contrast="auto">, with a number of </span><span data-contrast="auto">local regulatory initiatives </span><span data-contrast="auto">in member states </span><span data-contrast="auto">and smaller scope EU guidelines </span><span data-contrast="auto">on related topics (e.g. testing requirements, </span><span data-contrast="auto">management of ICT third party dependencies</span><span data-contrast="auto">, cyber resilience</span><span data-contrast="auto">)</span><span data-contrast="auto">.</span><span data-contrast="auto"> Setting up a global regulatory framework will </span><span data-contrast="auto">ensure</span><span data-contrast="auto"> there are no overlaps or gaps in regulation and </span><span data-contrast="auto">maintain good conditions for</span><span data-contrast="auto"> </span><span data-contrast="auto">competition in the single market.</span><span data-contrast="auto"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">DORA </span><span data-contrast="auto">also </span><span data-contrast="auto">fits into </span><span data-contrast="auto">a </span><a href="https://uk.wavestone.com/en/insight/navigating-through-the-resilience-frameworks-how-to-identify-the-right-frameworks-to-use/"><span data-contrast="none">worldwide </span><span data-contrast="none">trend </span><span data-contrast="none">in regulation on resilience</span><span data-contrast="none"> for the financial sector</span></a><span data-contrast="auto">, </span><span data-contrast="auto">pioneered by the </span><a href="https://www.bankofengland.co.uk/prudential-regulation/publication/2018/building-the-uk-financial-sectors-operational-resilience-discussion-paper"><span data-contrast="none">Bank of England</span><span data-contrast="none">’s </span><span data-contrast="none">(FCA and PRA) </span><span data-contrast="none">consultation papers</span></a><span data-contrast="auto"> on operational resilience and impact tolerances, and </span><span data-contrast="auto">followed</span><span data-contrast="auto"> by</span><span data-contrast="auto"> principle-based papers </span><span data-contrast="auto">on operational resilience </span><span data-contrast="auto">from the </span><a href="https://www.bis.org/bcbs/publ/d509.htm"><span data-contrast="none">Bank of International Settlements</span><span data-contrast="none"> (BIS)</span></a><span data-contrast="auto"> and the </span><a href="https://www.federalreserve.gov/newsevents/pressreleases/bcreg20201030a.htm"><span data-contrast="none">Federal Reserve</span></a><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;">
<h2 style="text-align: justify;">DORA in a nutshell: what does it change?</h2>
<p style="text-align: justify;"><span data-contrast="auto">Contrary to the FCA/PRA</span><span data-contrast="auto">, the Federal Reserve</span><span data-contrast="auto"> and the BIS, </span><span data-contrast="auto">DORA focuses on </span><span data-contrast="auto">solely </span><span data-contrast="auto">resilience to I</span><span data-contrast="auto">CT-related incidents and </span><span data-contrast="auto">introduces very specific and prescriptive requirements. It is not just a set of guidelines but rather criteria, templates and </span><span data-contrast="auto">instructions that will shape how financial organisations manage ICT risk. It demonstrates that EU regulators want to be very hands-on </span><span data-contrast="auto">on</span><span data-contrast="auto"> th</span><span data-contrast="auto">e</span><span data-contrast="auto"> topic, with a lot of reporting, communication and assessments that need to happen frequently</span><span data-contrast="auto">,</span><span data-contrast="auto"> enabled by standardised MI and reporting. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">DORA</span><span data-contrast="auto"> </span><span data-contrast="auto">introduces requirements</span><span data-contrast="auto"> across </span><span data-contrast="auto">five pillars: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">ICT risk management</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">ICT incident reporting</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Digital Operational resilience testing</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">ICT third-party risk management </span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="⁄" data-font="Tahoma" data-listid="7" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Information and intelligence sharing</span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<figure id="post-14838 media-14838" class="align-none" style="text-align: justify;"><img decoding="async" class=" wp-image-14838 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2020/12/Image-1-1.png" alt="" width="539" height="568" /></figure>
<p style="text-align: justify;"><span data-contrast="auto">S</span><span data-contrast="auto">ome of the requirements are straight-forward and largely built on what is already being done in organisations</span><span data-contrast="auto"> (</span><span data-contrast="auto">for example, </span><span data-contrast="auto">the risk management framework that needs to be developed is similar to </span><span data-contrast="auto">industry standard</span><span data-contrast="auto">s like</span><span data-contrast="auto"> NIST</span><span data-contrast="auto">)</span><span data-contrast="auto">; but some are also challenging and will mean organisations need to launch some work to be compliant. </span><span data-contrast="auto">We have summarised the</span><span data-contrast="auto"> requirements and the</span><span data-contrast="auto">se key challenges</span><span data-contrast="auto"> </span><span data-contrast="auto">to start addressing now </span><span data-contrast="auto">for each of the 5 pillars</span><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">1. ICT risk management</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><b><span data-contrast="auto"> </span></b><span data-contrast="auto">E</span><span data-contrast="auto">nsure</span><span data-contrast="auto"> specific measures </span><span data-contrast="auto">and controls </span><span data-contrast="auto">are in place to limit the disruption</span><span data-contrast="auto"> to the market and to consumers</span><span data-contrast="auto"> caused by incidents</span><span data-contrast="auto">,</span><span data-contrast="auto"> and ensure accountability of the management body</span><span data-contrast="auto"> on ICT risk management</span><span data-contrast="auto">. </span><b><span data-contrast="auto"> </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key</span></b><b><span data-contrast="auto"> requirements:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">Firms will need to follow </span><span data-contrast="auto">governance </span><span data-contrast="auto">principles </span><span data-contrast="auto">around ICT risk, with </span><span data-contrast="auto">a focus on </span><span data-contrast="auto">accountability of the management body</span><span data-contrast="auto">. They will need to i</span><span data-contrast="auto">denti</span><span data-contrast="auto">fy their</span><span data-contrast="auto"> risk tolerance for ICT risk, based on</span><span data-contrast="auto"> the</span><span data-contrast="auto"> risk appetite of the organisation and the impact tolerance of ICT disruptions</span><span data-contrast="auto">. They will also need to </span><span data-contrast="auto">have a risk management framework in place that </span><span data-contrast="auto">includes identification of critical and important functions</span><span data-contrast="auto">, risks associated </span><span data-contrast="auto">and </span><span data-contrast="auto">a mapping of the</span><span data-contrast="auto"> ICT assets that underpin them</span><span data-contrast="auto">;</span><span data-contrast="auto"> </span><span data-contrast="auto">as well as </span><span data-contrast="auto">specific</span><span data-contrast="auto"> protectio</span><span data-contrast="auto">n, </span><span data-contrast="auto">prevention</span><span data-contrast="auto">, detection, response and recovery</span><span data-contrast="auto"> </span><span data-contrast="auto">plans and </span><span data-contrast="auto">capabilities</span><span data-contrast="auto">, continuous improvement processes and metrics, and a crisis communication strateg</span><span data-contrast="auto">y</span><span data-contrast="auto"> with clear roles and responsibilities</span><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">: </span></b><span data-contrast="auto">As part of the continuous improvement processes,</span><b><span data-contrast="auto"> </span></b><span data-contrast="auto">DORA introduces compulsory training on digital operational resilience for the management body but also for the whole staff, as part of their general training package. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">2. ICT incident reporting</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><span data-contrast="auto"> Harmonise and centralise reporting of incidents to enable the regulator to react fast to avoid </span><span data-contrast="auto">spreading of the impact, and to promote collective improvement and</span><span data-contrast="auto"> firms’</span><span data-contrast="auto"> knowledge of </span><span data-contrast="auto">current </span><span data-contrast="auto">threats to the market</span><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key requirements:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">DORA introduces a standard incident classification methodology with a set of </span><span data-contrast="auto">specific </span><span data-contrast="auto">criteria</span><span data-contrast="auto"> </span><span data-contrast="auto">(</span><span data-contrast="auto">number of users</span><span data-contrast="auto"> affected</span><span data-contrast="auto">, duration, </span><span data-contrast="auto">geographical spread</span><span data-contrast="auto">, data loss, severity of impact on ICT systems, criticality of services affected, economic impact) with thresholds </span><span data-contrast="auto">that are yet to be published. </span><span data-contrast="auto">Following this methodology, incidents classified as m</span><span data-contrast="auto">ajor will have to be reported to the regulator within the same business day, following a certain template. </span><span data-contrast="auto">Follow-up reporting will also be required after a week, and after a month. </span><span data-contrast="auto">These reports will all be anonymised, compiled, and released regularly to the whole community. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">F</span><span data-contrast="auto">irms will need to change their incident classification </span><span data-contrast="auto">methodology</span><span data-contrast="auto"> to fit with the requirements. They will also need to set up the right processes</span><span data-contrast="auto"> and channels</span><span data-contrast="auto"> to be able to notify the regulator fast in case a major incident occurs. Based on what gets classified as “major”, this might happen frequently. </span><span data-contrast="auto">To help organisations prepare, w</span><span data-contrast="auto">e anticipate that the incident classification methodology will align with the </span><a href="https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy"><span data-contrast="none">ENISA Reference Incident Classification Taxonomy</span></a><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">3. Digital Operational Resilience testing</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><span data-contrast="auto"> </span><span data-contrast="auto">Ensure that </span><span data-contrast="auto">financial entities t</span><span data-contrast="auto">est the efficiency of the risk </span><span data-contrast="auto">management framework and measures in place</span><span data-contrast="auto"> to respond </span><span data-contrast="auto">to </span><span data-contrast="auto">and recove</span><span data-contrast="auto">r from</span><span data-contrast="auto"> </span><span data-contrast="auto">a wide range of</span><span data-contrast="auto"> ICT</span><span data-contrast="auto"> incident </span><span data-contrast="auto">scenario</span><span data-contrast="auto">s</span><span data-contrast="auto">,</span><span data-contrast="auto"> with minimal disruption to critical and important functions</span><span data-contrast="auto">, in a way that is proportionate to their size and criticality for the market.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key requirements:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">With DORA, all firms must put in place a c</span><span data-contrast="auto">omprehensive testing programme, </span><span data-contrast="auto">including a range of assessments, tests, methodologies, practices and tools</span><span data-contrast="auto">, </span><span data-contrast="auto">with a focus on technical testing</span><span data-contrast="auto">.</span><span data-contrast="auto"> The most critical firms</span><span data-contrast="auto"> will also have to organise a l</span><span data-contrast="auto">arge-scale threat-led live </span><span data-contrast="auto">penetration </span><span data-contrast="auto">test</span><span data-contrast="auto"> every 3 years</span><span data-contrast="auto"> (red team</span><span data-contrast="auto"> type exercise</span><span data-contrast="auto">)</span><span data-contrast="auto">, </span><span data-contrast="auto">performed by independent testers</span><span data-contrast="auto">, </span><span data-contrast="auto">covering critical functions and services and involving EU</span><span data-contrast="auto">-based</span><span data-contrast="auto"> ICT </span><span data-contrast="auto">third parties</span><span data-contrast="auto">. </span><span data-contrast="auto">The scenario will have to be agreed by the regulator in advance and </span><span data-contrast="auto">firms will receive a compliance certificate upon </span><span data-contrast="auto">completion of the test</span><span data-contrast="auto">. </span><span data-contrast="auto">More guidance for these tests, as well as the criteria which defines a critical firm,</span><span data-contrast="auto"> will be published in 2021.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">It is likely that c</span><span data-contrast="auto">ritical firms will need to organise this threat-led penetration test by </span><span data-contrast="auto">the end of </span><span data-contrast="auto">2024 and this type of test</span><span data-contrast="auto"> requires a lot of preparation. </span><span data-contrast="auto">The fact that it needs to involve critical ICT third parties will also mean they need to be involved in the preparation. </span><span data-contrast="auto">Firms </span><span data-contrast="auto">that believe they will be in scope </span><span data-contrast="auto">(</span><span data-contrast="auto">might be</span><span data-contrast="auto"> </span><span data-contrast="auto">firms already in the scope of NIS regulation) </span><span data-contrast="auto">should start thinking about the scenario as soon as possible to enable validation with the regulator at least 2 years before the deadline. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">4. ICT third party risk management</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><b><span data-contrast="auto"> </span></b><span data-contrast="auto">Ensure that financial organisations have an appropriate level of control</span><span data-contrast="auto">s</span><span data-contrast="auto"> and monitoring </span><span data-contrast="auto">of </span><span data-contrast="auto">their ICT third parties, especially the ones that underpin critical</span><b><span data-contrast="auto"> </span></b><span data-contrast="auto">functions</span><span data-contrast="auto">; and set up specific oversight on providers that are critical to the market as a whole. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key requirements: </span></b><span data-contrast="auto">With this regulation, the EU </span><span data-contrast="auto">introduces </span><span data-contrast="auto">requirements on both financial organisations and critical ICT providers.</span><b><span data-contrast="auto"> </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul style="text-align: justify;">
<li data-leveltext="" data-font="Wingdings" data-listid="9" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><b><span data-contrast="auto">Financial organisations</span></b><span data-contrast="auto"> will need to have a defined multi-vendor ICT third-party risk strategy and policy owned by a member of the management body.</span><b><span data-contrast="auto"> </span></b><span data-contrast="auto">They will need to compile a standard register of information that contains the full view of all their ICT third-party providers, the services they provide and the functions </span><span data-contrast="auto">they</span><span data-contrast="auto"> underpin</span><span data-contrast="auto">; and report on changes to this register to the regulator once a year. They will need to </span><span data-contrast="auto">assess ICT service providers according to certain criteria before entering a contract (e.g. security level, </span><span data-contrast="auto">concentration risk, sub-outsourcing risks), and they will need to plan for an exit strategy in case of failure of a provider. </span><span data-contrast="auto">DORA also contains guidelines for contract contents </span><span data-contrast="auto">and reasons for termination of contract, which has to be linked to a risk or evidence of non-compliance at the provider level. </span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Wingdings" data-listid="9" aria-setsize="-1" data-aria-posinset="0" data-aria-level="1"><span data-contrast="auto">Under a new Oversight Framework,</span><b><span data-contrast="auto"> critical providers </span></b><span data-contrast="auto">will </span><span data-contrast="auto">be the subject of a</span><span data-contrast="auto">nnual a</span><span data-contrast="auto">ss</span><span data-contrast="auto">essments against resilience requirements such as availability, continuity, data integrity, physical security, risk management processes, governance, reporting, </span><span data-contrast="auto">portability, testing… These assessments will be performed directly by the regulator </span><span data-contrast="auto">and will result in penalties for non-compliance. </span><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">: </span></b><span data-contrast="auto">Collating information on </span><span data-contrast="auto">all ICT vendors</span><span data-contrast="auto"> (not only the most critical)</span><span data-contrast="auto">,</span><span data-contrast="auto"> with the</span><span data-contrast="auto"> services provided and functions they underpin</span><span data-contrast="auto"> for the register of information</span><span data-contrast="auto"> will be a </span><span data-contrast="auto">very </span><span data-contrast="auto">big task for large financial organisations that</span><span data-contrast="auto"> </span><span data-contrast="auto">typically </span><span data-contrast="auto">rely on</span><span data-contrast="auto"> </span><span data-contrast="auto">thousands of</span><span data-contrast="auto"> big and</span><span data-contrast="auto"> small providers</span><span data-contrast="auto"> and legacy contract management systems</span><span data-contrast="auto"> that make it difficult to mine data from</span><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h3 style="text-align: justify;">5. Information and intelligence sharing</h3>
<p style="text-align: justify;"><b><span data-contrast="auto">Why?</span></b><b><span data-contrast="auto"> </span></b><span data-contrast="auto">Promote sharing of information and intelligence on cyber threats between financial organisations to enable them to be better prepared. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Key requirements:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">DORA introduces guidelines on setting up information sharing arrangements between firms for cyber threats</span><span data-contrast="auto">, including confidentiality requirements and the need to notify the regulator. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">Biggest challenge</span></b><b><span data-contrast="auto">:</span></b><span data-contrast="auto"> </span><span data-contrast="auto">We do not see any particular challenge in this space as many organisations already have such agreements in place. </span><span data-contrast="auto">It will be an opportunity to make local initiatives</span><span data-contrast="auto">, </span><span data-contrast="auto">networks</span><span data-contrast="auto"> or</span><span data-contrast="auto"> associations</span><span data-contrast="auto"> visible and</span><span data-contrast="auto"> </span><span data-contrast="auto">encourage more companies to become part of them. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2 style="text-align: justify;">What happens next?</h2>
<p style="text-align: justify;"><span data-contrast="auto">DORA is currently going through the EU legislative process an</span><span data-contrast="auto">d it is expected to take 6-</span><span data-contrast="auto">12</span><span data-contrast="auto"> months before it becomes law. </span><span data-contrast="auto">A</span><span data-contrast="auto"> few questionable topics might lead to some debates and slow down the process, especially on third-party management</span><span data-contrast="auto">: </span><span data-contrast="auto">restrictive criteria for organisations to terminate contracts, banned non-EU based critical third parties, penalty system and financing of the Oversight framework by the critical providers</span><span data-contrast="auto">. </span><span data-contrast="auto">There are also details that still need to be published to clarify some of the requirements</span><span data-contrast="auto"> (e.g. templates, criticality criteria and thresholds…), which might also create some debates. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Once DORA is passed, firms </span><span data-contrast="auto">should</span><span data-contrast="auto"> have one year to get into compliance </span><span data-contrast="auto">with most of the requirements (i.e. probably by the end of 2022</span><span data-contrast="auto"> – but this one-year deadline is short and we anticipate it may shift to 18 months following market feedback</span><span data-contrast="auto">) and 3 years to organise a large-scale penetration test if required (i.e. probably by the end of 2024). </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><b><span data-contrast="auto">In order to be ready, </span></b><b><span data-contrast="auto">we recommend organisations</span></b><b><span data-contrast="auto"> take the following steps in 2021: </span></b><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li style="text-align: justify;" data-leveltext="⁄" data-font="Tahoma" data-listid="10" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">P</span></b><b><span data-contrast="auto">erform a maturity assessment against the </span></b><b><span data-contrast="auto">DORA requirements, with associated gap analysis and mitigation plan to reach compliance by the end of 2022</span></b><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="⁄" data-font="Tahoma" data-listid="10" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Begin thinking about a scenario for the large-scale penetration test, aiming to get it validated by the regulator by mid-2022</span></b><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="⁄" data-font="Tahoma" data-listid="10" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Start </span></b><b><span data-contrast="auto">work on consolidation of the register of information for all ICT third party providers</span></b><span data-ccp-props="{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/12/decrypting-dora-what-does-it-mean-for-resilience-of-financial-organisations/">Decrypting DORA: what does it mean for Resilience of financial organisations?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Test, test and increase your Resilience: how to build your testing programme</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/09/test-test-and-increase-your-resilience-how-to-build-your-testing-programme/</link>
		
		<dc:creator><![CDATA[m@THIEU]]></dc:creator>
		<pubDate>Mon, 14 Sep 2020 11:03:17 +0000</pubDate>
				<category><![CDATA[Cyberrisk Management & Strategy]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[BC]]></category>
		<category><![CDATA[CM]]></category>
		<category><![CDATA[CR]]></category>
		<category><![CDATA[cyber resilience]]></category>
		<category><![CDATA[DR]]></category>
		<category><![CDATA[management]]></category>
		<category><![CDATA[programme]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[testing]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14194</guid>

					<description><![CDATA[<p>This year has been exceptionally trying for individuals, businesses and governments globally. Living and working in a crisis mode introduced an array of challenges, with some firms dealing with them better and faster than others. What is the common denominator?...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/09/test-test-and-increase-your-resilience-how-to-build-your-testing-programme/">Test, test and increase your Resilience: how to build your testing programme</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 style="text-align: justify;">This year has been exceptionally trying for individuals, businesses and governments globally. Living and working in a crisis mode introduced an array of challenges, with some firms dealing with them better and faster than others. What is the common denominator? The answer in most cases is strong crisis reflexes, built over the years with consistent effort.</h3>
<p style="text-align: justify;">Testing is an important part of <b>operational </b><b>resilience</b> and can take <b>many shapes and forms, </b>from disaster recovery testing for ensuring service continuity to end-to-end crisis simulations examining decision-making. It enables to proactively <b>manage risk, embed crisis management framework</b>, and allows to continuously improve capabilities such as <b>business continuity </b>(BC), <b>crisis management </b>(CM), <b>disaster recovery </b>(DR), and <b>cyber resilience </b>(CR). Needless to say, training plays an important role in such a testing programme.</p>
<h3 style="text-align: justify;"><i>“Better awareness nurtures an organisational culture that embraces operational resilience and, as a result, improves the company’s preparedness to deal with adversity.”</i></h3>
<p style="text-align: justify;">From firm to firm, good testing programmes vary in nature, scale and complexity. Depending on how a firm is structured and what it does, testing is addressed at different organisational levels and locations, with involvement of external parties (i.e. critical suppliers). In reality, given little guidance from the regulators on what ‘good’ looks like, programmes are often fragmented and can cause a real headache.</p>
<p>&nbsp;</p>
<h2>Principles for creating a successful testing programme</h2>
<div class="uncode_text_column">
<p style="text-align: justify;">While there is no silver bullet to creating a fit-for-purpose testing programme, we recommend following <b>6 guiding </b><b>principles </b>to devise one that is successful and tailored to your organisation’s needs. Following these could significantly improve the outcomes of the programme.</p>
</div>
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3 style="text-align: justify;">1. Think long term</h3>
<p style="text-align: justify;">When constructing a testing programme, it is of paramount importance to define what you want to achieve in 3 years. A <b>focus on outcomes </b>provides the required direction yet allows the flexibility to re-shape the testing programme each year in order to respond to changes while focusing on the end goal. Begin with small and less complex tests, such as <b>test walkthroughs</b>, and progress to very involved, <b>realistic crisis simulation exercises.</b></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<div class="uncode_text_column">
<h3 style="text-align: justify;">2. Start with threats</h3>
<p style="text-align: justify;">Every test needs to link to threat(s) resulting in one or several plausible major incident scenarios (and impacts). <b>Anticipate and understand new threats </b>through market watch and leverage audit reports and risk assessments when building or reviewing your programme.</p>
<p>&nbsp;</p>
</div>
<div id="gallery-146195" class="isotope-system">
<div class="isotope-wrapper no-gutter style-color-xsdn-bg">
<div class="isotope-container isotope-layout style-masonry" data-type="masonry" data-layout="masonry" data-lg="1000" data-md="600" data-sm="480">
<div class="tmb tmb-iso-w10 tmb-iso-h4 tmb-light tmb-overlay-text-anim tmb-overlay-anim tmb-overlay-middle tmb-overlay-text-left tmb-text-space-reduced tmb-image-anim tmb-bordered tmb-media-first tmb-media-last tmb-content-overlay">
<div class="t-inside style-color-xsdn-bg">
<div class="t-entry-visual" tabindex="0">
<div class="t-entry-visual-tc">
<div class="t-entry-visual-cont">
<div class="dummy">
<figure id="post-14195 media-14195" class="align-none"><img decoding="async" class="aligncenter wp-image-14195 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3.jpg" alt="" width="1866" height="333" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3.jpg 1866w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3-437x78.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3-71x13.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3-768x137.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture3-1536x274.jpg 1536w" sizes="(max-width: 1866px) 100vw, 1866px" /></figure>
</div>
<div class="t-entry-visual-overlay-in style-dark-bg">
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3></h3>
<h3 style="text-align: justify;"><b>3. Focus on Important Business Services (IBS)</b></h3>
<p style="text-align: justify;"><b>Align testing of existing contingency arrangements </b>to important business services and key processes. This ensures preparedness when a situation of high business impact occurs and avoids challenges arising from lack of end-to-end vision.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-internal row-container" style="text-align: justify;">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3><b>4. Diversify testing</b></h3>
<p>The most likely and most impactful scenarios should be examined with <b>different stakeholder groups </b>through different types of testing. This ensures that the theory works in practice and different reflexes are <b>embedded in the organisation’s DNA</b>.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="t-overlay-wrap">
<div class="t-overlay-inner">
<div class="t-overlay-content">
<div class="t-overlay-text single-block-padding">
<div class="uncode_text_column">
<p style="text-align: justify;">To achieve more benefits, go beyond standalone contingency plans and comms tooling testing and examine a combination of them with internal and external, business and technical stakeholders.</p>
<p>&nbsp;</p>
</div>
<div id="gallery-342260" class="isotope-system">
<div class="isotope-wrapper no-gutter">
<div class="isotope-container isotope-layout style-masonry" data-type="masonry" data-layout="masonry" data-lg="1000" data-md="600" data-sm="480">
<div class="tmb tmb-iso-w10 tmb-iso-h4 tmb-light tmb-overlay-text-anim tmb-overlay-anim tmb-overlay-middle tmb-overlay-text-left tmb-image-anim tmb-bordered tmb-media-first tmb-media-last tmb-content-overlay tmb-no-bg">
<div class="t-inside">
<div class="t-entry-visual-cont">
<figure id="post-14197 media-14197" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14197 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1.jpg" alt="" width="1440" height="594" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1.jpg 1440w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1-437x180.jpg 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1-71x29.jpg 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/09/Picture4-uai-1440x594-1-768x317.jpg 768w" sizes="auto, (max-width: 1440px) 100vw, 1440px" /></figure>
</div>
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<p style="text-align: center;"><i>The radar above is an indicative example of what a good testing programme would consist of. The threat categories considered are random and could be selected differently as long as diversification is maintained (mix-and-match).</i></p>
<p>&nbsp;</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="uncode-accordion" data-collapsible="no" data-active-tab="1">
<div id="accordion_1849304804" class="panel-group" role="tablist" aria-multiselectable="true">
<div class="panel panel-default">
<div class="panel-heading" role="tab">
<p><strong>Crisis simulation</strong></p>
<div id="crisis-simulations" class="panel-collapse collapse in" role="tabpanel">
<div class="panel-body">
<div class="uncode_text_column">
<p style="text-align: justify;">Crisis simulations examine a <b>hypothetical disaster situation </b>with defined parties and multi-cells of stimulus. They allow to rehearse the establishment and communication of recovery requirements and carry out relevant activities effectively. Crisis simulation can be a tabletop exercise (level 1), a hands-on simulation (level 2), a multi-cell hands-on crisis simulation (level 3) or an international hands-on multi-cell multi-party simulation (level 4).</p>
<div class="panel-heading" style="text-align: justify;" role="tab"><strong>Work area recovery testing</strong></div>
<div id="work-area-recovery-testing" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column">
<p style="text-align: justify;">Work area recovery testing checks whether <b>full end-to-end business processes</b> can be run offsite, <b>ensuring</b> <b>that</b> <b>all elements of a process can be completed during a test </b>and not just the technical aspects. They can involve a team (level 2) or a number of geographically dispersed teams (level 3) working from recovery sites or home. Both third parties (i.e. outsourced teams) and internal teams should be considered.</p>
<div class="panel-heading" role="tab"><strong>IT disaster recovery plan and cyber range testing</strong></div>
<div id="it-disaster-recovery-plan-and-cyber-range-testing" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column">
<p style="text-align: justify;">IT DRP and Cyber range testing practically examines <b>each step in a specific disaster recovery plan</b> or <b>tests cyber forensics capabilities</b>. This ensures the possibility to <b>recover data, restore critical IT system </b>after an interruption of its services, critical IT failure or complete disruption due to cyber attacks or IT disruptions. This testing can happen as a standalone (level 2) or as part of a crisis simulation (level 3-4).</p>
<div class="panel-heading" style="text-align: justify;" role="tab"><strong>Business recovery plan walkthroughs</strong></div>
<div id="business-recovery-plan-walkthroughs" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column">
<p style="text-align: justify;">Business Recovery Plan walkthroughs for group/business divisions/business units are undertaken following a major revision of a plan or team and are <b>designed to increase the understanding of the recovery processes, roles and responsibilities</b>, <b>and</b> <b>question the suitability and completeness of the plan</b>. Normally this would be carried out as a review-and-challenge session with the plan owner and a BC expert (level 1) or to test the efficiency of the specific measures and planned workarounds (level 2).</p>
<div class="panel-heading" role="tab"><strong>Communication cascade tests</strong></div>
<div id="communication-cascade-tests" class="panel-collapse collapse in" role="tabpanel" aria-expanded="true">
<div class="panel-body">
<div class="uncode_text_column" style="text-align: justify;">
<p>Communication cascade tests establish whether <b>contact details </b>are accurate, determine whether <b>cascade roles and responsibilities </b>are understood by staff, and establish whether or not the <b>documented procedures </b>are robust. They can be completed in one of three ways – either a standalone live test (e.g. text cascade; level 2), as part of a crisis simulation exercise (level 2-4), or an audit involving review of plans and interview of staff with key responsibilities (level 1).</p>
</div>
<div class="row-internal row-container" style="text-align: justify;">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3><b>5. Stay current</b></h3>
<p>Review your testing programme at least once a year in order to <b>adapt to the changing threats landscape</b> and ultimately <b>ensure operational resilience</b>. Make sure your crisis management framework and contingency plans are regularly improved based on the testing outcomes and changes in the business.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="row-internal row-container">
<div class="row row-child">
<div class="row-inner">
<div class="pos-top pos-center align_left column_child col-lg-12 single-internal-gutter">
<div class="uncol style-light">
<div class="uncoltable">
<div class="uncell no-block-padding">
<div class="uncont">
<div class="uncode_text_column">
<h3 style="text-align: justify;"><b>6. Engage and drive</b></h3>
<p style="text-align: justify;"><b>Involve different parties </b>in shaping and running your testing programme (e.g. cyber, risk, Ops, DPO, legal, business resilience champions, etc.). Use MI to share progress and alignment with the 3-year operational resilience vision.</p>
<p>&nbsp;</p>
</div>
<div class="heading-text el-text">
<h2>What next: how do you structure your testing programme?</h2>
</div>
<div class="uncode_text_column">
<p>While it is not possible to prescribe a testing programme without better understanding the organisation of interest and deep-diving into the specifics of a threat landscape, it is clear that investing time and resources is worthwhile from operational resilience and regulatory standpoints.</p>
<h3><i>“Having recently gone through a pandemic, it is a high time to keep the momentum and continue fostering the right culture and correct reflexes for the next </i><i>major </i><i>crisis.”</i></h3>
</div>
<div class="uncode_text_column">
<h4><b>A few concluding tips</b></h4>
</div>
<div class="uncode-wrapper uncode-list">
<ul>
<li><b>Make it realistic: </b>Where maturity allows, aim for more <b>complex and realistic tests </b>as they are essential to effectively respond to real events and increase end-to-end resilience. This means engaging more internal and external parties in the ‘live’ exercises.</li>
<li><b>Leverage internal and market crises: </b>Continuously <b>monitor</b> events happening on the market (major incidents and crises) as well as your internal major incidents to feed your testing program, prioritise your threats and devise your scenarios making it more tangible for your stakeholders.</li>
<li><b>Engage early: </b>Share the vision for testing with <b>key stakeholder groups </b>so they understand the journey on which you want to bring the organisation. This will enhance collaboration and, therefore, outcomes.</li>
<li><b>Facilitate remotely:</b> Remote working arrangements should not put your whole testing programme on hold &#8211; use collaborative solutions or leverage tools from the market for carrying out the exercises. This is especially relevant for cyber range testing and follow-the-sun testing. Experience shows that <b>digital workplace solutions </b>introduce a more democratic participation and is an excellent way to record interactions.</li>
<li><b>Continuously improve:</b> Reflect on tests by producing post-test reports and defining an action plan to <b>drive and track improvements</b>. Involve key stakeholders throughout so they understand the gravitas of the outcomes and help with driving positive changes.</li>
</ul>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/09/test-test-and-increase-your-resilience-how-to-build-your-testing-programme/">Test, test and increase your Resilience: how to build your testing programme</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
