<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IS compromission - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/is-compromission/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/is-compromission/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 02 Jan 2020 14:17:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>IS compromission - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/is-compromission/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cyber-resilience: bend without breaking (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/10/cyber-resilience-bend-without-breaking-22/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Mon, 30 Oct 2017 11:43:42 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cyber crisis]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cyberresilience]]></category>
		<category><![CDATA[IS compromission]]></category>
		<category><![CDATA[Notpetya]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Wannacry]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10168/</guid>

					<description><![CDATA[<p>The first article was about vulnerabilities in Business Continuity Plans (BCP) and an overview on recent major cyber attacks that paralyzed a significant amount of an Information System (IS). This second article introduces some leads and means to improve cyber-resilience...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/10/cyber-resilience-bend-without-breaking-22/">Cyber-resilience: bend without breaking (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>The <a href="https://www.riskinsight-wavestone.com/en/2017/10/cyber-resilience-bend-without-breaking-12/">first article</a> was about vulnerabilities in Business Continuity Plans (BCP) and an overview on recent major cyber attacks that paralyzed a significant amount of an Information System (IS). This second article introduces some leads and means to improve cyber-resilience strategy.<br />
</em></p>
<h2>Strengthening crisis management</h2>
<p>Cyber crises are specific: they are often long (several weeks) and sometimes difficult to grasp (what has the attacker been able to do? For how long? What is the impact?). Often, affected external parties such as lawyers, authorities, suppliers, and sometimes even clients themselves are not well-prepared on the subject matter. Thus, it is necessary to adjust existing plans that have not been designed to cater to the cyber threat aspects.</p>
<p>Even if they is an operational player in cyber crisis management, the CIO should not be over-utilized in either the investigation or the defense measures if it is detrimental to overall production and recovery. Anticipation of these kinds of measures is vital to the recovery effort.  It is necessary to clearly identify the teams which need to be mobilized to respond to the crisis in a timely manner, and to organize the parallel interventions on both the investigation and the construction of the defense plan.</p>
<p>Beyond the organizational point of view, the CIO will have to ensure that they also have the investigation tools (mapping, search for attack signature, independent crisis management IS, capability to analyze unknown malware, etc.), remediation tools (Capabilities to rapidly deploy technical corrections, fragmentation of the IS to save what could be saved, IS surveillance toolkit) and reconstruction tools (access to backup, access to minimal documentation, capabilities to deploy workstation) required to understand the position the attacker took in the IS, to repel it and to ensure it doesn’t return.</p>
<p>Writing a crisis management guide that defines the essential steps, the macro-level responsibilities, and the key decision points can be done as an added bonus. With that, it is essential to conduct crisis exercises to ensure readiness for when one actually occurs.</p>
<p>Here is a functional integrity control chain :</p>
<figure id="post-10171 media-10171" class="align-center"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-10171" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3-article-cyber-resilience.png" alt="" width="955" height="419" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3-article-cyber-resilience.png 955w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3-article-cyber-resilience-435x191.png 435w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3-article-cyber-resilience-768x337.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-3-article-cyber-resilience-71x31.png 71w" sizes="(max-width: 955px) 100vw, 955px" /></figure>
<h2>Rethinking continuity plans</h2>
<p>Continuity plans have to evolve to adapt to cyberthreats. Sometimes, this means they may have to be completely rebuilt.</p>
<p>There are many possible solutions that can cover all types of continuity plans.</p>
<p>The user recovery plan, for example, can evolve to integrate USB keys containing an alternative system which could be used in case of logical destruction of employee workstations. Some organizations have also decided to provision an allotted number of workstations directly with their suppliers to have them delivered quickly in case of physical destruction.</p>
<p>The IT continuity plan, on the other hand, can include new solutions which could be efficient in the event of a cyberattack. The most publicized one aims to build “non- similar facilities” by duplicating an application without using the same software, operating system, or production teams. It is an extreme solution, very costly and difficult to maintain, but one that is considered for specific, critical applications in the financial industry &#8211; most notably, payment system infrastructure.</p>
<p>Other less complex solutions such as adding functional integrity control in the business process have also been considered. The concept relies on the implementation of regular controls, at various levels and at different places within the application chain (“multi-level controls”). This enables quick detection of attacks. An alert could be raised in case of an interaction with technical layers, such as a modification of a value directly inside a database, without passing through regular business workflows (via graphical interfaces), for example. In another case, these mechanisms can also be applied to infrastructure systems by reconciling admin account creation request tickets with the number of accounts really in the system.</p>
<p>As a more intermediate complexity level solution, it is possible to implement a “floodgate”, or as a system and network isolation zone. This floodgate – for example, the industrial IS – can be activated in the event of an attack and could isolate the most sensitive systems from the rest of the IS.</p>
<p>These, often major, evolutions must be part of an existing recovery strategy review so that one can assess their vulnerability and the interest of deploying new cyber-resilience solutions, particularly on the most critical systems. The evolution of Business Impact Analysis (BIA) to include this dimension can be a key first step.</p>
<figure id="post-10174 media-10174" class="align-center"><img decoding="async" class="aligncenter size-full wp-image-10174" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-4-article-cyber-resilience.png" alt="" width="1113" height="533" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-4-article-cyber-resilience.png 1113w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-4-article-cyber-resilience-399x191.png 399w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-4-article-cyber-resilience-768x368.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/11/Image-4-article-cyber-resilience-71x34.png 71w" sizes="(max-width: 1113px) 100vw, 1113px" /></figure>
<p>&nbsp;</p>
<h2>Without cybersecurity, cyber-resilience is nothing</h2>
<p>Implementing these new cyber-resilience measures requires significant efforts. Note that these efforts can be wasted if both these recovery solutions and the regular systems are not already appropriately secured and under detailed surveillance. The CISO is the key player to ensure that these often started but rarely finalized initiatives come to fruition. Help from the Risk Manager (RM), or the Business Continuity Manager (BCM) if such a position is in place, will be valuable. It is widely acknowledged today that it is impossible to secure a system 100%, which means that organizations have to accept the inevitability of an attack occurring, at which moment the RM or the BCM will make full use of their role.</p>
<p>Protect, detect, respond, remediate, and rebuild. These are the pillars of a strong cyber-resilience program which can only be attained if the BCM and the CISO roles combine their full range of capabilities and work hard, hand-in-hand!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/10/cyber-resilience-bend-without-breaking-22/">Cyber-resilience: bend without breaking (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber-resilience: bend without breaking (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/10/cyber-resilience-bend-without-breaking-12/</link>
		
		<dc:creator><![CDATA[Gérôme Billois]]></dc:creator>
		<pubDate>Mon, 30 Oct 2017 10:52:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[cyber crisis]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cyberresilience]]></category>
		<category><![CDATA[IS compromission]]></category>
		<category><![CDATA[Notpetya]]></category>
		<category><![CDATA[Strategy]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[Wannacry]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=10148/</guid>

					<description><![CDATA[<p>Successive cyber attacks, Wannacry and NotPetya, have highlighted the limits of current resilience and business continuity plans, as well as the full capacity of cyberthreats to cripple Information Systems. The affected organizations paid a high price. What can we learn?...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/10/cyber-resilience-bend-without-breaking-12/">Cyber-resilience: bend without breaking (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: left;"><em>Successive cyber attacks, Wannacry and NotPetya, have highlighted the limits of current resilience and business continuity plans, as well as the full capacity of cyberthreats to cripple Information Systems. The affected organizations paid a high price. What can we learn? What actions can we take to prepare for major cyberattacks? How can we ensure cyber-resilience?<br />
</em></p>
<p style="text-align: left;">When confronted with a major cyber attack, whether destructive or leading to a loss of trust in vital systems, the first reaction of a majority of companies is to activate their business continuity plan (BCP). This strategic element of resiliency is enacted  to ensure the organization’s survival against disasters whose magnitude causes computing resources, communication infrastructures, buildings, and possibly even users to be unavailable.</p>
<p style="text-align: left;">Yet major cyber attacks, have not been taken into account when developing most BCPs, even though they can be as destructive in scale as either Wannacry or NotPetya, or, more often, lead to a loss of trust in the basic components of the infrastructure (network, access control, inventory, etc.). By Focusing on an availability agenda, organizations fail to address the issue arising from the simultaneous destruction or the loss of confidence in Information System (IS) caused by cyber attacks.</p>
<p style="text-align: left;">Moreover, these IS continuity plans are frequently intimately linked to the resources they protect and are equally affected by the attacks. For over a decade, continuity processes (either user fallback or IT recovery) have adopted principles of infrastructure pooling and “hot” recovery to cope with both rapid business recovery and the need for better operability.</p>
<p style="text-align: left;">In effect, this « proximity » between the regular IS and its recovery counterpart makes continuity plans vulnerable to cyber attacks.</p>
<h2>What vulnerabilities in business continuity systems?</h2>
<p style="text-align: left;">As an example, various dedicated and connected recovery stations of fallback sites were contaminated by NotPetya and were useless for the remediation.</p>
<p style="text-align: left;">Legacy « cold » recovery/emergency plans (often consisting  of activating a recovery system in case of incident) concern fewer and fewer applications, and the remaining ones are often secondary.</p>
<p style="text-align: left;">Unfortunately, when dealing with a deep compromise of systems, backups often onboard malevolent elements such as malwares, base camps, or modifications meticulously operated by attackers beforehand, due to the fact that intrusions go undetected for long period of time (detection often happens hundreds of days following the initial infection). Not to mention that the continuity of the backup systems themselves is often neglected. During the management of the NotPetya crisis, the backup management servers were also destroyed. Restoring them took several days, due to their complexity and nested nature within the information system; an ActiveDirectory was necessary to launch the restorations while the ActiveDirectory backup was a prerequisite to rebuild it.</p>
<p style="text-align: left;">The same findings hold for industrial IS. Industrial digital systems are resilient against technical breakdowns or anticipated mechanical incidents. However, they were rarely designed with the consideration of the possibility of human malice and as a result often lack advanced security systems. To compound on this, industrial IS has lifecycles of several decades which expose them to old vulnerabilities. Finally, the independence of control channels from the digital systems which they oversee is not always implemented.</p>
<figure id="post-10151 media-10151" class="align-center"><img decoding="async" class="aligncenter size-full wp-image-10151" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-1-cyber-resilience.png" alt="" width="1447" height="680" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-1-cyber-resilience.png 1447w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-1-cyber-resilience-406x191.png 406w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-1-cyber-resilience-768x361.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-1-cyber-resilience-71x33.png 71w" sizes="(max-width: 1447px) 100vw, 1447px" /></figure>
<h2>Two illustrated major attack scenarii</h2>
<h3>Logical destruction or the unavailability of a large chunck of an Information System</h3>
<p>Made real by attacks from true-false ransomware, Wannacry and NotPetya. This type of attack causes mass unavailability of services due to the encryption of data files and/or the operating system. The companies affected by this attack (Merck, Maersk, Saint Gobain, Fedex&#8230; as well as Sony Pictures and Saudi Amramco) lost up to 95% of their Information Systems (tens of thousands of computers and servers) in a timeframe that often lasts less than an hour. At the start of such crisis, the situation is highly difficult since there is no longer any means of communication or exchange mechanism within the affected company, including ISD. Victims have outlined losses of several hundred of million euros following these attacks.</p>
<h3>A compromise and loss of confidence in Information Systems</h3>
<p>It concerns a targeted attack does not challenge the proper functioning of the system. Rather, it aims to give attackers access to all of the company&#8217;s information systems (email and messaging, files, business applications, etc.) allowing them to steal the identity of any employee and carry out actions in their name. The attackers may then extract any type of data or carry out business actions which require several successive validations. These attacks affected a large number of companies across all sectors incurring massive fraud as a result, including the bank of Banglasdesh. These attacks also affected financial and payment data theft as was the case for several distribution groups in the United States including Target and Home Depot. The situation at the start of the crisis is complex since there is no confidence in the Information System and there is considerable uncertainty about what the attacker could do and their motives. It involves quietly investigating until being able to remove the attacker and rebuild a secure system. Victims affected by these attacks have also reported financial impacts worth several hundred million euros.</p>
<figure id="post-10157 media-10157" class="align-center"><img loading="lazy" decoding="async" class="wp-image-10160 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-2-cyber-resilience-1.png" alt="" width="266" height="336" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-2-cyber-resilience-1.png 435w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-2-cyber-resilience-1-151x191.png 151w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/10/images-2-cyber-resilience-1-31x39.png 31w" sizes="auto, (max-width: 266px) 100vw, 266px" /></figure>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/10/cyber-resilience-bend-without-breaking-12/">Cyber-resilience: bend without breaking (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
