<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Recovery - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/recovery-2/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/recovery-2/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Thu, 06 Jul 2023 11:52:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Recovery - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/recovery-2/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title> « Compromise by design » or how to anticipate a destructive cyber attack</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/07/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/07/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack/#respond</comments>
		
		<dc:creator><![CDATA[Axel Petersen]]></dc:creator>
		<pubDate>Thu, 06 Jul 2023 15:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[cyberresilience]]></category>
		<category><![CDATA[Recovery]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20845</guid>

					<description><![CDATA[<p>Most organisations are still insufficiently prepared for a possible compromise of their Information System, leading to its destruction. Taking this risk into account right from the project design stage will enable them to significantly strengthen their resilience capabilities.    On...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/07/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack/"> « Compromise by design » or how to anticipate a destructive cyber attack</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[


<p style="text-align: justify;"><i><span data-contrast="auto">Most </span></i><i><span data-contrast="auto">organisations</span></i><i><span data-contrast="auto"> are still insufficiently prepared for a possible compromise of their Information System, leading to its destruction. Taking this risk into account right from the project design stage will enable them to significantly strengthen their resilience capabilities.</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">On 17 April, the </span><b><span data-contrast="auto">ANSSI</span></b><span data-contrast="auto"> published the </span><b><span data-contrast="auto">first doctrinal documents</span></b><span data-contrast="auto"> concerning </span><b><span data-contrast="auto">remediation</span></b><span data-contrast="auto">, which is defined as the project to regain control of a compromised information system. These documents are the fruit of the Agency&#8217;s experience in supporting victims of security incidents.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This corpus consists of three sections: strategic section, an </span><span data-contrast="auto">organisational</span><span data-contrast="auto"> section, and a technical section. Currently, the technical section focuses on the remediation of tier 0 of the Active Directory</span><span data-contrast="auto">1</span><span data-contrast="auto">, or core of trust. This section will be supplemented with </span><b><span data-contrast="auto">additional documents in the future</span></b><span data-contrast="auto"> to enhance its content. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">The approach proposed by ANSSI (E3R) is divided into 3 stages:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ol>
<li data-leveltext="%1." data-font="Calibri" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,1],&quot;469777803&quot;:&quot;right&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Containment</span><span data-contrast="auto"> of the </span><span data-contrast="auto">attacker</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,1],&quot;469777803&quot;:&quot;right&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Evicting the intruder from the heart of the IS</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="1" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,1],&quot;469777803&quot;:&quot;right&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Eradicating</span><span data-contrast="auto"> the </span><span data-contrast="auto">adversary&#8217;s</span> <span data-contrast="auto">strongholds</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ol>
<p style="text-align: justify;"><span data-contrast="auto">These stages are illustrated by </span><b><span data-contrast="auto">3 typical remediation scenarios</span></b><span data-contrast="auto">, each with increasing ambition levels based on the </span><b><span data-contrast="auto">urgency of the restart</span></b><span data-contrast="auto"> and the </span><b><span data-contrast="auto">costs incurred</span></b><span data-contrast="auto"> by the long-term damage resulting from the attack:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ol>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Restore vital services as quickly as possible</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Regain control of the IS</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Seize the opportunity to prepare for long-term control of the IS</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ol>
<p style="text-align: justify;"><span data-contrast="auto">The publication of this corpus is a timely step in the </span><b><span data-contrast="auto">reflections and projects currently being carried out</span></b><span data-contrast="auto"> by </span><b><span data-contrast="auto">many public and private players</span></b><span data-contrast="auto">, with a view to </span><b><span data-contrast="auto">strengthening their resilience</span></b><span data-contrast="auto"> in the face of a </span><b><span data-contrast="auto">successful cyber-attack</span></b><span data-contrast="auto"> that would compromise or </span><b><span data-contrast="auto">even destroy their Information System on a massive scale</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">In practice, the time required to establish a proven remediation system extends over several years for most players, rather than just months. This timeframe may be out of sync with the evolving threat landscape and the regulatory deadlines imposed on certain entities. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">There are several reasons for this, which vary from one player to another. </span><span data-contrast="auto">However, there are three key factors which contribute to this variation: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ol>
<li style="text-align: justify;" data-leveltext="%1." data-font="Calibri" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Awareness of cyber risk is growing</span></b><span data-contrast="auto">; however, many </span><b><span data-contrast="auto">decision-makers</span></b><span data-contrast="auto"> still </span><b><span data-contrast="auto">lack</span></b><span data-contrast="auto"> adequate understanding. Balancing immediate priorities with long- term preparation in the face of potential compromises often leads to difficult decisions regarding the allocation of valuable human and financial resources. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="%1." data-font="Calibri" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">The interruption of an </span><span data-contrast="auto">organisation&#8217;s</span><span data-contrast="auto"> activities following an IT disaster has historically been dealt with using </span><b><span data-contrast="auto">Disaster Recovery Plans</span></b><span data-contrast="auto">. Their advantages and limitations in terms of remediation are still poorly understood within </span><span data-contrast="auto">organisations</span><span data-contrast="auto">:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span>
<ol style="list-style-type: lower-alpha;">
<li data-leveltext="%1." data-font="Calibri" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Depending on the recovery principles adopted, they may offer </span><b><span data-contrast="auto">advantages in terms of IS recovery sequencing know-how </span></b><span data-contrast="auto">(similar to an electrical shutdown/restart), capabilities for unitary and grouped reconstruction, restored data </span><span data-contrast="auto">resynchronisation</span><span data-contrast="auto"> and reconciliation, among others.</span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1">Remediation efforts can leverage this know-how, provided it has not been lost because of the adoption of new solutions (e.g., active/active backup) or when a <b style="font-size: revert; color: initial;"><span data-contrast="auto">&#8216;debt&#8217;</span></b><span style="font-size: revert; color: initial;" data-contrast="auto"> in terms of maintaining operational conditions and </span><b style="font-size: revert; color: initial;"><span data-contrast="auto">DRP exercises</span></b><span style="font-size: revert; color: initial;" data-contrast="auto"> has built up.</span><span style="font-size: revert; color: initial;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1440,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ol>
</li>
</ol>
<p style="text-align: justify;"><span data-contrast="auto">Nonetheless, these plans also have </span><b><span data-contrast="auto">significant limitations</span></b><span data-contrast="auto">. Their architecture relies on technical interconnections and data replication with backup infrastructures, which can inadvertently </span><b><span data-contrast="auto">propagate compromises</span></b><span data-contrast="auto">. Furthermore, while their relevance is proven in a deterministic context (where a given disaster corresponds to a given solution and plan), their effectiveness becomes much less certain when confronted with the diverse characteristics and possibilities of </span><b><span data-contrast="auto">evolving cyber attacks</span></b><span data-contrast="auto"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This calls for a </span><b><span data-contrast="auto">hybrid approach</span></b><span data-contrast="auto"> involving operational, </span><b><span data-contrast="auto">DRP and cyber resilience players</span></b><span data-contrast="auto">. This can be facilitated or hindered depending on the </span><b><span data-contrast="auto">governance</span></b><span data-contrast="auto"> that has been put in place between these populations.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">To </span><b><span data-contrast="auto">accelerate the necessary rise in maturity</span></b><span data-contrast="auto"> of players on the subject of IS remediation following a cyber-attack, </span><b><span data-contrast="auto">several approach</span></b><span data-contrast="auto"> can be considered. Outlined below are </span><i><span data-contrast="auto">four potential strategies</span></i><span data-contrast="auto">, and the subsequent information will provide a more detailed explanation and elaboration for each approach.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ol>
<li data-leveltext="%1." data-font="Calibri" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Helping decision-makers to understand the specific nature of cyber risk;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Anchoring &#8220;compromise by design&#8221; in everyday life;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Have several remedial options at your disposal;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="%1." data-font="Calibri" data-listid="16" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Sharing and </span><span data-contrast="auto">capitalising</span><span data-contrast="auto"> on feedback.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ol>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> <img fetchpriority="high" decoding="async" class="aligncenter wp-image-20848 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/07/Schema-article-recovery-VE.jpg" alt="Is remediation : 4 way to accelerate its mutation" width="1280" height="720" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/07/Schema-article-recovery-VE.jpg 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/07/Schema-article-recovery-VE-340x191.jpg 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/07/Schema-article-recovery-VE-69x39.jpg 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/07/Schema-article-recovery-VE-768x432.jpg 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/07/Schema-article-recovery-VE-800x450.jpg 800w" sizes="(max-width: 1280px) 100vw, 1280px" /></span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h2><span data-contrast="none">Helping decision-makers understand the specific nature of cyber risk</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto"> The </span><b><span data-contrast="auto">vast majority of players</span></b><span data-contrast="auto"> do not totally rule out the </span><b><span data-contrast="auto">possibility of being vulnerable</span></b><span data-contrast="auto"> to a successful cyber-attack that would </span><span data-contrast="auto">paralyse</span><span data-contrast="auto"> their activities through the </span><b><span data-contrast="auto">logical destruction of their IT assets</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">On the other hand, a significant proportion of players have not yet grasped the fact that their existing IT backup resources are </span><b><span data-contrast="auto">rarely adapted</span></b><span data-contrast="auto"> to the specific characteristics of this type of attack. A cyber-attack can </span><b><span data-contrast="auto">jeopardise</span></b><b><span data-contrast="auto"> the availability</span></b><span data-contrast="auto"> and non-compromise of operating and administrative </span><b><span data-contrast="auto">resources</span></b><span data-contrast="auto">, right down to the </span><b><span data-contrast="auto">workstations of those involved in IS recovery</span></b><span data-contrast="auto">. The timeframe for remediating an Information System (IS) that has suffered extensive destruction due to a cyber-attack is typically considerably longer compared to the recovery time communicated to the business in the event of a physical disaster.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">A number of players have not yet fully assessed the impact of the </span><b><span data-contrast="auto">cyber threat on their ecosystems</span></b><span data-contrast="auto">, for example:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">If their </span><b><span data-contrast="auto">first-tier IT</span></b> <b><span data-contrast="auto">service providers</span></b><span data-contrast="auto"> (outsourcer, cloud service provider, etc.), or even </span><b><span data-contrast="auto">higher-tier</span></b><span data-contrast="auto"> providers, are themselves </span><b><span data-contrast="auto">affected by a successful destructive attack</span></b><span data-contrast="auto">;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="8" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">If a player is the </span><b><span data-contrast="auto">victim of a cyber-attack</span></b><span data-contrast="auto">, whether proven successful or not, its </span><b><span data-contrast="auto">partners</span></b><span data-contrast="auto"> who have knowledge of the attack will be able to </span><b><span data-contrast="auto">isolate it unilaterally</span></b><span data-contrast="auto"> for protection purposes.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">The awareness of an </span><span data-contrast="auto">organisation&#8217;s</span><span data-contrast="auto"> decision-makers of the cyber risk, its systemic implications and the impact on its business must be developed. In the financial sector, the </span><b><span data-contrast="auto">DORA</span></b><span data-contrast="auto"> regulations, or their equivalents in certain non-European countries, as well as the </span><b><span data-contrast="auto">stress tests</span></b><span data-contrast="auto"> announced by the European Central Bank for </span><b><span data-contrast="auto">2024</span></b><span data-contrast="auto">, should contribute to this.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">For many decision-makers, </span><b><span data-contrast="auto">too many technical words</span></b><span data-contrast="auto"> are used to describe the </span><b><span data-contrast="auto">risk of cyber destruction</span></b><span data-contrast="auto">. Unlike compliance issues such as the RGPD, which can be understood by the uninitiated, this risk is </span><b><span data-contrast="auto">perceived as a matter for technical experts</span></b><span data-contrast="auto">. Nevertheless, the subject is increasingly being addressed at executive committee level, for example through the presence of the CISO on the Executive Committee and/or through external speakers with experience in acculturating senior management.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h2 style="text-align: justify;"><span data-contrast="none">Anchoring &#8220;compromise by design&#8221; in everyday life</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">By considering the possibility of an IS compromise that could result in its destruction and incorporating this perspective </span><b><span data-contrast="auto">from project design to operational activities</span></b><span data-contrast="auto">, the resilience capabilities of the IS can be significantly bolstered. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">From the earliest stages of a project, the business units can be called upon to </span><b><span data-contrast="auto">identify and evaluate</span></b><span data-contrast="auto">, with the support of the technical teams, </span><b><span data-contrast="auto">cyber-resilient design solutions</span></b><span data-contrast="auto">. </span><span data-contrast="auto">These</span> <span data-contrast="auto">may</span> <span data-contrast="auto">include</span><span data-contrast="auto">:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">To use suppliers of </span><b><span data-contrast="auto">nominal solutions</span></b><span data-contrast="auto"> that are </span><b><span data-contrast="auto">technically independent</span></b><span data-contrast="auto"> of the </span><span data-contrast="auto">organisation&#8217;s</span><span data-contrast="auto"> IS, so that its activities are not based exclusively on it’s IS;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">To host and operate </span><b><span data-contrast="auto">backup solutions</span></b><span data-contrast="auto"> outside the </span><span data-contrast="auto">organisation&#8217;s</span><span data-contrast="auto"> IS;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Use </span><b><span data-contrast="auto">cyber-resilient architecture models</span></b><span data-contrast="auto"> based on an on-premises catalogue or hosted in the Cloud. They are also designed to allow their resilience to be tested while limiting the impact of tests on production;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Designing projects that enable operation in </span><b><span data-contrast="auto">degraded mode</span></b><span data-contrast="auto"> via :</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span>
<ul>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Periodic extraction of business data in office format, outsourced and protected in an external file storage service;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">The ability for applications (and services such as restoration) to operate without certain cross-functional services such as the AD authentication repositories via local backup accounts, etc; </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
</li>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="9" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Drawing up </span><b><span data-contrast="auto">downgraded business procedures</span></b><span data-contrast="auto"> based on downgraded IS resources such as those defined above.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">In addition, the appropriateness of certain practices, although incompatible with the objectives of </span><span data-contrast="auto">standardisation</span><span data-contrast="auto"> and </span><span data-contrast="auto">industrialisation</span><span data-contrast="auto">, can be considered at the technical design stage, in particular:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Encouraging </span><b><span data-contrast="auto">diversity of technologies</span></b><span data-contrast="auto"> to limit the exploitation of a vulnerability.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="10" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Limiting the dependency</span></b><span data-contrast="auto"> of applications on </span><b><span data-contrast="auto">cross-functional information systems</span></b><span data-contrast="auto">, so that they can be </span><b><span data-contrast="auto">rebuilt</span></b><span data-contrast="auto"> and made operational more quickly.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">During the </span><b><span data-contrast="auto">acceptance phase</span></b><span data-contrast="auto">, business operations in </span><b><span data-contrast="auto">degraded mode</span></b><span data-contrast="auto"> and the ability to </span><b><span data-contrast="auto">rebuild</span></b><span data-contrast="auto"> an application can be </span><b><span data-contrast="auto">systematically tested</span></b><span data-contrast="auto"> before going into production. This test can be </span><b><span data-contrast="auto">reviewed </span></b><span data-contrast="auto">if necessary for each major change. It should be reiterated periodically through exercises that will enable remediation capabilities to be tested and </span><b><span data-contrast="auto">enhance the skills</span></b><span data-contrast="auto"> of the various operational players.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">Moving </span><b><span data-contrast="auto">beyond the project phase</span></b><span data-contrast="auto">, the integration of asset </span><b><span data-contrast="auto">reconstruction</span></b><span data-contrast="auto"> practices into Business As Usual (BAU) operations enables better mastery of these practices. This, in turn, benefits a larger number of participants in the event of remediation, for example;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="11" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:768,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Reconstruction</span></b><span data-contrast="auto">, once or twice a year, using non-IS resources (e.g., Cloud services or off-line resources), of </span><b><span data-contrast="auto">workstations</span></b><span data-contrast="auto"> used for </span><b><span data-contrast="auto">administrative tasks and/or critical activities</span></b><span data-contrast="auto">;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="11" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:768,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Reconstruction</span></b><span data-contrast="auto">, once a year, of </span><b><span data-contrast="auto">infrastructures essential</span></b><span data-contrast="auto"> to the recovery of the IS (e.g., restoration infrastructures, core of trust, </span><span data-contrast="auto">virtualisation</span><span data-contrast="auto"> base, etc.), to be determined on the basis of the threat and risk analysis;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="11" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:768,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Development of </span><b><span data-contrast="auto">CI/CD practices</span></b><span data-contrast="auto"> on a daily basis, particularly in Cloud environments, in order to automate the </span><b><span data-contrast="auto">recreation of servers</span></b><span data-contrast="auto"> to apply changes to them, such as version upgrades or patches.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">Finally, keeping the </span><b><span data-contrast="auto">IS map</span></b><span data-contrast="auto"> (including its interconnections with partners and the Internet) and its </span><b><span data-contrast="auto">interdependencies up to date</span></b><span data-contrast="auto"> daily is a key factor in remediation, which must be supported by appropriate processes, tools (cyber-resilience) and controls.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h2><span data-contrast="none">Having several remediation options at your disposal</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">Given the difficulty of predicting the course of a cyber-attack and the evolution of its impact in advance, the preparation of a plan requires a balance to be struck between two excesses:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li style="text-align: justify;" data-leveltext="%1." data-font="Calibri" data-listid="12" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Developing reconstruction solutions tailored to </span><b><span data-contrast="auto">too few attack scenarios</span></b><span data-contrast="auto">, with the inherent risk of </span><b><span data-contrast="auto">deadlock</span></b><span data-contrast="auto">,</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="%1." data-font="Calibri" data-listid="12" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Or, on the contrary, seek to cover </span><b><span data-contrast="auto">all possible scenarios</span></b><span data-contrast="auto">, at the cost of a </span><b><span data-contrast="auto">significant loss of efficiency</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">An </span><b><span data-contrast="auto">updated risk analysis</span></b><span data-contrast="auto"> of possible attack scenarios, based on a </span><b><span data-contrast="auto">threat watch</span></b><span data-contrast="auto">, makes it possible to </span><b><span data-contrast="auto">prioritise</span></b><span data-contrast="auto"> those to be covered, such as those with the highest probability of success and the greatest impact in the context of the </span><span data-contrast="auto">organisation</span><span data-contrast="auto">. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p style="text-align: justify;"><span data-contrast="auto">This analysis makes it easier to </span><b><span data-contrast="auto">identify the assumptions</span></b><span data-contrast="auto"> that will be used as inputs to the development of plans. </span><span data-contrast="auto">For example ;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="17" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Just a year ago, planning for the </span><b><span data-contrast="auto">industrialised</span></b><b><span data-contrast="auto"> reconstruction of the </span></b><b><span data-contrast="auto">virtualisation</span></b><span data-contrast="auto"> layer of physical servers did not appear to be a necessity for most players, but it has now been identified as essential.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="" data-font="Symbol" data-listid="17" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">The destruction of Cloud resources through the </span><b><span data-contrast="auto">compromise of access to the tenant</span></b><span data-contrast="auto"> (master accounts or API access) or even the </span><b><span data-contrast="auto">compromise of the Cloud provider</span></b><span data-contrast="auto"> itself, appears to be a new risk that needs to be considered in the Cloud resilience strategy of several players.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">Once the </span><b><span data-contrast="auto">working hypotheses have been chosen or ruled out</span></b><span data-contrast="auto"> (e.g., the types of components and technologies impacted, the residual capacities of the malicious code once its means of interacting with the attacker have been cut off, etc.), it is possible to </span><b><span data-contrast="auto">assess the relevance of the various possible means of reconstruction</span></b><span data-contrast="auto"> and to </span><b><span data-contrast="auto">prioritise</span></b><b><span data-contrast="auto"> the work</span></b><span data-contrast="auto"> more effectively. The following are possible means of reconstruction. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li style="text-align: justify;" data-leveltext="%1)" data-font="Calibri" data-listid="14" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1)&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Restore</span></b><span data-contrast="auto"> systems and/or business data from backups, if necessary, in an isolated environment (e.g., from snapshots, offline or &#8220;immutable&#8221; backups);</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="%1)" data-font="Calibri" data-listid="14" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1)&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Cleaning up</span></b><span data-contrast="auto"> restored environments that may have already been compromised when they were backed up (e.g., Using antivirus software for office files and systems that may have been compromised, using an EDR on systems that have been restarted in an isolated environment, or using solutions that can clean up the backed-up image of a virtual server directly);</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="%1)" data-font="Calibri" data-listid="14" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1)&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="auto">Reinstallation</span></b><span data-contrast="auto"> of compromised technical layers (e.g., OS, middleware, etc.);</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="%1)" data-font="Calibri" data-listid="14" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1)&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="auto">Replenishment</span></b><span data-contrast="auto"> of virtual infrastructures (e.g., Terraform, etc.);</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li style="text-align: justify;" data-leveltext="%1)" data-font="Calibri" data-listid="14" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1)&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Strategies and solutions that can cover both the risk of a conventional disaster and a cyber disaster (e.g., a backup IS that is independent of the nominal IS, with business data refreshed by a device that maintains technical watertightness).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">This assessment should lead to the development of a &#8220;</span><b><span data-contrast="auto">catalogue</span></b><span data-contrast="auto">&#8221; of </span><b><span data-contrast="auto">remediation methods</span></b><span data-contrast="auto">, the application of which should be </span><span data-contrast="auto">contextualised</span><span data-contrast="auto"> at the time of the attack. As a complement to each reconstruction solution in the catalogue, the </span><b><span data-contrast="auto">identification of an alternative</span></b><span data-contrast="auto"> &#8211; perhaps less </span><span data-contrast="auto">industrialised</span><span data-contrast="auto"> &#8211; solution will </span><b><span data-contrast="auto">enable us to deal more effectively with the vagaries of the attack context</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h2><span data-contrast="none">Sharing and capitalising on feedback</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}"> </span></h2>
<p style="text-align: justify;"><span data-contrast="auto">To gain maturity and efficiency in remediation more quickly, market players benefit from </span><span data-contrast="auto">capitalising</span><span data-contrast="auto"> on the experience of others.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">This may involve </span><span data-contrast="auto">capitalising</span><span data-contrast="auto"> on:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Studies, such as the </span><b><span data-contrast="auto">body of doctrine published by ANSSI</span></b><span data-contrast="auto">;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Direct exchanges</span></b><span data-contrast="auto"> with </span><b><span data-contrast="auto">peers</span></b><span data-contrast="auto"> or </span><b><span data-contrast="auto">via third parties</span></b><span data-contrast="auto">;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="18" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="auto">Working groups</span></b><span data-contrast="auto"> in which its ecosystem of partners will be represented if possible.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p style="text-align: justify;"><span data-contrast="auto">The feedback to be sought can relate to the specificity of the cyber context in remediation but also to more traditional aspects linked to the reconstruction of an IS such as:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">The methods and approaches used;</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Proven</span> <span data-contrast="auto">market</span><span data-contrast="auto"> solutions (</span><span data-contrast="auto">beyond</span><span data-contrast="auto"> promises); </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Performance </span><span data-contrast="auto">achieved</span><span data-contrast="auto"> (reconstruction times) </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Costs</span><span data-contrast="auto">; </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Logistical and HR aspects (similar to crisis management); </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="15" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">More functional aspects such as data reconciliation, following different restoration points and lost flows with third parties.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p> </p>
<h3>Other articles on the subject of remediation :</h3>
<p><a href="https://www.riskinsight-wavestone.com/en/2023/06/surviving-an-active-directory-compromise-key-lessons-to-improve-the-reconstruction-process/">Surviving an Active Directory compromise: key lessons for improving the rebuilding process</a></p>
<p><a href="https://www.riskinsight-wavestone.com/en/2021/11/cyber-attacks-what-are-the-risks-for-backups-and-how-to-protect-yourself/">Cyber-attacks: what are the risks for backups and how can you protect yourself?</a></p>
<p><a href="https://www.riskinsight-wavestone.com/en/2023/02/approaches-to-quick-active-directory-recovery/">Active Directory rebuild: approaches to quick Active Directory recovery</a></p>
<p><span data-contrast="auto">Next on </span><a href="https://www.riskinsight-wavestone.com/"><span data-contrast="none">https://www.riskinsight-wavestone.com/</span></a><span data-contrast="auto"> : workstation remediation</span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/07/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack/"> « Compromise by design » or how to anticipate a destructive cyber attack</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/07/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Surviving an Active Directory compromise: Key lessons to improve the reconstruction Process </title>
		<link>https://www.riskinsight-wavestone.com/en/2023/06/surviving-an-active-directory-compromise-key-lessons-to-improve-the-reconstruction-process/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/06/surviving-an-active-directory-compromise-key-lessons-to-improve-the-reconstruction-process/#respond</comments>
		
		<dc:creator><![CDATA[Benoît Marion]]></dc:creator>
		<pubDate>Mon, 05 Jun 2023 09:05:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[AD]]></category>
		<category><![CDATA[Recovery]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20616</guid>

					<description><![CDATA[<p>Active Directory is a critical asset whose failure affects a large portion of your information system  Your company is currently dealing with a major ransomware crisis. Given its central role in managing access, authentication, and network resources within any organisation,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/06/surviving-an-active-directory-compromise-key-lessons-to-improve-the-reconstruction-process/">Surviving an Active Directory compromise: Key lessons to improve the reconstruction Process </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 style="text-align: justify;">Active Directory is a critical asset whose failure affects a large portion of your information system </h2>
<p style="text-align: justify;">Your company is currently dealing with a major ransomware crisis. Given its central role in managing access, authentication, and network resources within any organisation, cybercriminals have compromised the Active Directory in 100% of these crises.  </p>
<p style="text-align: justify;">Your systems are now encrypted if the attackers have activated the malicious payload. They might otherwise be isolated and unavailable. In either case, your company no longer has the necessary resources to function properly, and your activity has either ceased or has been significantly slowed! <br /><br /></p>
<figure id="attachment_20568" aria-describedby="caption-attachment-20568" style="width: 2519px" class="wp-caption aligncenter"><img decoding="async" class="wp-image-20568 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image5.png" alt="Perimeter affected by compromise" width="2519" height="1152" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image5.png 2519w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image5-418x191.png 418w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image5-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image5-768x351.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image5-1536x702.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image5-2048x937.png 2048w" sizes="(max-width: 2519px) 100vw, 2519px" /><figcaption id="caption-attachment-20568" class="wp-caption-text"><em>Perimeter affected by compromise</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<p style="text-align: justify;">In this case, trust in your information system has been broken. Your teams begin to feel business pressure, and one question persists: when will we be able to reopen our services? Your goal then becomes clear: you must restore Active Directory with a high enough level of trust to reopen services as soon as possible. </p>
<p style="text-align: justify;">Rebuilding an Active Directory is a difficult step in crisis management. If poorly executed, your organisation exposes itself to two major risks: exacerbating the operational impacts for the business or introducing a new threat to your environment.</p>
<p style="text-align: justify;">The ANSSI has recently published three very comprehensive guides on this subject <a href="#ref1" name="ref1-retour">[1]</a>, which we recommend you read. </p>
<p style="text-align: justify;">In this article, we will go over some of the items that stood out to us during crisis management. Our teams were able to overcome numerous obstacles during their interventions. What are the main issues that have arisen? How can they be fixed?</p>
<h2 style="text-align: justify;">From compromise to reopening: advice to overcome obstacles</h2>
<figure id="attachment_20580" aria-describedby="caption-attachment-20580" style="width: 2972px" class="wp-caption aligncenter"><img decoding="async" class="wp-image-20580 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image6b.png" alt="Active Directory rebuild - Five main advices" width="2972" height="1544" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image6b.png 2972w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image6b-368x191.png 368w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image6b-71x37.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image6b-768x399.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image6b-1536x798.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image6b-2048x1064.png 2048w" sizes="(max-width: 2972px) 100vw, 2972px" /><figcaption id="caption-attachment-20580" class="wp-caption-text"><em>Active Directory rebuild &#8211; Five main advices</em></figcaption></figure>
<h3> </h3>
<h3 style="text-align: justify;"><strong>Start remediation efficiently with a proven organization</strong></h3>
<p style="text-align: justify;">Time lost due to poor crisis organisation can exacerbate the consequences of an Active Directory compromise. Teams are frequently unsure of what to do, who to involve, and what goals to pursue. A delayed response will increase remediation costs, revenue losses, and have an impact on the company&#8217;s reputation.</p>
<p style="text-align: justify;"><em>Before the crisis&#8230;</em><br />It is necessary to identify all the key players to involve in the reconstruction of the Active Directory:</p>
<p style="text-align: justify;">The executive committee will resolve fundamental issues. For example, do we prioritise reopening critical services quickly for business reasons or slowly and securely? There are several possible postures, each with advantages and disadvantages [1 &#8211; Strategic Dimension]. The entire remediation plan is based on this decision, so the executive committee must make a decision to begin work immediately.  </p>
<p style="text-align: justify;">Business teams will identify and prioritise the most critical services for restoration. The Active Directory compromise affects the majority of the company&#8217;s services, and your teams will be unable to handle all requests at once. </p>
<p style="text-align: justify;">Intervention teams (technical and security) will be formed to define and implement the remediation strategy. Because of the expertise and human efforts required to rebuild an Active Directory, temporary reinforcement of your teams is required to handle the remediation: mastering configuration review tools (PingCastle, Purple Knight, etc.), prioritising detected vulnerabilities, deployment and control of measures, and so on. </p>
<p style="text-align: justify;">It is critical to define processes and reflex cards in order to optimise each actor&#8217;s reaction time. Simulations and regular exercises should be organised in addition to their writing to train your teams to react effectively. </p>
<p style="text-align: justify;"><em>During the crisis&#8230;</em> </p>
<p style="text-align: justify;">Rapidly implement a project monitoring system that includes regular reports, action tracking, and coordination among the various teams involved. Too often, a lack of communication and information leads to a slowdown in remediation. It is not uncommon for administrators to take initiatives without taking the time to communicate them, such as opening more network ports than necessary, parallelizing two tasks from the remediation plan, and so on. These well-intended initiatives can have a significant impact on remediation, ranging from complicating the work to a distorted view of the true security level following the security work, and thus an increased risk of new lightning compromise. </p>
<p> </p>
<h3 style="text-align: justify;"><strong>Ensure the resilience of <span style="text-decoration: line-through;">b</span>ackups by defining a robust strategy  </strong><strong> </strong></h3>
<p style="text-align: justify;">When dealing with an Active Directory compromise, the unavailability of backups (corrupted or compromised) is a major challenge. Attackers frequently target and disable backups or disrupt backup servers. This complicates and lengthens Active Directory restoration and recovery. </p>
<p style="text-align: justify;"><em>Before the crisis&#8230;</em></p>
<p style="text-align: justify;">Create a resilient backup strategy that takes best practices and recommendations into account (backup on disconnected media, immutable or in the cloud) <a href="#ref2" name="ref2-retour">[2]</a>. There is currently a significant gap between state-of-the-art and implemented backup strategies (for example, Active Directory authentication of backup infrastructures, unsecured domain controller backups, and so on). </p>
<p style="text-align: justify;"><em>During the crisis…</em> </p>
<p style="text-align: justify;">Consider performing Active Directory remediation from a compromised domain controller. This &#8220;double bascule&#8221; method can assist in recovering and securing critical data in order to restore the Active Directory service without the use of a backup. When backups are unavailable and the strategy does not include rebuilding Active Directory from scratch, this scenario is selected. </p>
<figure id="attachment_20572" aria-describedby="caption-attachment-20572" style="width: 3967px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-20572 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image7.png" alt="Overview - &quot;double bascule&quot; methodology" width="3967" height="1170" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image7.png 3967w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image7-437x129.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image7-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image7-768x227.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image7-1536x453.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image7-2048x604.png 2048w" sizes="auto, (max-width: 3967px) 100vw, 3967px" /><figcaption id="caption-attachment-20572" class="wp-caption-text"><em>Overview &#8211; &#8220;double bascule&#8221; methodology</em></figcaption></figure>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Anticipate technical problems such as DNS Active Directory configuration by maintaining your environment</strong><strong> </strong></h3>
<p style="text-align: justify;">The vast majority of Active Directory environments have accumulated technical debt over time (complex network architecture, roles such as DHCP carried out by domain controllers rather than dedicated servers, and so on). Furthermore, Active Directory environments are now synchronised with Azure Active Directory, establishing new technological dependencies that may complicate remediation in the event of an Active Directory compromise (Active Directory/Azure Active Directory synchronisation). These two elements can cause an array of technical issues on the day of the crisis (loss of synchronisation with Azure Active Directory, unavailability of the DHCP service carried by a domain controller that must be turned off, and so on).</p>
<p style="text-align: justify;"><em>Before the crisis&#8230;</em> </p>
<p style="text-align: justify;">Maintain Active Directory technical documentation and inventories (infrastructure, Azure Active Directory synchronisation, etc.). It often proves too difficult to obtain a clear view of the environment and the perimeter to be remediated. Up-to-date inventories will significantly improve remediation work and ensure the establishment of a consistent remediation plan. Additionally, this will allow you to identify and correct bad practises that could cause major issues on the day of the crisis (DNS service configuration, DHCP, and so on). </p>
<p style="text-align: justify;"><em>During the crisis&#8230;</em> </p>
<p style="text-align: justify;">After 30 days of desynchronization with the Active Directory, Azure Active Directory services may become unavailable, resulting in a ticking time bomb. Make sure to assess the consequences of losing Azure Active Directory services and avoid relying on them to handle critical tasks (email communication, for example).  </p>
<p style="text-align: justify;">The crisis will highlight numerous technical flaws (Active Directory configuration report via audit tools, network issues, and so on). Make sure to only deal with problems that are related to the remediation plan&#8217;s objectives (see Advice No. 5 &#8211; Set a course and stick to it during remediation!). </p>
<p style="text-align: justify;"> </p>
<h3 style="text-align: justify;"><strong>Optimize the reinitialization of secrets through processes adapted to your context</strong><strong> </strong><strong><br /></strong></h3>
<p style="text-align: justify;">Active Directory compromise results in a loss of trust in all of its secrets. As such, a reset of these is required to achieve the level of security required to reopen services while avoiding another quick compromise. Resetting a large number of user passwords and service accounts can have significant operational consequences in large environments with several thousand users and more than a hundred applications. To provide the new password for service accounts, you must first understand how the application uses the account. For users, you must devise a secure method of distributing new passwords on a large scale. </p>
<p style="text-align: justify;"><em>Before the crisis&#8230;</em> </p>
<p style="text-align: justify;">It is critical to have a clear understanding of the process of assigning new passwords to users. Several methods are available, depending on the environment studied, such as summoning users with the presentation of an identity card, transmitting the new username/password via physical mail, email, SMS, and so on. Regardless of the method chosen, the user must be required to reset his password on the next connection. Users may also be able to reset their own passwords using solutions that rely on two-factor authentication, for example. </p>
<p style="text-align: justify;">To carry out service account work, it is essential to create an inventory by identifying the associated applications and password reset methods for each of them. Obtaining this inventory by remediation teams is frequently complicated (unavailable, not maintained, etc.) and thus necessitates devoting significant time to tasks that can be completed outside of the crisis. Aside from remediation work, this exercise will help you manage your service accounts on a daily basis. One of the best practices is to change the passwords on these accounts on a regular basis. </p>
<p style="text-align: justify;"><em>During the crisis&#8230;</em> </p>
<p style="text-align: justify;">Once the passwords have been reset, it is necessary to ensure that the security measure has been implemented throughout the environment. This is easily accomplished with a PowerShell script, and it ensures that the attacker no longer has a valid account to exploit. </p>
<p> </p>
<h3 style="text-align: justify;"><strong>Set a course and stick to it during the remediation!</strong><strong> </strong></h3>
<p style="text-align: justify;">During an Active Directory reconstruction, it is frequently difficult to strike the right balance between exposing oneself to risks by reopening too quickly and incurring significant financial losses by reopening too slowly. Take care not to fall into the common pitfalls of managing a ransomware crisis.<a href="#ref3" name="ref3-retour">[3]</a> </p>
<p style="text-align: justify;"><em>Before the crisis&#8230;</em> </p>
<p style="text-align: justify;">It is necessary to consider the various remediation postures: quickly restoring vital services, regaining control of the information system, or seizing the opportunity to prepare for long-term control of the information system. <a href="#ref1" name="ref1-retour">[1]</a> </p>
<p style="text-align: justify;">Beyond defining the posture, ensure that you understand your Active Directory trust core, which is made up of the most critical assets (Tier 0). The remediation actions begin with these components (domain controllers, for example) in order to restore Active Directory&#8217;s vital services and to ensure a level of security that does not allow the attacker to compromise the entire environment again. </p>
<p style="text-align: justify;"><em>During the crisis&#8230;</em> <br />Make sure that your teams stay on track. As the remediation plan is carried out, new issues will emerge (unavailability of the domain controller carrying one of the required FSMO roles for remediation, network problems, and so on). It will be necessary to question the short-term relevance of its remediation in relation to the set objectives (the answer being dependent on the executive committee&#8217;s posture: quick reopening or slower and more secure).  </p>
<p style="text-align: justify;">Consider the opportunities presented by the crisis. For example, if the DHCP service was managed by a domain controller, take advantage of the opportunity to set up a dedicated DHCP server, thereby decoupling the service from the domain controller. </p>
<p style="text-align: justify;"> </p>
<h2 style="text-align: justify;">Our lessons  </h2>
<figure id="attachment_20574" aria-describedby="caption-attachment-20574" style="width: 2960px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-20574 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image8.png" alt="Synthesis - How to prepare the Active Directory rebuild?" width="2960" height="1246" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image8.png 2960w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image8-437x184.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image8-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image8-768x323.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image8-1536x647.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/06/Image8-2048x862.png 2048w" sizes="auto, (max-width: 2960px) 100vw, 2960px" /><figcaption id="caption-attachment-20574" class="wp-caption-text"><em>Synthesis &#8211; How to prepare the Active Directory rebuild?</em></figcaption></figure>
<p> </p>
<p style="text-align: justify;">The improvement of the reconstruction process before the compromise of Active Directory ultimately rests on three main axes: </p>
<ol style="text-align: justify;">
<li>The drafting of functional processes and reflex cards to be able to: 
<ol style="text-align: justify;">
<li>Mobilize the right people in a timely manner. </li>
<li>Focus on the main objectives. </li>
<li>The maintenance of the Active Directory environment, which requires: </li>
</ol>
</li>
<li>Defining and maintaining an architecture in accordance with best practices. 
<ol style="text-align: justify;">
<li>Having up-to-date inventories. </li>
<li>Ensuring the resilience of backups. </li>
</ol>
</li>
<li>The performance of tests to: 
<ol style="text-align: justify;">
<li>Validate the applicability of theoretical processes in real conditions. </li>
<li>Improve the reactivity and efficiency of your teams in a crisis situation.</li>
</ol>
</li>
</ol>
<p style="text-align: justify;"><a href="#ref1-retour">[1]</a> <a href="https://www.ssi.gouv.fr/actualite/lanssi-publie-pour-appel-a-commentaires-un-corpus-documentaire-sur-la-remediation/" name="ref1">https://www.ssi.gouv.fr/actualite/lanssi-publie-pour-appel-a-commentaires-un-corpus-documentaire-sur-la-remediation/</a></p>
<p style="text-align: justify;"><a href="#ref2-retour">[2]</a> <a href="https://www.riskinsight-wavestone.com/en/2023/02/approaches-to-quick-active-directory-recovery/" name="ref2">https://www.riskinsight-wavestone.com/en/2023/02/approaches-to-quick-active-directory-recovery/</a></p>
<p style="text-align: justify;"><a href="#ref3-retour">[3]</a> <a href="https://www.riskinsight-wavestone.com/en/2023/01/successful-ransomware-crisis-management-top-10-pitfalls-to-avoid/" name="ref3">https://www.riskinsight-wavestone.com/en/2023/01/successful-ransomware-crisis-management-top-10-pitfalls-to-avoid/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/06/surviving-an-active-directory-compromise-key-lessons-to-improve-the-reconstruction-process/">Surviving an Active Directory compromise: Key lessons to improve the reconstruction Process </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/06/surviving-an-active-directory-compromise-key-lessons-to-improve-the-reconstruction-process/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ACTIVE DIRECTORY RECOVERY: HOW TO BE READY ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/02/approaches-to-quick-active-directory-recovery/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/02/approaches-to-quick-active-directory-recovery/#respond</comments>
		
		<dc:creator><![CDATA[Alexandre Lukat]]></dc:creator>
		<pubDate>Fri, 17 Feb 2023 09:00:00 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Active directory]]></category>
		<category><![CDATA[Recovery]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=19676</guid>

					<description><![CDATA[<p>In nearly 90% of the incidents managed by Wavestone CERT [1], the Active Directory domain was compromised: rapid rebuilding capabilities are no longer an option. However, the backup and recovery of Active Directory environments is a subject that has long...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/approaches-to-quick-active-directory-recovery/">ACTIVE DIRECTORY RECOVERY: HOW TO BE READY ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">In nearly 90% of the incidents managed by Wavestone CERT <a href="#ref1" name="ref1-retour">[1]</a>, the Active Directory domain was compromised: rapid rebuilding capabilities are no longer an option. However, the backup and recovery of Active Directory environments is a subject that has long been assumed to be under control: backups are made daily, recovery tests are performed often and at regular intervals, BCP/DRP tests are conducted to ensure business continuity and recovery capabilities. But very often these processes have not evolved for several years and have not kept pace with the evolution of the cyber threat.</p>
<p style="text-align: justify;">Thinking about the right way to deal with this topic in organisations is at the crossroads of AD security enhancement and cyber resilience projects.</p>
<p>&nbsp;</p>
<h1 style="text-align: justify;">Infrastructure and backup agents: weak points</h1>
<p style="text-align: justify;">Our various assessments over the last few months have shown that backup strategies have not always evolved towards the state of the art.</p>
<p style="text-align: justify;">First problem: backup infrastructures are not resilient to cyber risk by default. For example, authentication on these backup infrastructures is very often linked to the Active Directory itself. Subsequently, the backup system could be compromised by the attacker, leading to a potential destruction of the backups&#8230; including those of the Active Directory!</p>
<p style="text-align: justify;">And backups are a prime target for attackers. In more than 20% of the incidents managed by the Wavestone CERT in 2021, backups were impacted. It is therefore important to consider the cyber scenario &#8211; and especially the ransomware scenario &#8211; when thinking about the resilience of backups.</p>
<p style="text-align: justify;">The second problem is that Domain Controllers (DC) backups are hosted in the backup tool, which often has a lower level of security than Active Directory. Indeed, an organisation that has already done some work to secure AD will have potentially greatly strengthened its tier 0 (always back to <a href="https://www.riskinsight-wavestone.com/en/2022/10/security-bastion-pam-and-active-directory-tiering-mode-how-to-reconcile-the-two-paradigms/">the tiering model</a>!): setting up dedicated workstations for administration, multi-factor authentication, network filtering, dedicated hardware, limiting the number of privileged accounts, etc. Unfortunately, this will not necessarily be the case for the backup infrastructure. As these backups are not necessarily encrypted, an attacker could recover and exfiltrate them from a DC via the backup infrastructure, which is easier to compromise. Once the backup has been depleted, the attacker will be able to extend the scope of his compromise via a ‘pass the hash’ attack, after recovering the hashes, or a brute force attack, after extracting the secrets from the ntds.dit database to recover passwords in clear text, to be replayed on services whose authentication is not based on Active Directory.</p>
<p style="text-align: justify;">Third problem: traditional backup methods rely on agents installed on Domain Controllers, whose high privileges sometimes increase the risk of systems becoming compromised. Backup agents almost always require administrative rights to the asset being backed up, which mechanically exposes the Domain Controllers and therefore the Active Directory domains. This leads to the paradoxical situation where the measure to reduce the risk of unavailability (installation of a backup agent on a DC) becomes the vulnerability itself that causes a risk that can become critical (unavailability of the entire information system).</p>
<p>&nbsp;</p>
<h1 style="text-align: justify;">Backup on disconnected media, on immutable infrastructure, or in the cloud: multiple strategies for multiple scenarios</h1>
<p style="text-align: justify;">To solve these two problems, multiple solutions exist, and their combination facilitates the construction of a robust strategy. This strategy must consider the context of the organisation as well as its cybersecurity maturity.</p>
<p style="text-align: justify;">To address the first problem induced by the vulnerable agent, two approaches exist, both viable:</p>
<ol style="text-align: justify;">
<li>Reduce the probability of exploitation of the vulnerability induced by the backup agent. In addition to the classic security maintenance issues (regular updates, rapid correction of agent vulnerabilities, etc.), this involves integrating a dedicated backup tool into tier 0, whose security level will have been reinforced.</li>
<li>Get rid of the backup agent. How can this be done? By using the native Windows Backup feature, which allows a backup to be made and exported, which can be encrypted and taken out of the tier 0 asset, to a tier 1 asset, which itself can be backed up by the company&#8217;s standard backup solution.</li>
</ol>
<p style="text-align: justify;">To increase the resilience of Active Directory backups, a combination of measures should be taken wherever possible:</p>
<ol style="text-align: justify;">
<li>Externalize the backup on media (offline version). The first variant can be set up quickly and at low cost: it involves setting up an external hard disk which will be disconnected once the backup has been made. Then, it is simply a matter of setting up the associated organisational processes so that the necessary actions can be carried out without the relevant agents forgetting. The second option, for the rare organisations that still have them, is to rely on tapes. This option is also dependent on a key process: the regular backup and outsourcing of the backup catalogue, so as not to lose time in the event of restoration, should it also disappear (a story inspired by real events encountered by our incident response teams). A word of caution: tape backups should be seen as a last resort to ensure that a copy of the data is retained in the event of a disaster scenario. In fact, this backup format does not lend itself to rapid reconstruction, due to the considerable time required before restoration to the production IS can begin: time required to repatriate the tapes and time required to read their content.</li>
<li>Outsource the backup outside the (online) information system. Whether this is done using in-house scripts or market solutions (see our radar), after robust encryption, a backup can be outsourced. The advantage of market solutions is that they directly integrate the rapid reconstruction element (see next section) of a DC.</li>
<li>Rely on a complementary but independent backup. To increase the availability of the backup infrastructure, it is sufficient to (redundantly) ensure that there is no risk of simultaneous compromise. To this end, taking advantage of their transition to the cloud, many organisations have recently chosen to add an additional DC, but hosted in the cloud (the others being traditionally still on-premises), thus naturally benefiting from its own backup mechanisms. Due to the internal replication mechanisms of AD, the DC hosted in the cloud will be compromised (compromise of some accounts or AD configurations) in the same time scale as the on-premises ones, but due to the closeness between the backed-up assets and the backup system, one will have a greater chance of having a backup of a DC still available.</li>
<li>Make your backup infrastructure immutable by relying as much as possible on the solutions offered by backup software publishers. Indeed, most publishers now offer immutability mechanisms, which sometimes do not require the purchase of additional storage bays. By making backups immutable within their primary storage, you can be sure of an optimal reconstruction time since it will not be necessary to repatriate backups from offline storage (1.) or online storage (2.) before being able to start restoring. <span style="text-decoration: underline;">N.B.</span>: 2. can and should benefit from this concept (Amazon S3, Azure blob, etc.).</li>
</ol>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 100%; text-align: justify; border-style: solid; border-color: #503078; background-color: #dacdeb;"><span style="color: #503078;"><strong style="font-size: revert; font-family: inherit;">Immutable backup:</strong><span style="font-size: revert; font-family: inherit; font-weight: inherit;"> The adage often associated with this is &#8220;write once, read many&#8221;, which sums up the concept. This is a backup that relies on files whose state cannot be changed after they have been created, making them resistant to attackers trying to delete them. In practice, neither the administrator of the backup software nor the administrator of the storage arrays can delete or alter a backup identified as immutable.</span></span></td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19649 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1.png" alt="" width="4400" height="2475" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1.png 4400w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1-1536x864.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1-2048x1152.png 2048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image1EN-1-800x450.png 800w" sizes="auto, (max-width: 4400px) 100vw, 4400px" /></p>
<p>&nbsp;</p>
<p style="text-align: justify;">Finally, one last point of detail, knowing which DCs to back up and use for restoration when necessary is essential (DC Global Catalog, most recent OS version, etc.), as is knowledge of the frequency (ideally daily) and the retention period (a much more subjective subject).</p>
<p>&nbsp;</p>
<h1 style="text-align: justify;">Fast rebuilding : often incompletely tested capabilities</h1>
<p style="text-align: justify;">Rebuilding tests are as old as the concept of DRP. But again, one can&#8217;t just rely on these annual tests to consider oneself prepared, given the state of the threat. Indeed, these tests are very often based on assumptions that will not be verified in the event of a major cyber-attack: available backups, confidence in the state of the information system, functional collaborative tools (workstations, messaging, ticketing tools, etc.), ready and available target hosting infrastructure, etc.</p>
<p style="text-align: justify;">From what we observe in organisations, the times displayed and communicated on the reconstruction times of an AD domain are often underestimated a priori. The start and stop times of the stopwatch are often questionable: it starts when the backup recovery start button is pressed and stops when a DC is restored and operational (AD forest recovery procedure executed <a href="#ref2" name="ref2-retour">[2]</a>). However, some points are often overlooked when comparing this time to the RTO time:</p>
<ul style="text-align: justify;">
<li>unsatisfied dependency on another indispensable domain (domain with one or more approval relationships with other domains),</li>
<li>ability to handle the authentication load that a service reopening will represent,</li>
<li>execution time for &#8220;grooming&#8221; operations (mass password change, deactivation of certain services or accounts, clean-up in objects and groups, etc.),</li>
<li>etc.</li>
</ul>
<p style="text-align: justify;">When the AD infrastructure is paralysed by a major cyber-attack, rebuilding it will quickly become the crisis unit&#8217;s priority, because of the dependence of applications and users on it. It is also the service with the lowest RTO. In the case where backups are available, certain questions quickly arise that must be addressed in the cyber defense strategy that is being defined (see our article on <a href="https://www.riskinsight-wavestone.com/en/2023/01/successful-ransomware-crisis-management-top-10-pitfalls-to-avoid/">Successful Ransomware Crisis Management: Top 10 pitfalls to avoid</a>):</p>
<ul style="text-align: justify;">
<li>Is there a need for an area to accommodate sensible future infrastructure?</li>
<li>Does creating users in Azure AD during the crisis allow the service to be reopened more quickly?</li>
<li>If there are many AD domains (as is the case with very large organisations), in what order should they be created?</li>
</ul>
<p style="text-align: justify;">On the infrastructure side, firstly, in most cases, having an isolated and secure rebuild area saves time. This must be available, ready to host the number of VMs required to achieve the level of service considered acceptable in such a situation and under the control (accounts with sufficient rights, accessibility, etc.) of the team responsible for the Active Directory service only. This is to reduce the risk of compromise but also to avoid creating obstacles (requests to be made to another team) the day the need arises.</p>
<p style="text-align: justify;">This zone can be on-premises or in a cloud service, depending on the costs and the organisation&#8217;s cybersecurity posture with regard to hosting DC on a cloud (if it is public). This dormant zone can also be used to host regular Active Directory recovery tests, to get as close as possible to a real situation. Finally, this infrastructure must obviously be in tier 0, if the organisation relies on this framework.</p>
<p style="text-align: justify;">Then, on the process side, it is advisable to prepare several pieces of information in advance that will be essential when the need to rebuild the service arises:</p>
<ul style="text-align: justify;">
<li>determine the minimum number of DCs and their location (rebuilding area in the cloud / on-premises, but also geographically in case of presence in multiple locations),</li>
<li>determine the replication method (standard replication or use of IFM <a href="#ref3" name="ref3-retour">[3]</a>) of the DCs to minimise the time between the availability of the first and last DC required to reopen the service,</li>
<li>determine ready and deactivated filtering rules, which only need to be activated before the service is opened,</li>
<li>establish the acceptable level of risk for the rebuild (simple rebuild and object grooming or pivot method),</li>
<li>(in organisations with multiple domains serving multiple businesses) establish a rebuild sequence, which should have been determined in advance with the business managers, to reopen the service with the right priorities.</li>
</ul>
<p style="text-align: justify;">Here again, specialised AD backup and recovery tools provide value: they allow the recovery process of an AD forest to be carried out in a few clicks and in an automated manner. Parallelization of these operations is also made possible, making these tools an undeniable accelerator to consider for organizations with many forests!</p>
<p style="text-align: justify;">Finally, on the resources side, it is important to have an organisation that can respond to this occasional but very important work overload. For this, the automation of reconstruction activities that can be automated, but also the existence of teams that have already practised the exercise many times, is often decisive.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19653 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN.png" alt="" width="4400" height="2475" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN.png 4400w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN-1536x864.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN-2048x1152.png 2048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image2EN-800x450.png 800w" sizes="auto, (max-width: 4400px) 100vw, 4400px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-19657 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN.png" alt="" width="4400" height="2475" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN.png 4400w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN-340x191.png 340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN-69x39.png 69w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN-768x432.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN-1536x864.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN-2048x1152.png 2048w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/02/Image3EN-800x450.png 800w" sizes="auto, (max-width: 4400px) 100vw, 4400px" /></p>
<p>&nbsp;</p>
<p style="text-align: justify;">Some organisations take advantage of Disaster Recovery testing to simulate the worst possible situation for the Active Directory service, rather than just simulating a partial recovery. This is undoubtedly good practice.</p>
<p style="text-align: justify;">Ultimately, asking the question of the resilience of one&#8217;s Active Directory infrastructure draws on the more global subject of information system resilience, but also concepts around tiering, and considerations regarding regularly scheduled full-scale exercises. We could even make a bridge with DevOps: wouldn&#8217;t we dream of being able to redeploy an AD infrastructure almost automatically, in the image of what DevOps manages to do thanks to the ‘Infrastructure as Code’ concept? In the meantime, regular training remains the only way to develop confidence about one&#8217;s ability to quickly reopen a minimal AD service if it were to be completely destroyed.</p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;"><a href="#ref1-retour">[1]</a> <a href="https://www.wavestone.com/en/insight/cert-w-2022-cybersecurite-trends-analysis/" name="ref1">https://www.wavestone.com/en/insight/cert-w-2022-cybersecurite-trends-analysis/</a></p>
<p style="text-align: justify;"><a href="#ref2-retour">[2]</a> <a href="https://learn.microsoft.com/fr-fr/windows-server/identity/ad-ds/manage/ad-forest-recovery-guide" name="ref2">https://learn.microsoft.com/fr-fr/windows-server/identity/ad-ds/manage/ad-forest-recovery-guide</a></p>
<p style="text-align: justify;"><a href="#ref3-retour">[3]</a> Install From Media&nbsp;: <a href="https://social.technet.microsoft.com/wiki/contents/articles/8630.active-directory-step-by-step-guide-to-install-an-additional-domain-controller-using-ifm.aspx" name="ref3">https://social.technet.microsoft.com/wiki/contents/articles/8630.active-directory-step-by-step-guide-to-install-an-additional-domain-controller-using-ifm.aspx</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/02/approaches-to-quick-active-directory-recovery/">ACTIVE DIRECTORY RECOVERY: HOW TO BE READY ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/02/approaches-to-quick-active-directory-recovery/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
