{"id":20845,"date":"2023-07-06T16:00:00","date_gmt":"2023-07-06T15:00:00","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=20845"},"modified":"2023-07-06T12:52:38","modified_gmt":"2023-07-06T11:52:38","slug":"compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/","title":{"rendered":"\u00a0\u00ab\u202fCompromise by design\u202f\u00bb or how to anticipate a destructive cyber attack"},"content":{"rendered":"\n\n\n<p style=\"text-align: justify;\"><i><span data-contrast=\"auto\">Most <\/span><\/i><i><span data-contrast=\"auto\">organisations<\/span><\/i><i><span data-contrast=\"auto\"> are still insufficiently prepared for a possible compromise of their Information System, leading to its destruction. Taking this risk into account right from the project design stage will enable them to significantly strengthen their resilience capabilities.<\/span><\/i><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">On 17 April, the <\/span><b><span data-contrast=\"auto\">ANSSI<\/span><\/b><span data-contrast=\"auto\"> published the <\/span><b><span data-contrast=\"auto\">first doctrinal documents<\/span><\/b><span data-contrast=\"auto\"> concerning <\/span><b><span data-contrast=\"auto\">remediation<\/span><\/b><span data-contrast=\"auto\">, which is defined as the project to regain control of a compromised information system. These documents are the fruit of the Agency&#8217;s experience in supporting victims of security incidents.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">This corpus consists of three sections: strategic section, an <\/span><span data-contrast=\"auto\">organisational<\/span><span data-contrast=\"auto\"> section, and a technical section. Currently, the technical section focuses on the remediation of tier 0 of the Active Directory<\/span><span data-contrast=\"auto\">1<\/span><span data-contrast=\"auto\">, or core of trust. This section will be supplemented with <\/span><b><span data-contrast=\"auto\">additional documents in the future<\/span><\/b><span data-contrast=\"auto\"> to enhance its content.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The approach proposed by ANSSI (E3R) is divided into 3 stages:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,1],&quot;469777803&quot;:&quot;right&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Containment<\/span><span data-contrast=\"auto\"> of the <\/span><span data-contrast=\"auto\">attacker<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,1],&quot;469777803&quot;:&quot;right&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Evicting the intruder from the heart of the IS<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,1],&quot;469777803&quot;:&quot;right&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Eradicating<\/span><span data-contrast=\"auto\"> the <\/span><span data-contrast=\"auto\">adversary&#8217;s<\/span> <span data-contrast=\"auto\">strongholds<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">These stages are illustrated by <\/span><b><span data-contrast=\"auto\">3 typical remediation scenarios<\/span><\/b><span data-contrast=\"auto\">, each with increasing ambition levels based on the <\/span><b><span data-contrast=\"auto\">urgency of the restart<\/span><\/b><span data-contrast=\"auto\"> and the <\/span><b><span data-contrast=\"auto\">costs incurred<\/span><\/b><span data-contrast=\"auto\"> by the long-term damage resulting from the attack:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Restore vital services as quickly as possible<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Regain control of the IS<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Seize the opportunity to prepare for long-term control of the IS<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The publication of this corpus is a timely step in the <\/span><b><span data-contrast=\"auto\">reflections and projects currently being carried out<\/span><\/b><span data-contrast=\"auto\"> by <\/span><b><span data-contrast=\"auto\">many public and private players<\/span><\/b><span data-contrast=\"auto\">, with a view to <\/span><b><span data-contrast=\"auto\">strengthening their resilience<\/span><\/b><span data-contrast=\"auto\"> in the face of a <\/span><b><span data-contrast=\"auto\">successful cyber-attack<\/span><\/b><span data-contrast=\"auto\"> that would compromise or <\/span><b><span data-contrast=\"auto\">even destroy their Information System on a massive scale<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">In practice, the time required to establish a proven remediation system extends over several years for most players, rather than just months. This timeframe may be out of sync with the evolving threat landscape and the regulatory deadlines imposed on certain entities.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">There are several reasons for this, which vary from one player to another. <\/span><span data-contrast=\"auto\">However, there are three key factors which contribute to this variation:\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li style=\"text-align: justify;\" data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Awareness of cyber risk is growing<\/span><\/b><span data-contrast=\"auto\">; however, many <\/span><b><span data-contrast=\"auto\">decision-makers<\/span><\/b><span data-contrast=\"auto\"> still <\/span><b><span data-contrast=\"auto\">lack<\/span><\/b><span data-contrast=\"auto\"> adequate understanding. Balancing immediate priorities with long- term preparation in the face of potential compromises often leads to difficult decisions regarding the allocation of valuable human and financial resources.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">The interruption of an <\/span><span data-contrast=\"auto\">organisation&#8217;s<\/span><span data-contrast=\"auto\"> activities following an IT disaster has historically been dealt with using <\/span><b><span data-contrast=\"auto\">Disaster Recovery Plans<\/span><\/b><span data-contrast=\"auto\">. Their advantages and limitations in terms of remediation are still poorly understood within <\/span><span data-contrast=\"auto\">organisations<\/span><span data-contrast=\"auto\">:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span>\n<ol style=\"list-style-type: lower-alpha;\">\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Depending on the recovery principles adopted, they may offer <\/span><b><span data-contrast=\"auto\">advantages in terms of IS recovery sequencing know-how <\/span><\/b><span data-contrast=\"auto\">(similar to an electrical shutdown\/restart), capabilities for unitary and grouped reconstruction, restored data <\/span><span data-contrast=\"auto\">resynchronisation<\/span><span data-contrast=\"auto\"> and reconciliation, among others.<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"5\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Remediation efforts can leverage this know-how, provided it has not been lost because of the adoption of new solutions (e.g., active\/active backup) or when a <b style=\"font-size: revert; color: initial;\"><span data-contrast=\"auto\">&#8216;debt&#8217;<\/span><\/b><span style=\"font-size: revert; color: initial;\" data-contrast=\"auto\"> in terms of maintaining operational conditions and <\/span><b style=\"font-size: revert; color: initial;\"><span data-contrast=\"auto\">DRP exercises<\/span><\/b><span style=\"font-size: revert; color: initial;\" data-contrast=\"auto\"> has built up.<\/span><span style=\"font-size: revert; color: initial;\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:1440,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Nonetheless, these plans also have <\/span><b><span data-contrast=\"auto\">significant limitations<\/span><\/b><span data-contrast=\"auto\">. Their architecture relies on technical interconnections and data replication with backup infrastructures, which can inadvertently <\/span><b><span data-contrast=\"auto\">propagate compromises<\/span><\/b><span data-contrast=\"auto\">. Furthermore, while their relevance is proven in a deterministic context (where a given disaster corresponds to a given solution and plan), their effectiveness becomes much less certain when confronted with the diverse characteristics and possibilities of <\/span><b><span data-contrast=\"auto\">evolving cyber attacks<\/span><\/b><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">This calls for a <\/span><b><span data-contrast=\"auto\">hybrid approach<\/span><\/b><span data-contrast=\"auto\"> involving operational, <\/span><b><span data-contrast=\"auto\">DRP and cyber resilience players<\/span><\/b><span data-contrast=\"auto\">. This can be facilitated or hindered depending on the <\/span><b><span data-contrast=\"auto\">governance<\/span><\/b><span data-contrast=\"auto\"> that has been put in place between these populations.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">To <\/span><b><span data-contrast=\"auto\">accelerate the necessary rise in maturity<\/span><\/b><span data-contrast=\"auto\"> of players on the subject of IS remediation following a cyber-attack, <\/span><b><span data-contrast=\"auto\">several approach<\/span><\/b><span data-contrast=\"auto\"> can be considered. Outlined below are <\/span><i><span data-contrast=\"auto\">four potential strategies<\/span><\/i><span data-contrast=\"auto\">, and the subsequent information will provide a more detailed explanation and elaboration for each approach.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"16\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Helping decision-makers to understand the specific nature of cyber risk;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"16\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Anchoring &#8220;compromise by design&#8221; in everyday life;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"16\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Have several remedial options at your disposal;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"16\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Sharing and <\/span><span data-contrast=\"auto\">capitalising<\/span><span data-contrast=\"auto\"> on feedback.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20848 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/Schema-article-recovery-VE.jpg\" alt=\"Is remediation : 4 way to accelerate its mutation\" width=\"1280\" height=\"720\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/Schema-article-recovery-VE.jpg 1280w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/Schema-article-recovery-VE-340x191.jpg 340w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/Schema-article-recovery-VE-69x39.jpg 69w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/Schema-article-recovery-VE-768x432.jpg 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/Schema-article-recovery-VE-800x450.jpg 800w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">Helping decision-makers understand the specific nature of cyber risk<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">\u00a0The <\/span><b><span data-contrast=\"auto\">vast majority of players<\/span><\/b><span data-contrast=\"auto\"> do not totally rule out the <\/span><b><span data-contrast=\"auto\">possibility of being vulnerable<\/span><\/b><span data-contrast=\"auto\"> to a successful cyber-attack that would <\/span><span data-contrast=\"auto\">paralyse<\/span><span data-contrast=\"auto\"> their activities through the <\/span><b><span data-contrast=\"auto\">logical destruction of their IT assets<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">On the other hand, a significant proportion of players have not yet grasped the fact that their existing IT backup resources are <\/span><b><span data-contrast=\"auto\">rarely adapted<\/span><\/b><span data-contrast=\"auto\"> to the specific characteristics of this type of attack. A cyber-attack can <\/span><b><span data-contrast=\"auto\">jeopardise<\/span><\/b><b><span data-contrast=\"auto\"> the availability<\/span><\/b><span data-contrast=\"auto\"> and non-compromise of operating and administrative <\/span><b><span data-contrast=\"auto\">resources<\/span><\/b><span data-contrast=\"auto\">, right down to the <\/span><b><span data-contrast=\"auto\">workstations of those involved in IS recovery<\/span><\/b><span data-contrast=\"auto\">. The timeframe for remediating an Information System (IS) that has suffered extensive destruction due to a cyber-attack is typically considerably longer compared to the recovery time communicated to the business in the event of a physical disaster.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">A number of players have not yet fully assessed the impact of the <\/span><b><span data-contrast=\"auto\">cyber threat on their ecosystems<\/span><\/b><span data-contrast=\"auto\">, for example:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">If their <\/span><b><span data-contrast=\"auto\">first-tier IT<\/span><\/b> <b><span data-contrast=\"auto\">service providers<\/span><\/b><span data-contrast=\"auto\"> (outsourcer, cloud service provider, etc.), or even <\/span><b><span data-contrast=\"auto\">higher-tier<\/span><\/b><span data-contrast=\"auto\"> providers, are themselves <\/span><b><span data-contrast=\"auto\">affected by a successful destructive attack<\/span><\/b><span data-contrast=\"auto\">;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">If a player is the <\/span><b><span data-contrast=\"auto\">victim of a cyber-attack<\/span><\/b><span data-contrast=\"auto\">, whether proven successful or not, its <\/span><b><span data-contrast=\"auto\">partners<\/span><\/b><span data-contrast=\"auto\"> who have knowledge of the attack will be able to <\/span><b><span data-contrast=\"auto\">isolate it unilaterally<\/span><\/b><span data-contrast=\"auto\"> for protection purposes.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The awareness of an <\/span><span data-contrast=\"auto\">organisation&#8217;s<\/span><span data-contrast=\"auto\"> decision-makers of the cyber risk, its systemic implications and the impact on its business must be developed. In the financial sector, the <\/span><b><span data-contrast=\"auto\">DORA<\/span><\/b><span data-contrast=\"auto\"> regulations, or their equivalents in certain non-European countries, as well as the <\/span><b><span data-contrast=\"auto\">stress tests<\/span><\/b><span data-contrast=\"auto\"> announced by the European Central Bank for <\/span><b><span data-contrast=\"auto\">2024<\/span><\/b><span data-contrast=\"auto\">, should contribute to this.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">For many decision-makers, <\/span><b><span data-contrast=\"auto\">too many technical words<\/span><\/b><span data-contrast=\"auto\"> are used to describe the <\/span><b><span data-contrast=\"auto\">risk of cyber destruction<\/span><\/b><span data-contrast=\"auto\">. Unlike compliance issues such as the RGPD, which can be understood by the uninitiated, this risk is <\/span><b><span data-contrast=\"auto\">perceived as a matter for technical experts<\/span><\/b><span data-contrast=\"auto\">. Nevertheless, the subject is increasingly being addressed at executive committee level, for example through the presence of the CISO on the Executive Committee and\/or through external speakers with experience in acculturating senior management.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h2 style=\"text-align: justify;\"><span data-contrast=\"none\">Anchoring &#8220;compromise by design&#8221; in everyday life<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">By considering the possibility of an IS compromise that could result in its destruction and incorporating this perspective <\/span><b><span data-contrast=\"auto\">from project design to operational activities<\/span><\/b><span data-contrast=\"auto\">, the resilience capabilities of the IS can be significantly bolstered.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">From the earliest stages of a project, the business units can be called upon to <\/span><b><span data-contrast=\"auto\">identify and evaluate<\/span><\/b><span data-contrast=\"auto\">, with the support of the technical teams, <\/span><b><span data-contrast=\"auto\">cyber-resilient design solutions<\/span><\/b><span data-contrast=\"auto\">. <\/span><span data-contrast=\"auto\">These<\/span> <span data-contrast=\"auto\">may<\/span> <span data-contrast=\"auto\">include<\/span><span data-contrast=\"auto\">:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">To use suppliers of <\/span><b><span data-contrast=\"auto\">nominal solutions<\/span><\/b><span data-contrast=\"auto\"> that are <\/span><b><span data-contrast=\"auto\">technically independent<\/span><\/b><span data-contrast=\"auto\"> of the <\/span><span data-contrast=\"auto\">organisation&#8217;s<\/span><span data-contrast=\"auto\"> IS, so that its activities are not based exclusively on it\u2019s IS;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">To host and operate <\/span><b><span data-contrast=\"auto\">backup solutions<\/span><\/b><span data-contrast=\"auto\"> outside the <\/span><span data-contrast=\"auto\">organisation&#8217;s<\/span><span data-contrast=\"auto\"> IS;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Use <\/span><b><span data-contrast=\"auto\">cyber-resilient architecture models<\/span><\/b><span data-contrast=\"auto\"> based on an on-premises catalogue or hosted in the Cloud. They are also designed to allow their resilience to be tested while limiting the impact of tests on production;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Designing projects that enable operation in <\/span><b><span data-contrast=\"auto\">degraded mode<\/span><\/b><span data-contrast=\"auto\"> via :<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span>\n<ul>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Periodic extraction of business data in office format, outsourced and protected in an external file storage service;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">The ability for applications (and services such as restoration) to operate without certain cross-functional services such as the AD authentication repositories via local backup accounts, etc;\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"9\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Drawing up <\/span><b><span data-contrast=\"auto\">downgraded business procedures<\/span><\/b><span data-contrast=\"auto\"> based on downgraded IS resources such as those defined above.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">In addition, the appropriateness of certain practices, although incompatible with the objectives of <\/span><span data-contrast=\"auto\">standardisation<\/span><span data-contrast=\"auto\"> and <\/span><span data-contrast=\"auto\">industrialisation<\/span><span data-contrast=\"auto\">, can be considered at the technical design stage, in particular:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Encouraging <\/span><b><span data-contrast=\"auto\">diversity of technologies<\/span><\/b><span data-contrast=\"auto\"> to limit the exploitation of a vulnerability.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"10\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Limiting the dependency<\/span><\/b><span data-contrast=\"auto\"> of applications on <\/span><b><span data-contrast=\"auto\">cross-functional information systems<\/span><\/b><span data-contrast=\"auto\">, so that they can be <\/span><b><span data-contrast=\"auto\">rebuilt<\/span><\/b><span data-contrast=\"auto\"> and made operational more quickly.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">During the <\/span><b><span data-contrast=\"auto\">acceptance phase<\/span><\/b><span data-contrast=\"auto\">, business operations in <\/span><b><span data-contrast=\"auto\">degraded mode<\/span><\/b><span data-contrast=\"auto\"> and the ability to <\/span><b><span data-contrast=\"auto\">rebuild<\/span><\/b><span data-contrast=\"auto\"> an application can be <\/span><b><span data-contrast=\"auto\">systematically tested<\/span><\/b><span data-contrast=\"auto\"> before going into production. This test can be <\/span><b><span data-contrast=\"auto\">reviewed <\/span><\/b><span data-contrast=\"auto\">if necessary for each major change. It should be reiterated periodically through exercises that will enable remediation capabilities to be tested and <\/span><b><span data-contrast=\"auto\">enhance the skills<\/span><\/b><span data-contrast=\"auto\"> of the various operational players.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Moving <\/span><b><span data-contrast=\"auto\">beyond the project phase<\/span><\/b><span data-contrast=\"auto\">, the integration of asset <\/span><b><span data-contrast=\"auto\">reconstruction<\/span><\/b><span data-contrast=\"auto\"> practices into Business As Usual (BAU) operations enables better mastery of these practices. This, in turn, benefits a larger number of participants in the event of remediation, for example;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:768,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Reconstruction<\/span><\/b><span data-contrast=\"auto\">, once or twice a year, using non-IS resources (e.g., Cloud services or off-line resources), of <\/span><b><span data-contrast=\"auto\">workstations<\/span><\/b><span data-contrast=\"auto\"> used for <\/span><b><span data-contrast=\"auto\">administrative tasks and\/or critical activities<\/span><\/b><span data-contrast=\"auto\">;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:768,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Reconstruction<\/span><\/b><span data-contrast=\"auto\">, once a year, of <\/span><b><span data-contrast=\"auto\">infrastructures essential<\/span><\/b><span data-contrast=\"auto\"> to the recovery of the IS (e.g., restoration infrastructures, core of trust, <\/span><span data-contrast=\"auto\">virtualisation<\/span><span data-contrast=\"auto\"> base, etc.), to be determined on the basis of the threat and risk analysis;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"11\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:768,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Development of <\/span><b><span data-contrast=\"auto\">CI\/CD practices<\/span><\/b><span data-contrast=\"auto\"> on a daily basis, particularly in Cloud environments, in order to automate the <\/span><b><span data-contrast=\"auto\">recreation of servers<\/span><\/b><span data-contrast=\"auto\"> to apply changes to them, such as version upgrades or patches.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Finally, keeping the <\/span><b><span data-contrast=\"auto\">IS map<\/span><\/b><span data-contrast=\"auto\"> (including its interconnections with partners and the Internet) and its <\/span><b><span data-contrast=\"auto\">interdependencies up to date<\/span><\/b><span data-contrast=\"auto\"> daily is a key factor in remediation, which must be supported by appropriate processes, tools (cyber-resilience) and controls.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span data-contrast=\"none\">Having several remediation options at your disposal<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Given the difficulty of predicting the course of a cyber-attack and the evolution of its impact in advance, the preparation of a plan requires a balance to be struck between two excesses:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\" data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"12\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Developing reconstruction solutions tailored to <\/span><b><span data-contrast=\"auto\">too few attack scenarios<\/span><\/b><span data-contrast=\"auto\">, with the inherent risk of <\/span><b><span data-contrast=\"auto\">deadlock<\/span><\/b><span data-contrast=\"auto\">,<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"12\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Or, on the contrary, seek to cover <\/span><b><span data-contrast=\"auto\">all possible scenarios<\/span><\/b><span data-contrast=\"auto\">, at the cost of a <\/span><b><span data-contrast=\"auto\">significant loss of efficiency<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">An <\/span><b><span data-contrast=\"auto\">updated risk analysis<\/span><\/b><span data-contrast=\"auto\"> of possible attack scenarios, based on a <\/span><b><span data-contrast=\"auto\">threat watch<\/span><\/b><span data-contrast=\"auto\">, makes it possible to <\/span><b><span data-contrast=\"auto\">prioritise<\/span><\/b><span data-contrast=\"auto\"> those to be covered, such as those with the highest probability of success and the greatest impact in the context of the <\/span><span data-contrast=\"auto\">organisation<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">This analysis makes it easier to <\/span><b><span data-contrast=\"auto\">identify the assumptions<\/span><\/b><span data-contrast=\"auto\"> that will be used as inputs to the development of plans. <\/span><span data-contrast=\"auto\">For example\u202f;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"17\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Just a year ago, planning for the <\/span><b><span data-contrast=\"auto\">industrialised<\/span><\/b><b><span data-contrast=\"auto\"> reconstruction of the <\/span><\/b><b><span data-contrast=\"auto\">virtualisation<\/span><\/b><span data-contrast=\"auto\"> layer of physical servers did not appear to be a necessity for most players, but it has now been identified as essential.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"17\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">The destruction of Cloud resources through the <\/span><b><span data-contrast=\"auto\">compromise of access to the tenant<\/span><\/b><span data-contrast=\"auto\"> (master accounts or API access) or even the <\/span><b><span data-contrast=\"auto\">compromise of the Cloud provider<\/span><\/b><span data-contrast=\"auto\"> itself, appears to be a new risk that needs to be considered in the Cloud resilience strategy of several players.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">Once the <\/span><b><span data-contrast=\"auto\">working hypotheses have been chosen or ruled out<\/span><\/b><span data-contrast=\"auto\"> (e.g., the types of components and technologies impacted, the residual capacities of the malicious code once its means of interacting with the attacker have been cut off, etc.), it is possible to <\/span><b><span data-contrast=\"auto\">assess the relevance of the various possible means of reconstruction<\/span><\/b><span data-contrast=\"auto\"> and to <\/span><b><span data-contrast=\"auto\">prioritise<\/span><\/b><b><span data-contrast=\"auto\"> the work<\/span><\/b><span data-contrast=\"auto\"> more effectively. The following are possible means of reconstruction.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\" data-leveltext=\"%1)\" data-font=\"Calibri\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1)&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Restore<\/span><\/b><span data-contrast=\"auto\"> systems and\/or business data from backups, if necessary, in an isolated environment (e.g., from snapshots, offline or &#8220;immutable&#8221; backups);<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"%1)\" data-font=\"Calibri\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1)&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Cleaning up<\/span><\/b><span data-contrast=\"auto\"> restored environments that may have already been compromised when they were backed up (e.g., Using antivirus software for office files and systems that may have been compromised, using an EDR on systems that have been restarted in an isolated environment, or using solutions that can clean up the backed-up image of a virtual server directly);<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"%1)\" data-font=\"Calibri\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1)&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Reinstallation<\/span><\/b><span data-contrast=\"auto\"> of compromised technical layers (e.g., OS, middleware, etc.);<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"%1)\" data-font=\"Calibri\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1)&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Replenishment<\/span><\/b><span data-contrast=\"auto\"> of virtual infrastructures (e.g., Terraform, etc.);<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li style=\"text-align: justify;\" data-leveltext=\"%1)\" data-font=\"Calibri\" data-listid=\"14\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,4],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1)&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Strategies and solutions that can cover both the risk of a conventional disaster and a cyber disaster (e.g., a backup IS that is independent of the nominal IS, with business data refreshed by a device that maintains technical watertightness).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">This assessment should lead to the development of a &#8220;<\/span><b><span data-contrast=\"auto\">catalogue<\/span><\/b><span data-contrast=\"auto\">&#8221; of <\/span><b><span data-contrast=\"auto\">remediation methods<\/span><\/b><span data-contrast=\"auto\">, the application of which should be <\/span><span data-contrast=\"auto\">contextualised<\/span><span data-contrast=\"auto\"> at the time of the attack. As a complement to each reconstruction solution in the catalogue, the <\/span><b><span data-contrast=\"auto\">identification of an alternative<\/span><\/b><span data-contrast=\"auto\"> &#8211; perhaps less <\/span><span data-contrast=\"auto\">industrialised<\/span><span data-contrast=\"auto\"> &#8211; solution will <\/span><b><span data-contrast=\"auto\">enable us to deal more effectively with the vagaries of the attack context<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span data-contrast=\"none\">Sharing and capitalising on feedback<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">To gain maturity and efficiency in remediation more quickly, market players benefit from <\/span><span data-contrast=\"auto\">capitalising<\/span><span data-contrast=\"auto\"> on the experience of others.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This may involve <\/span><span data-contrast=\"auto\">capitalising<\/span><span data-contrast=\"auto\"> on:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"18\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Studies, such as the <\/span><b><span data-contrast=\"auto\">body of doctrine published by ANSSI<\/span><\/b><span data-contrast=\"auto\">;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"18\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Direct exchanges<\/span><\/b><span data-contrast=\"auto\"> with <\/span><b><span data-contrast=\"auto\">peers<\/span><\/b><span data-contrast=\"auto\"> or <\/span><b><span data-contrast=\"auto\">via third parties<\/span><\/b><span data-contrast=\"auto\">;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"18\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Working groups<\/span><\/b><span data-contrast=\"auto\"> in which its ecosystem of partners will be represented if possible.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span data-contrast=\"auto\">The feedback to be sought can relate to the specificity of the cyber context in remediation but also to more traditional aspects linked to the reconstruction of an IS such as:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">The methods and approaches used;<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Proven<\/span> <span data-contrast=\"auto\">market<\/span><span data-contrast=\"auto\"> solutions (<\/span><span data-contrast=\"auto\">beyond<\/span><span data-contrast=\"auto\"> promises);\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Performance <\/span><span data-contrast=\"auto\">achieved<\/span><span data-contrast=\"auto\"> (reconstruction times)\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Costs<\/span><span data-contrast=\"auto\">;\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Logistical and HR aspects (similar to crisis management);\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"15\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">More functional aspects such as data reconciliation, following different restoration points and lost flows with third parties.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>\u00a0<\/p>\n<h3>Other articles on the subject of remediation :<\/h3>\n<p><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/06\/surviving-an-active-directory-compromise-key-lessons-to-improve-the-reconstruction-process\/\">Surviving an Active Directory compromise: key lessons for improving the rebuilding process<\/a><\/p>\n<p><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2021\/11\/cyber-attacks-what-are-the-risks-for-backups-and-how-to-protect-yourself\/\">Cyber-attacks: what are the risks for backups and how can you protect yourself?<\/a><\/p>\n<p><a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/02\/approaches-to-quick-active-directory-recovery\/\">Active Directory rebuild: approaches to quick Active Directory recovery<\/a><\/p>\n<p><span data-contrast=\"auto\">Next on <\/span><a href=\"https:\/\/www.riskinsight-wavestone.com\/\"><span data-contrast=\"none\">https:\/\/www.riskinsight-wavestone.com\/<\/span><\/a><span data-contrast=\"auto\"> : workstation remediation<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most organisations are still insufficiently prepared for a possible compromise of their Information System, leading to its destruction. Taking this risk into account right from the project design stage will enable them to significantly strengthen their resilience capabilities.\u00a0 \u00a0 On&#8230;<\/p>\n","protected":false},"author":1285,"featured_media":20836,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3266,3977],"tags":[2871,3327,4229],"coauthors":[2841],"class_list":["post-20845","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security-en","category-focus","tag-cyberattack","tag-cyberresilience-en","tag-recovery-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00a0\u00ab\u202fCompromise by design\u202f\u00bb or how to anticipate a destructive cyber attack - RiskInsight<\/title>\n<meta name=\"description\" content=\"Most organisations are still insufficiently prepared for a possible compromise of their Information System, leading to its destruction. Taking this risk into account right from the project design stage will enable them to significantly strengthen their resilience capabilities.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00a0\u00ab\u202fCompromise by design\u202f\u00bb or how to anticipate a destructive cyber attack - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Most organisations are still insufficiently prepared for a possible compromise of their Information System, leading to its destruction. Taking this risk into account right from the project design stage will enable them to significantly strengthen their resilience capabilities.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-06T15:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/image-couv.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Axel Petersen\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Axel Petersen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/\"},\"author\":{\"name\":\"Axel Petersen\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274\"},\"headline\":\"\u00a0\u00ab\u202fCompromise by design\u202f\u00bb or how to anticipate a destructive cyber attack\",\"datePublished\":\"2023-07-06T15:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/\"},\"wordCount\":2152,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/image-couv.jpg\",\"keywords\":[\"cyberattack\",\"cyberresilience\",\"Recovery\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/\",\"name\":\"\u00a0\u00ab\u202fCompromise by design\u202f\u00bb or how to anticipate a destructive cyber attack - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/image-couv.jpg\",\"datePublished\":\"2023-07-06T15:00:00+00:00\",\"description\":\"Most organisations are still insufficiently prepared for a possible compromise of their Information System, leading to its destruction. Taking this risk into account right from the project design stage will enable them to significantly strengthen their resilience capabilities.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/image-couv.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/image-couv.jpg\",\"width\":1280,\"height\":720,\"caption\":\"Image d'une main cochant les cases d'une check list\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00a0\u00ab\u202fCompromise by design\u202f\u00bb or how to anticipate a destructive cyber attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274\",\"name\":\"Axel Petersen\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/axel-petersen\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00a0\u00ab\u202fCompromise by design\u202f\u00bb or how to anticipate a destructive cyber attack - RiskInsight","description":"Most organisations are still insufficiently prepared for a possible compromise of their Information System, leading to its destruction. Taking this risk into account right from the project design stage will enable them to significantly strengthen their resilience capabilities.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/","og_locale":"en_US","og_type":"article","og_title":"\u00a0\u00ab\u202fCompromise by design\u202f\u00bb or how to anticipate a destructive cyber attack - RiskInsight","og_description":"Most organisations are still insufficiently prepared for a possible compromise of their Information System, leading to its destruction. Taking this risk into account right from the project design stage will enable them to significantly strengthen their resilience capabilities.\u00a0","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/","og_site_name":"RiskInsight","article_published_time":"2023-07-06T15:00:00+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/image-couv.jpg","type":"image\/jpeg"}],"author":"Axel Petersen","twitter_misc":{"Written by":"Axel Petersen","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/"},"author":{"name":"Axel Petersen","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274"},"headline":"\u00a0\u00ab\u202fCompromise by design\u202f\u00bb or how to anticipate a destructive cyber attack","datePublished":"2023-07-06T15:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/"},"wordCount":2152,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/image-couv.jpg","keywords":["cyberattack","cyberresilience","Recovery"],"articleSection":["Cloud &amp; Next-Gen IT Security","Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/","name":"\u00a0\u00ab\u202fCompromise by design\u202f\u00bb or how to anticipate a destructive cyber attack - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/image-couv.jpg","datePublished":"2023-07-06T15:00:00+00:00","description":"Most organisations are still insufficiently prepared for a possible compromise of their Information System, leading to its destruction. Taking this risk into account right from the project design stage will enable them to significantly strengthen their resilience capabilities.\u00a0","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/image-couv.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/07\/image-couv.jpg","width":1280,"height":720,"caption":"Image d'une main cochant les cases d'une check list"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/07\/compromise-by-design-or-how-to-anticipate-a-destructive-cyber-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"\u00a0\u00ab\u202fCompromise by design\u202f\u00bb or how to anticipate a destructive cyber attack"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/3544c8184dc9a23e6ca7ad0da430b274","name":"Axel Petersen","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/axel-petersen\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/20845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1285"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=20845"}],"version-history":[{"count":10,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/20845\/revisions"}],"predecessor-version":[{"id":20863,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/20845\/revisions\/20863"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/20836"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=20845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=20845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=20845"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=20845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}