Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/21/2020
10:00 AM
Andrew Rubin
Andrew Rubin
Commentary
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

5 Steps to Greater Cyber Resiliency

Work from home isn't going away anytime soon, and the increased vulnerability means cyber resiliency will continue to be critical to business resiliency.

Recent events have rapidly shifted the way that we live and work. Doctors are practicing telemedicine from a kitchen table, executives are running entire organizations on the same home network as their families, and hundreds of thousands of bankers are running the global economy at home from their laptops. 

The reality is that most organizations weren't prepared for such an abrupt digital shift at this scale. Attackers are having a field day. As businesses turn to digital technology, specifically laptops, to drive the entire organization, connections are more unstable and networks are unprotected. And as we know, a single ransomware attack on one laptop could bring your business to a screeching halt. 

It's clear that remote work will continue to be a large part of how we operate for the foreseeable future. When employees work outside of the office perimeter and its security protections, the organization naturally becomes more vulnerable. This heightened vulnerability means cyber resiliency will continue to be critical to business resiliency. Here are five steps business leaders can take right now to mitigate risk and protect their organizations.

Related Content:

COVID-19: Latest Security News & Commentary

Special Report: Computing's New Normal, a Dark Reading Perspective

New on The Edge: Don't Fall for It! Defending Against Deepfakes

Embrace Zero Trust 
Adopting an "assume breach mentality" and implementing a zero-trust framework is the first step toward resiliency. Instead of automatically trusting traffic within the network, assume that everything can be dangerous or malicious. Zero trust eliminates automatic access for any source, internal or external, and instead uses a whitelisting model. Endpoints are only permitted to connect to what's absolutely necessary and no unauthorized lateral movement is allowed. This means the first endpoint that's infected becomes the last endpoint that's infected.

Enable the Principle of Least Privilege
That leads us to network governance — it's how you can start to implement a zero-trust framework. What people are allowed to do and where they are allowed to go needs to be adaptable, but it also needs to operate on the principle of least privilege. Administrators should define the authorized apps and services that are allowed to communicate on the network. Then, monitor the network to ensure you haven't missed anything. Finally, turn on enforcement to block anything that is not allowed. This least-privilege approach offers administrators an easy way to stop unnecessary network communications. 

Have a Backup for Your Backup
In today's world, one security layer simply isn't enough. Organizations need to think about what happens when their first line of defense fails. What can you do to limit the impact of an initial breach? Think extending zero-trust to the edge to protect endpoints from each other, implementing multifactor authentication or single sign-on to make passwords go further, or leveraging segmentation to supplement your firewalls. Organizations have to get things right every single time — bad actors only have to get it right once. Unfortunately, bad actors have nothing but time on their hands, so you need to do everything you can to bolster the defenses you already have in play.

Stop Lateral Movement with Segmentation 
If you assume that bad things are going to happen, you have to work toward minimizing the damage when they do. Segmentation prevents attackers and threats from moving laterally — moving from one laptop to another. It's the same concept as compartments on a submarine; if there is a leak, the entire hull doesn't fill with water because the submarine is divided into separate compartments. The leak is contained by default to keep the rest of the ship, and its occupants, safe and secure. In cybersecurity, we can segment our endpoints, so while ransomware might infect and even disable one laptop, it can never use the first compromised endpoint to infect all of the others. The rest of the enterprise can keep running because the ransomware was contained to only the first infected laptop. The breach was unavoidable, but the catastrophe never happened and the incident was not devastating because the laptops were segmented.

Focus Your Approach
There's a lot you can do to make your organization more secure, but I'm willing to bet you only have a finite amount of resources. Focusing on what will make the greatest impact on your overall security posture is crucial. Start by identifying your mission-critical assets and implement zero-trust solutions around them — it's nonnegotiable in order to keep your crown jewels secure. Then, focus on other security controls that will help keep you and your data safe, even if your first line of defense fails. Identify your business's priorities and create a realistic strategy that reflects them.

Keeping all the bad things out is an ideal rather than a realistic goal — in both cybersecurity and everyday life. Viruses find a way. You have to have both the protective layer and a backup plan to contain the breach when the first defense fails. If a spread is safely contained, the majority of operations can carry on as normal. That's resiliency — and that is the end goal. 

As chief executive officer and co-founder of Illumio, Andrew is responsible for the overall strategy and vision of the company. With deep expertise in segmentation, network security and regulatory and compliance management, Andrew is a frequent participant in panels, articles ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We are really excited about our new two tone authentication system!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7335
PUBLISHED: 2020-12-01
Privilege Escalation vulnerability in Microsoft Windows client McAfee Total Protection (MTP) prior to 16.0.29 allows local users to gain elevated privileges via careful manipulation of a folder by creating a junction link. This exploits a lack of protection through a timing issue and is only exploit...
CVE-2020-15257
PUBLISHED: 2020-12-01
containerd is an industry-standard container runtime and is available as a daemon for Linux and Windows. In containerd before versions 1.3.9 and 1.4.3, the containerd-shim API is improperly exposed to host network containers. Access controls for the shim’s API socket verified that...
CVE-2020-9114
PUBLISHED: 2020-12-01
FusionCompute versions 6.3.0, 6.3.1, 6.5.0, 6.5.1 and 8.0.0 have a privilege escalation vulnerability. Due to improper privilege management, an attacker with common privilege may access some specific files and get the administrator privilege in the affected products. Successful exploit will cause pr...
CVE-2020-9117
PUBLISHED: 2020-12-01
HUAWEI nova 4 versions earlier than 10.0.0.165(C01E34R2P4) and SydneyM-AL00 versions earlier than 10.0.0.165(C00E66R1P5) have an out-of-bounds read and write vulnerability. An attacker with specific permissions crafts malformed packet with specific parameter and sends the packet to the affected prod...
CVE-2020-4126
PUBLISHED: 2020-12-01
HCL iNotes is susceptible to a sensitive cookie exposure vulnerability. This can allow an unauthenticated remote attacker to capture the cookie by intercepting its transmission within an http session. Fixes are available in HCL Domino and iNotes versions 10.0.1 FP6 and 11.0.1 FP2 and later.