Cyber Resilience Lessons Learned from the CrowdStrike - Microsoft System Crash
Information Systems Security Association (ISSA)
Developing and Connecting Cybersecurity Leaders Globally
Since Friday?19th?July 2024, the?inbox and feeds of cybersecurity professionals?were?overcrowded by the comments made on?the?Microsoft system failure which was due to a CrowdStrike update.?Without delving into the root cause of the issue (which CrowdStrike and Microsoft?will need to explain to the community)?the Cyber Resilience Special Interest Group (SIG)?identified some?relevant?lessons learned on cyber resilience stemming from the "Principles for Trustworthy Secure Design" reported in NIST 800-160v1r1.? According to NIST 800-160v1r1 organizations should ensure that the principle of?protective failure?is supported throughout their architecture design. This essentially means that protection capabilities are not interrupted in the case of failure by avoiding single points of failure and propagation of new failures.
How can?cyber resilience professionals ensure to?avoid single points of failure and how does that apply to the CrowdStrike Microsoft?case?
Additional Tips for Contingency Planning tied to the CrowdStrike Microsoft?Case
Define a process within the cyber resilience program to manage the total compromise of all laptops regardless of the compromise scenario.
This can be achieved through setting up a BIA exercise aimed to identifying the minimal required people across locations who need to have a laptop during such crisis.
Here is how to do it:
1. Define people who need dedicated extra laptops or virtual desktop based on risk group.
领英推荐
Group 1: People that would require a laptop or virtual desktop within 4 hours of the incident (crisis team and IT operational personnel). For these individuals, a spare laptop was created and kept in a secured room at headquarters or remote site locations. These laptops were disconnected from the network and were updated manually monthly.
Group 2: People that could wait one day for a laptop or virtual desktop. Within this group: One-third of the identified people should have a spare laptop. For the remaining two-thirds, the following process should be defined:
- If the laptop could be remotely managed with Intune, a specific secure Windows image could be deployed for the entire defined population.
- If the laptop could not be remotely managed with Intune, a contract could be defined with local brokers to provide new laptops as needed.
2. Implement initiatives to talk and strengthen the "resilience of people" during a cyber crisis.
In Summary
Cyber resilience and cybersecurity professionals should?acknowledge that providing adequate security in a system is inherently a system design problem. This is achieved only through sound, purposeful engineering informed by the specialty discipline of systems security engineering. (Willis Ware, Security Controls for Computer Systems, Report of the Defense Science Board Task Force on Computer Security, February 1970, via Ron Ross).
Join the ISSA Cyber Resilience Special Interest Group for more insights and engaging exchange of what works for uplifting implementation of cyber resilience concepts.
Defending high value targets against disruptive cyber attacks - SABSA TOGAF CEH GCED GRTP ISO27k ISO22k EnCase CISM CGEIT Lean MoR
2 个月Lorenzo Vacca