Using CISA resources to improve your security program

Using CISA resources to improve your security program

CISA releases documents regularly with information about the work they are performing on assisting federal agencies with cybersecurity. On 11 July 2024 they released an advisory detailing a red team exercise they performed with an unnamed federal agency. While I was reading this document, I saw many examples of items to review in my own environment.

For a quick review of the document, go right to the Lessons Learned and Key Findings section, which is page 15 of the PDF. Review the 16 findings in this section and think about which may apply to your environment. It’s likely that even if you are doing all 16 of those already, there are areas where you could improve! They also have a Mitigations section where they list recommendations for their findings. ?


One of the examples I highlighted in the document was that the attackers were able to send 8 GB of traffic outbound without being caught. How much data is “too much” in your environment and would trigger an alert? Is there any alerting at all? Is this something that you should do in a tabletop exercise to review how well you would respond to it?


After reviewing the key findings, I strongly suggest that you read the entire document. They go into their tactics and techniques, and even a nontechnical member of staff can find good information. For example, they talk about finding a backup file on one of the servers where the attackers could read the information. Are you ensuring that your backups are stored where attackers cannot get to them, and you don’t have backup files even temporarily on your production systems?

Besides the findings, I suggest that you also make a list of items that you already do in your environment. This helps you know what you are doing well! For example, Findings 10 and 11 have to do with cross-functional teamwork. This has always been a focus of mine when I start at a company since my team generally doesn’t manage every part of IT. Integration and collaboration between groups is key to establish before there is an incident, so the trust is already in place when time is of the essence.

Do you have compliance requirements where you must do a risk assessment regularly or that you are reviewing threat intelligence? Congratulations, you just did those! In the NIST world, these are RA-3 and CA-7 in SP800-53, 3.11.1 and 3.12.1 in SP800-171, and 3.1.1e in 800-172. For other compliance requirements, I always suggest looking at the Secure Controls Framework to figure out the crosswalk to these documents.

In summary, the government DOES have some good help for companies! This is one example of how you can use some of the resources to help your company out. Free is always good, especially when it’s as helpful as this is.

?

Linda Rust

Strategic cybersecurity advisor to Fortune 100 C-suite and Board, Private Equity, and Owners | Top-down CMMC and M&A Estimates with verified accuracy in 72 hours | vCISO

7 个月

Thanks for letting all of us readers look over your shoulder. This is a great walk through

回复

要查看或添加评论,请登录

Jake Williams的更多文章

  • NIST 800-171 rev 3 feedback for FIPS

    NIST 800-171 rev 3 feedback for FIPS

    Here's my second piece of feedback that I will be sending in. Feel free to comment with your thoughts on my feedback…

    1 条评论
  • The Assumptions of 800-171

    The Assumptions of 800-171

    Disclaimer: This is my personal work and references other works or people who have been helpful in getting this…

    3 条评论
  • FedRAMP and SPAs under CMMC

    FedRAMP and SPAs under CMMC

    By Jake Williams Disclaimer: This is my personal work and references other works or people who have been helpful in…

    39 条评论
  • The genesis of 800-171

    The genesis of 800-171

    By Jake Williams Disclaimer: This is my personal work and references other works or people who have been helpful in…

    2 条评论
  • The “no bullshit” CMMC 2.0 update

    The “no bullshit” CMMC 2.0 update

    Edited 11 November 2021 slightly for some clarity. I’m not selling you anything.

    17 条评论
  • CUI and ITAR overlap?

    CUI and ITAR overlap?

    Originally posted 25 Aug 2021. All information/opinions posted are my own, not that of my employer, the CMMC-AB IAC, or…

    9 条评论
  • Understanding CUI - a DIB perspective

    Understanding CUI - a DIB perspective

    First posted 16 April 2020 Edited 15 Sept 2020 to clarify CDI Disclaimer: I have written this on my own and has not…

    19 条评论

社区洞察

其他会员也浏览了