Subscribe
  • Home
  • /
  • TechForum
  • /
  • Cyber Resilience Framework helps organisations survive a cyber attack

Cyber Resilience Framework helps organisations survive a cyber attack

The framework provides a comprehensive, flexible structure to ensure all of a company's bases are covered in the event of a cyber attack, says Al de Brito, senior technical analyst at ContinuitySA.


Johannesburg, 25 May 2017

In today's networked, digital world, the ability to detect, prevent and recover from a cyber attack is critical. Cyber resilience is thus key to organisational sustainability, says Al de Brito, Senior Technical Analyst at ContinuitySA.

"Cyber resilience - the ability to recover fully from any cyber disaster - has many moving parts. Organisations need to approach it methodically, and the Cyber Resilience Framework provides a comprehensive, flexible structure to ensure that all bases are covered," he argues.

De Brito says a number of trends are increasing organisations' vulnerability to cyber crime. They include growing dependence on cloud computing, the increasing number of industrial devices connected to the Internet, the use of personal devices on corporate networks and the storage of sensitive personal information online. Data has become a valuable corporate asset, and criminal syndicates are devoting huge resources to access it.

The growing importance of ICT systems and the information they contain, and their subsequent vulnerability, has meant responsibility for ICT governance has moved upwards to the board and C-suite.

To build a cyber resilient organisation capable of withstanding or recovering from cyber attacks, De Brito says five interconnected domains need to be used to guide a concerted programme. These domains or pillars make up a comprehensive Cyber Resilience Framework, each with several functions:

Identify. The aim is to develop an organisation's understanding and management of the risks to systems, assets, data and capabilities.

Key functional areas in this domain are:

* The management of all ICT assets, including personnel, devices, systems and facilities.
* Governance, which covers the creation of an information security policy, and ensuring all legal and regulatory requirements are met.
* Assessment of the cyber risk, including the organisation's vulnerabilities. Care must be taken to monitor the threat landscape continuously, and to understand the business impacts. The latter will assist in prioritising risk responses.
* Development of a risk management strategy, including establishing relevant processes and obtaining the buy-in of all stakeholders.

Protect. This is perhaps the most important domain area, and covers activities that will develop/update and implement effective precautions to ensure all critical infrastructure services can deliver their business purpose.

Key functional areas are:

* Controlling access to all ICT assets and facilities. The principle of "least privilege" will inform these measures.
* Implement the right technology (hardware and software) to protect systems and data.
* Motivating and educating everybody within the organisation's value chain, including partners and suppliers, to create a solid security culture.
* Ensuring data security based on basic considerations of confidentiality, integrity and availability.
* Protection of all information - probably the most important function within the domain.
* Regular maintenance of all access control systems as well as the ICT system components to ensure protection measures are current.

Detect. In this domain, the focus is on activities to identify cyber security events. This includes the ability to detect suspicious activity rapidly and assess its impact. Continuous monitoring of all systems, networks and assets is essential, along with vulnerability and penetration testing. Initiatives to maintain, test and improve these detection procedures should also be in place.

Respond. This domain covers all activities required to respond to a detected cyber security event. Functional areas include response planning, communications, analysis, mitigation and improvement.

Recover. As important as the protect phase, this domain covers how to plan a strategy to recover fully from a cyber security event. It should include continuous improvement, and communications with the public, customers and all other stakeholders.

"Cyber resilience basically determines how well your organisation can defend its vital ICT systems and assets from attack, and how quickly it can recover when an attack succeeds," De Brito concludes. "The framework offers a tried-and-trusted methodology for getting it right."

Share

ContinuitySA

ContinuitySA is Africa's leading provider of business continuity management services to public and private organisations. Delivered by highly skilled experts, its fully managed services include ICT resilience, enterprise risk management, work area recovery and BCM advisory - all designed to enhance business resilience in an age of escalating threat. By helping clients understand their risk profile, and then develop an appropriate risk mitigation strategy, ContinuitySA provides peace of mind for all stakeholders.

ContinuitySA operates the continent's biggest network of recovery centres, with more than 20 000m2 of space in Gauteng (Midrand and Randburg), the Western Cape (Tyger Valley and Somerset West), in KwaZulu-Natal (Mount Edgecombe) as well in Botswana, Mozambique, Kenya and Mauritius.

ContinuitySA is a Gold Partner of the Business Continuity Institute and the recipient of the BCI's 'Continuity and Resilience Provider' Award for the third consecutive year, in 2016.

ContinuitySA. Our business is keeping you in business.

Additional information about ContinuitySA can be found at www.continuitysa.com.

Network with ContinuitySA on Google+, LinkedIn, Twitter and Facebook.

Editorial contacts

Rebecca Warsop
Warstreet Marketing
(011) 807 9842
rebeccaw@warstreet.co.za