This week, it’s different.
We have published CyberInsights for 6 months now.
We had set out to cut the clutter and get insights from cybersecurity news.
Every week, we chose two news items, distilled the essence and asked you thought provoking questions! We wanted to spur your thinking and drive you to action.
High goals, indeed!
After six months of doing this, we have decided to pause, take a step back and reflect on those questions.
If you had mulled over the questions and taken some action on them, would something have changed in your cybersecurity framework?
We think so.
Here is what you would have learnt and implemented from the weekly cybersecurity events.
July Learnings
Change to patching policy: If you were patching only ‘Critical’ vulnerabilities, you would have updated it to include ‘High’ and ‘Medium’ rated vulnerabilities too.
Created a post-covid cloud security strategy to ensure that work from home was accommodated and point solutions were not hastily plugged into the existing architecture without consideration for data sovereignty and privacy issues.
Changed the USB access policy to have granular levels of controls.
Added a process, in conjunction with HR, to perform additional monitoring of personnel with ongoing disciplinary proceedings and access to sensitive data.
Created / modified a cryptography process to include ownership of SSL certificates and assigned an individual who would be responsible for handling communication with intermediate certificate authorities ICAs.
Created a cybersecurity resource rotation process to ensure that critical resources do not burn out.
Evaluated your organisation against the six basic CIS controls, that if implemented correctly would eliminate 80% of your cybersecurity problems
Assessed uncontrolled communication channels (like Slack, discord, etc.)
Trained employees on what can and cannot be shared on open communication channels.
Re-assessed your cyber insurance cover to address risks from work from home and cloud service usage
August Learnings
Updated your cyber crisis management plan to consider the possibility of paying ransom.
Reviewed your cyber insurance policy to check if payment of ransom is covered.
Updated your incident management playbook to include the scenario of theft of physical hard drives.
Assessed your CI/CD pipeline for inadvertent data exposure on storage buckets for all environments (including development and test)
Assessed your cloud service provider to see if data was exposed within their environment
Created an open source software security policy / strategy.
Created / updated the red team process to inform key stakeholders and sponsors before and during the exercise to ensure there are no legal hassles.
Performed a maturity assessment of your vulnerability management program against the SANS vulnerability management maturity model.
Updated your social engineering checks to include ‘Vishing’ or voice phishing attacks.
Evaluated the risk of cloud service failure to your business and, if required, created a BCP for the same.
September Learnings
Created hardening checklists for third party administration utilities (adminer, etc.)
Added rules to the SIEM to monitor suspicious database connections from inside to the internet.
Created a specific access control matrix for admin utilities and set a process to review them regularly.
Considered implementing emerging solutions that deploy security as a code by talking to the DevOps people.
Evaluated the process of employee monitoring vis-a-vis the data privacy requirements of individuals and updated the process accordingly, in discussions with HR.
Created an incident response playbook (if not already having one) and made sure that red team exercises contribute to keeping it up to date.
Updated your work from home checklist to include home printer security
Checked if your DLP was capable of monitoring data sent to the printer (at home).
Evaluated the requirement of customer due diligence along with supplier due diligence.
Updated your security awareness training to cover malicious QR codes.
Created a process for authorisation, usage and removal of developer / admin utilities with special privileges.
Enabled event IDs for IOCs of Zerologon in your SIEM
Reviewed the pre-draft comments of NIST 800-55 (security metrics) and provided your inputs for the same.
October Learnings
Considered a strategy for ‘offensive’ cybersecurity by taking the attack to the hackers while ensuring that you were on the right side of the law.
Considered the risks of insider threats (like customer support teams, etc.) and evaluated tools for monitoring and preventing high risk privileged user actions.
Mulled over the prospect of having to secure your organisation from software having legitimate backdoors.
Thought about privacy vs. national security.
Evaluated the effectiveness of your threat intel data feeds and devised metrics for the same.
Started a project of merging the cybersecurity risk register with the enterprise risk register.
Evaluated the primary and secondary risks of a DDoS attack and conducted a DDoS simulation test for stress testing your network
Conducted a red team exercise to discover attack paths from customer facing networks to the Crown Jewels in your ecosystem.
Reviewed the IT helpdesk remote administration process for work from home for security concerns.
Performed a compromise assessment to check if you are already breached. Set up a process to do this regularly.
November Learnings
Created an inventory of AI / ML based systems in your environment.
Setup a process for threat modelling of AI / ML based systems.
Reviewed applications for their ability to check for breached password usage including those applications that use third party credential management services.
Reviewed the security processes in the CI/CD pipeline to secure all components used.
Checked and setup rules in the SIEM to detect exfiltration from your source code repositories.
Implemented controls to secure end of life and end of support systems that cannot be replaced. Considered technologies such as micro patching for the same.
Implemented a mechanism to detect and prevent credential stuffing attacks.
Updated your cyber crisis management plan/ incident management plan to cover proactive communication to affected users.
Considered if you required third party intermediaries to negotiate with attackers.
Included contact centre security testing as a part of the red team exercises.
Setup detection mechanisms for changes to your domain account with the registrar.
Evaluated means to secure accounts where multiple users access the same social media accounts.
December Learnings
Setup a mechanism to incentivise developers to write more secure code.
Setup a mechanism to incorporate security user stories in sprint plans.
Checked if your AV detect Pay2Key ransomware and added IOCs for the same.
Reviewed log movement of cloud based logs (like cloud firewalls).
Mulled over the way to detect vulnerabilities that do not have a CVE-ID.
Setup a process to secure the software build pipeline against advanced supply chain attacks.
Setup processes to discover and remediate compromised systems in your network.
Reconsidered cloud service failure risks and business continuity planning for the same.
Happy Holidays!
We are taking a logical break for this year. In the new year, we plan a new format of this newsletter. We will keep you posted.
Let us know if you have any suggestions about the format and duration of the newsletter.