Page 42 - RC2020-EDGEMagazine_SummerEdition
P. 42

NIST Cybersecurity Framework 1.1

              Identify             Protect              Detect             Respond              Recover

                                 Identity Management
             Asset Management                        Anomalies and Events  Response Planning   Recovery Planning
                                 and Access Control
                                                     Security Continuous
            Business Environment  Awareness and Training                   Communications       Improvements
                                                         Monitoring

               Governance          Data Security     Detection Processes      Analysis         Communications


             Risk Assessment    Information Protection                        Mitigation
                               Processes & Procedures
             Risk Management        Maintenance                             Improvements
                 Strategy

             Supply Chain Risk  Protective Technology
               Management

                                                 Figure 2: Five Functions Detail



          Some of the questions that might go through your mind are:   communicate with your tenants and customers after
                                                                 the fact? What are the legal and regulatory implications
          •  The integrity of our building system has been       of how you communicate?
             compromised; what do we do first? Does your organi-
             zation have a response plan that addresses this   This scenario conveys the reality of today’s cybersecurity
             scenario?                                         threat landscape, and it demonstrates the necessity of the
                                                               Recover function of the NIST Cybersecurity Framework.
          •  Of all the systems that are affected by this      Answers to these questions can be complex, many team
             cyberattack, which systems should we recover      members and stakeholders will need to be involved in
             first? Has your organization done an analysis of all   decision making, and there is an expectation for a fast
             systems, including their inter-dependencies and the   response. Making any of those decisions without a plan
             Service Level Agreements(SLAs) you have with your   is a recipe for disaster and can lead to a host of horrible
             customers? Which systems take priority?           technical, legal and public relations issues.

          •  How, specifically, will we recover all systems to   The Recover function provides a helpful guide for recovery
             normal operations? Are there temporary workarounds   planning and allows your organization to proactively
             that are fast and effective? Did the organization   develop a playbook for recovering from cybersecurity
             routinely back up the logic of the BAS systems (e.g.,   incidents by helping to answer these questions. The
             controllers and supervisors)? Did the organization   NIST Cybersecurity Framework addresses items such
             routinely back up all other relevant systems on the   as recovery prioritization, communication plans, and the
             network that will need to be restored? Have we    tactical steps necessary to recover functions to normal
             developed a disaster recovery plan that provides   operations. By doing this planning in advance, you will
             step-by-step instructions for restoring these systems?   have a plan that can be followed during a stressful but
             Who, specifically, will need to be involved?      critical time.

          •  How do we respond to our tenants, customers       The most well-prepared organizations go through this
             and the media? Do we have a communication and     recovery planning process and ‘tabletop exercises’ where
             crisis response plan? How and when should we      participants walk through the plan in various scenarios
             communicate with tenants, customers and key       and talk through each process to identify gaps in planning
             stakeholders as to when service will be restored? Are   details. Many organizations will go even further by orches-
             communication systems also compromised? If so, is   trating “red team / blue team” exercises, where “red team”
             there an alternate mechanism for communicating?   members act as hacker adversaries bringing attacks to
             How do you respond to media queries? How will you   live or testbed systems, and “blue team” members work

          40
   37   38   39   40   41   42   43   44   45   46   47