Sophisticated and targeted cyber intrusions have increased in recent
months against owners and operators of industrial control systems across
multiple critical infrastructure sectors. ICS-CERT developed the
following guidance to provide basic recommendations for owners and
operators of critical infrastructure to mitigate the impacts of cyber
attacks and enhance their network security posture. This guidance
applies to organizations whose networks have been compromised by a
cyber attack as well as to those desiring to improve their network
security preparedness to respond to a cyber incident. The guidance is
relevant to both enterprise and control system networks, particularly
where interconnectivity could allow adversaries to move laterally within
and between networks. ICS-CERT reminds organizations to perform proper
impact analysis and risk assessment prior to implementing defensive
measures to avoid any negative impact to normal operations. The
guidance is organized into several topical areas and provides network
administrators with concepts for improving detection of intrusions,
preventing lateral movement of threat actors, and controlling access to
the various segments of a network. The guidance is in the form of “what”
should be done and “why” it is important. The “how” of implementation
is the responsibility of each organization and is dependent on
individual needs, network topology, and operational requirements. Organizations that suspect a compromise should first consider how to
preserve forensic data and stop movement of the intruder through the
network. The guidance listed in the Preserving Forensic Data and
Credential Management sections below should be considered primary
actions to help mitigate the spread of compromise through a network. How effective can these CERT guidelines in combating cyber intrusions? Send your comments to the Cloud and Cyber Security Center: http://cloudandcybersecurity.blogspot.com/
No comments:
Post a Comment