Cybersecurity Series
Cyber Security_Blog_with Book

CIR RAR-BIA Risk Treatment for Configuration Exploitation

This blog on the type of risk treatment strategy discussed as a  business continuity management (BCM) issue in connection with cyber security incident response (CIR).  It discusses the importance of knowing what information assets require protection against specific cyber security threats.

It is conducted as part of the Risk Analysis and Review (RAR) phase during the BCM planning process. This includes understanding the types of cybersecurity threats and the affected assets.

This risk treatment strategy is extracted from a Verizon survey. It provides an overview of the risk treatment and controls for the specific threat, which is on exploiting the configuration.

It also provides an understanding of the cyber criminals' techniques utilized to exploit vulnerabilities within the organization that sabotaged the assets, affecting the smooth continuity of business functions.

Reference: Chapter 6 Risk Analysis and Review and Business Impact Analysis 6.9 Risk Treatment

Moh Heng Goh

Risk Treatment

Risk Treatment Strategy for Specific Cyber Security Threats The risk treatment summarized by Verizon (2017) surveys for the following cybersecurity risk is as appended below:
  • The Human Element
  • Conduit Devices
  • Configuration Exploitation
  • Malicious Software
C6 CIR Risk Treatment Configuration Exploitation
Threats Resulting from Configuration Exploitation

Types of Cyber Security Due to Configuration Exploitation

Risk Treatment Strategy for Configuration Exploitation

 

S/No

Threat Scenario

Risk Treatment

Description of Risk Treatment/ Control

Accept (A)

Mitigate /Reduce (MR)

15

SQL Injection

-

  • Program secure configurations for hardware and software.
  • Install boundary defences.
  • Manage security levels of application software.

16

CMS Com-promise

17

Backdoor Access

-

  • Create an inventory of authorised and unauthorised software.
  • Program secure configurations for hardware and software.
  • Set up defences against malware.
  • Install boundary defences.
  • Manage access control based on access requirements.
  • Train and create awareness among employees.

18

DNS Tunneling

-

  • Maintain, monitor and analyse audit logs.
  • Set up defences against malware.
  • Install boundary defences.
  • Install controls to protect data.

19

Website Deface-ment

-

  • Program secure configurations for hardware and software.
  • Conduct vulnerability assessment continuously.
  • Remediate identified vulnerabilities.
  • Maintain, monitor and analyse logs.
  • Monitor and control account usage.
  • Manage security levels of application software.

20

DDoS Attack (Scenario 20)

-

  • Incident Response and Management.

-

 

  • Program secure configurations for hardware and software.
  • Limit and control network ports, protocols and services.
  • Program secure configurations for network devices.
  • Install boundary defences.

21

ICS Onslaught

-

  • Incident Response and Management.

-

  • Create an inventory of authorised and unauthorised devices and software.
  • Program secure configurations for hardware and software.
  • Set up defences against malware.

22

Cloud Storming

-

  • Control usage of administrative privileges.
  • Maintain, monitor and analyse logs.
  • Develop measures to ensure the organisation is capable of recovering its data.
  • Limit access control based on access requirements.
  • Monitor and control account usage.

Risk Treatment Strategies for “Configuration Exploitation” Threats

CIR Risk Treatment Strategies

Risk Treatment Strategy

The Human Element 

Conduit Devices Config-uration Exploitation

Malicious Software

Back To: Overview of RAR and BIA

Risk Treatment Strategy for Specific Cyber Security Threats
New call-to-action
Risk Treatment for Conduit Devices Risk Treatment for Configuration Exploitation New call-to-action New call-to-action

 

 

 


BCMI Logo

Do You Want to Continue BCM Training onsite or online?

Competency-based Course
Certification Course
New call-to-action New call-to-action [BL-3-Catalog] What Specialist Level Blended Learning Courses that are Available? [BL-5-Catalog] What Expert Level Blended Learning Courses that are Available?

A Manager’s Guide to BCM for Cybersecurity Incident Response

Goh, M. H. (2017). A Manager's Guide to Business Continuity Management for Cyber Security Incidents, 2nd Edition. GMH Pte Ltd.

Reference: Chapter 6 Risk Analysis and Review and Business Impact Analysis 6.9 Risk Treatment

Note: This version was the draft 2nd Edition being updated by 2023. The numeric in the square bracket [X.X] cross-refers to the actual chapter and section in the 1st Edition.

 

Comments:

 

More Posts

New Call-to-action