66 percent of organizations would not recover from a cyberattack if it occurred today. Is your organization prepared? Here’s what every CIO and CISO needs to know to start or improve their cybersecurity recovery plan.
Disaster recovery plans (DRP) have always been the cornerstone of business continuity. When it comes to protecting your critical assets and avoiding downtime, cybersecurity is an often-overlooked piece of the puzzle—but a critical step in the risk management process. No federal policies, standards or guidelines focus specifically on recovering from a cybersecurity incident. It’s up to you to develop, test, and improve your cybersecurity recovery plan for 2018. Use our expertise to help you along the way.
It’s a common misconception that disaster recovery and cybersecurity recovery are one in the same. Although they are similar and have some overlap, disaster recovery’s primary objective is to provide business continuity after disruption from man-made or natural causes. Security recovery, on the other hand, protects data assets after a data breach.
“The nature of the threats within security recovery plans are more dynamic than within disaster recovery… for example, recent ransomware attacks, such as WannaCry, are incredibly destructive and require security recovery plans to examine how to effectively respond to new threats and risks,” says Mark Testoni, president and CEO of SAP National Security Services. Most security experts recommend different plans with complementary policies and procedures.
Figure 1: Differences in disaster recovery plan versus security recovery plan (Source: CSOonline.com)
At the end of the day, both plans are part of a larger security objective to ensure the confidentiality, integrity, and availability of your company’s systems and data assets. Disaster recovery directly ties into availability objectives for information security. However, most organizations don’t have a true understanding of which elements impact availability.
For instance, most DRPs start with a secondary location for running data replication between their primary site and secondary DR site. Consider that a cyberattack may corrupt data, in which case the DR implementation will not protect the information, as the corrupted data would be replicated to both locations. To avoid this, you should use layered defense tools, and build relevant controls for your risk management process.
Additional goals for your cybersecurity recovery efforts may include, restoring information systems using alternate methods, performing standard operating procedures in alternate ways, recovering information systems in backup locations, and implementing contingency controls based on the business impact of the incident. When focusing on your cybersecurity response plan, you should follow these steps—and customize each part to your business.
As mentioned before, you’ll also need advanced protection to ensure the success of both your disaster recovery and cybersecurity efforts, such as:
According to TechRepublic, one billion accounts and records were compromised worldwide in 2016. That’s approximately 3x per person in the U.S. in one year.
While it is preferable to avoid a cyberattack in the first place, the National Institute of Standards and Technology notes that over-reliance on prevention is just as bad as not being prepared. Some cyberattacks simply cannot be stopped, so focusing solely on prevention is a flawed approach. Instead, plan for all possible cyber incidents, their containment and the recovery process. To determine priorities, perform a business impact analysis to evaluate potential effects—financial, legal, regulatory, etc.—of cyber events on your business. With these priorities in mind:
As you plan for the eventuality of a cyber event, realize the recovery planning process should be fluid. Your organization must update your cybersecurity recovery plan regularly based on up-to-date visibility on threats and risks landscape, best practices and lessons learned from response to breaches that have affected similar businesses. Consider creating a task force to periodically test and evaluate your recovery efforts—and overtime, you’ll uncover what works and what doesn’t. After a breach, gather your task force and address any vulnerabilities and issues with your plan for more favorable results in the future.
Rather than simply guessing that the recovery process did or did not work well, use real data and specific metrics to support your position. These suggestions are a great jump-off point when starting from scratch:
5. Document Everything
Procedures, roles and responsibilities, metrics tracking, and adjustments should be documented for improved response times and recovery. This includes:
With adequate documentation and a comprehensive backup plan, you’re more likely to withstand a breach. Think of your cybersecurity recovery plan as a playbook that’s shared with your security, business continuity, and contingency planning teams.
Both disaster recovery and cybersecurity recovery planning are a necessity in today’s cyber risk culture. Data security has become more complex, requiring organizations to invest more resources in issue prevention and remediation.
Having an appropriate well-documented plan spread throughout your departments will maximize your chances of a swift recovery. Practice, training, and metrics will spur continuous improvement that will help your company mitigate risk, and thrive despite the growing cyberthreat environment.
Additional Resources on This Topic:
2017 Cybercrime Trends: Expect a Fresh Wave of Ransomware and IoT Hacks
10 Questions to Ask a Prospective Cyber Insurance Provider
Cybersecurity Standards and Guidelines—Are You Just Checking the Boxes?
This article was first published on OnRamp.
In this guest contribution from Steve Vonder Haar, Senior Analyst with Wainhouse, a Futurum Group…
In this guest contribution from Craig Durr, Senior Analyst with Wainhouse, a Futurum Group Company,…
Futurum's Daniel Newman dives into the recent announcement coming out of Micron, that they will…
Futurum analyst Michael Diamond recaps the Amazon Devices and Services event and reviews some of…
Futurum senior analyst Steven Dickens provides his take on the latest announcements coming out of…
Futurum’s Ron Westfall and Daniel Newman examine Micron’s financial results for the fourth quarter 2022…