frameworks Cyber Security Information Security OSINT Framework

Start with threats of most concern to the organisation.

Targeted cyber intrusions (advanced persistent threats) and other external adversaries who steal data:

  1. Implement ‘essential’ mitigation strategies to:
    1. prevent malware delivery and execution
    2. limit the extent of cyber security incidents
    3. detect cyber security incidents and respond.
  2. Repeat step 1 with ‘excellent’ mitigation strategies.
  3. Repeat step 1 with less effective mitigation strategies until an acceptable level of residual risk is reached.

Ransomware and external adversaries who destroy data and prevent computers/networks from functioning:

  1. Implement ‘essential’ mitigation strategies to:
    1. recover data and system availability
    2. prevent malware delivery and execution
    3. limit the extent of cyber security incidents
    4. detect cyber security incidents and respond.
  2. Repeat step 1 with ‘excellent’ mitigation strategies.
  3. Repeat step 1 with less effective mitigation strategies until an acceptable level of residual risk is reached.

Note that ‘Hunt to discover incidents’ is less relevant for ransomware that immediately makes itself visible.

Malicious insiders who steal data:

  1. Implement ‘Control removable storage media and connected devices’ to mitigate data exfiltration.
  2. Implement ‘Outbound web and email data loss prevention’.
  3. Implement ‘essential’ mitigation strategies to:
    1. limit the extent of cyber security incidents
    2. detect cyber security incidents and respond.
  4. Repeat step 3 with ‘excellent’ mitigation strategies.
  5. Implement ‘Personnel management’.
  6. If employees are likely to have hacking skills and tools, implement ‘essential’ mitigation strategies to prevent malware delivery and execution, and repeat step 3 with less effective mitigation strategies until an acceptable level of residual risk is reached.

Note that technical mitigation strategies provide incomplete security since data could be photographed or otherwise copied from computer screens or printouts, or memorised and written down outside of the workplace.

Malicious insiders who destroy data and prevent computers/networks from functioning:

  1. Implement ‘essential’ mitigation strategies to:
    1. recover data and system availability
    2. limit the extent of cyber security incidents
    3. detect cyber security incidents and respond.
  2. Repeat step 1 with ‘excellent’ mitigation strategies.
  3. Implement ‘Personnel management’.

If employees are likely to have hacking skills and tools, implement ‘essential’ mitigation strategies to prevent malware delivery and execution, and repeat step 1 with less effective mitigation strategies until an acceptable level of residual risk is reached.

Strategies to mitigate cyber security incidents

Relative Security Effectiveness RatingMitigation StrategyPotential User
Resistance
Upfront Cost
(staff, software and hardware)
Ongoing
Maintenance
Cost
Mitigation Strategies to Prevent Malware Delivery and Execution:
EssentialApplication control to prevent execution of unapproved/malicious programs including .exe, DLL, scripts (e.g. Windows Script Host, PowerShell and HTA) and installers.MediumHighMedium
EssentialPatch applications (e.g. Flash, web browsers, Microsoft Office, Java and PDF viewers). Patch/mitigate computers with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest version of applications.LowHighHigh
EssentialConfigure Microsoft Office macro settings to block macros from the internet, and only allow vetted macros either in ‘trusted locations’ with limited write access or digitally signed with a trusted certificate.MediumMediumMedium
EssentialUser application hardening. Configure web browsers to block Flash (ideally uninstall it), ads and Java on the internet. Disable unneeded features in Microsoft Office (e.g. OLE), web browsers and PDF viewers.MediumMediumMedium
ExcellentAutomated dynamic analysis of email and web content run in a sandbox, blocked if suspicious behaviour is identified (e.g. network traffic, new or modified files, or other system configuration changes).LowHighMedium
ExcellentEmail content filtering. Allow only approved attachment types (including in archives and nested archives). Analyse/sanitise hyperlinks, PDF and Microsoft Office attachments. Quarantine Microsoft Office macros.MediumMediumMedium
ExcellentWeb content filtering. Allow only approved types of web content and websites with good reputation ratings. Block access to malicious domains and IP addresses, ads, anonymity networks and free domains.MediumMediumMedium
ExcellentDeny corporate computers direct internet connectivity. Use a gateway firewall to require use of a split DNS server, an email server and an authenticated web proxy server for outbound web connections.MediumMediumLow
ExcellentOperating system generic exploit mitigation e.g. Data Execution Prevention (DEP), Address Space Layout Randomisation (ASLR) and Enhanced Mitigation Experience Toolkit (EMET).LowLowLow
Very GoodServer application hardening especially internet-accessible web applications (sanitise input and use TLS not SSL) and databases, as well as applications that access important (sensitive/high-availability) data.LowMediumMedium
Very GoodOperating system hardening (including for network devices) based on a Standard Operating Environment, disabling unneeded functionality (e.g. RDP, AutoRun, LanMan, SMB/NetBIOS, LLMNR and WPAD).MediumMediumLow
Very GoodAntivirus software using heuristics and reputation ratings to check a file’s prevalence and digital signature prior to execution. Use antivirus software from different vendors for gateways versus computers.LowLowLow
Very GoodControl removable storage media and connected devices. Block unapproved CD/DVD/USB storage media. Block connectivity with unapproved smartphones, tablets and Bluetooth/Wi-Fi/3G/4G/5G devices.HighHighMedium
Very GoodBlock spoofed emails. Use Sender Policy Framework (SPF) or Sender ID to check incoming emails. Use ‘hard fail’ SPF TXT and DMARC DNS records to mitigate emails that spoof the organisation’s domain.LowLowLow
GoodUser education. Avoid phishing emails (e.g. with links to login to fake websites), weak passphrases, passphrase reuse, as well as unapproved: removable storage media, connected devices and cloud services.MediumHighMedium
LimitedAntivirus software with up-to-date signatures to identify malware, from a vendor that rapidly adds signatures for new malware. Use antivirus software from different vendors for gateways versus computers.LowLowLow
LimitedTLS encryption between email servers to help prevent legitimate emails being intercepted and subsequently leveraged for social engineering. Perform content scanning after email traffic is decrypted.LowLowLow
Mitigation Strategies to Limit the Extent of Cyber Security Incidents:
EssentialRestrict administrative privileges to operating systems and applications based on user duties. Regularly revalidate the need for privileges. Don’t use privileged accounts for reading email and web browsing.MediumHighMedium
EssentialPatch operating systems. Patch/mitigate computers (including network devices) with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest operating system version. Don’t use unsupported versions.LowMediumMedium
EssentialMulti-factor authentication including for VPNs, RDP, SSH and other remote access, and for all users when they perform a privileged action or access an important (sensitive/high-availability) data repository.MediumHighMedium
ExcellentDisable local administrator accounts or assign passphrases that are random and unique for each computer’s local administrator account to prevent propagation using shared local administrator credentials.LowMediumLow
ExcellentNetwork segmentation. Deny traffic between computers unless required. Constrain devices with low assurance (e.g. BYOD and IoT). Restrict access to network drives and data repositories based on user duties.LowHighMedium
ExcellentProtect authentication credentials. Remove CPassword values (MS14-025). Configure WDigest (KB2871997). Use Windows Defender Credential Guard. Change default passphrases. Require long complex passphrases.MediumMediumLow
Very GoodNon-persistent virtualised sandboxed environment, denying access to important (sensitive/high-availability) data, for risky activities (e.g. web browsing, and viewing untrusted Microsoft Office and PDF files).MediumMediumMedium
Very GoodSoftware-based application firewall, blocking incoming network traffic that is malicious/unauthorised, and denying network traffic by default (e.g. unneeded/unauthorised RDP and SMB/NetBIOS traffic).LowMediumMedium
Very GoodSoftware-based application firewall, blocking outgoing network traffic that is not generated by approved/trusted programs, and denying network traffic by default.MediumMediumMedium
Very GoodOutbound web and email data loss prevention. Block unapproved cloud computing services. Log recipient, size and frequency of outbound emails. Block and log emails with sensitive words or data patterns.MediumMediumMedium
Mitigation Strategies to Detect Cyber Security Incidents and Respond:
ExcellentContinuous incident detection and response with automated immediate analysis of centralised time-synchronised logs of allowed and denied computer events, authentication, file access and network activity.LowVery HighVery High
Very GoodHost-based intrusion detection/prevention system to identify anomalous behaviour during program execution (e.g. process injection, keystroke logging, driver loading and persistence).LowMediumMedium
Very GoodEndpoint detection and response software on all computers to centrally log system behaviour and facilitate cyber security incident response activities. Microsoft’s free SysMon tool is an entry level option.LowMediumMedium
Very GoodHunt to discover incidents based on knowledge of adversary tradecraft. Leverage threat intelligence consisting of analysed threat data with context enabling mitigating action, not just indicators of compromise.LowVery HighVery High
LimitedNetwork-based intrusion detection/prevention system using signatures and heuristics to identify anomalous traffic both internally and crossing network perimeter boundaries.LowHighMedium
LimitedCapture network traffic to and from corporate computers storing important data or considered as critical assets, and network traffic traversing the network perimeter, to perform incident detection and analysis.LowHighMedium
Mitigation Strategies to Recover Data and System Availability:
EssentialRegular backups of important new/changed data, software and configuration settings, stored disconnected, retained for at least three months. Test restoration initially, annually and when IT infrastructure changes.LowHighHigh
Very GoodBusiness continuity and disaster recovery plans which are tested, documented and printed in hardcopy with a softcopy stored offline. Focus on the highest priority systems and data to recover.LowHighMedium
Very GoodSystem recovery capabilities e.g. virtualisation with snapshot backups, remotely installing operating systems and applications on computers, approved enterprise mobility, and onsite vendor support contracts.LowHighMedium
Mitigation Strategy Specific to Preventing Malicious Insiders:
Very GoodPersonnel management e.g. ongoing vetting especially for users with privileged access, immediately disable all accounts of departing users, and remind users of their security obligations and penalties.HighHighHigh