Site icon TheCyberThrone

CISA Risk Assessment FY 20

Advertisements

CISA conducted a risk assessment of 37 attack techniques across multiple stakeholders in different sectors in FY 2020. These attack techniques were mapped to six successive infection stages in a simple attack pathway using the MITRE ATT&CK framework. The stages identified by CISA include initial access, command and control (C2), lateral movement, privilege escalation, collection, and exfiltration.

This path is not all-encompassing of the potential steps used by malicious actors and not all attack paths follow this model.But these steps serve to highlight some of the more successful attack strategies used during RVAs and the impacts these strategies have had on a target network.

Primary Goal

The goal of the RVA analysis is to develop a better security posture for organizations across various sectors.With this assessment, CISA provides a better understanding of risks and helps organizations remediate weaknesses that threat actors might abuse to compromise network security controls.

Assesment Findings

Assesment Indication

The list of assessed tools and techniques continues to evolve. As a result, threat actors, with capability and intent, may be successful at compromising many organizations across the globe.

Final thoughts

CISA’s RVA report includes mitigation measures that organizations can implement to improve their security posture. This includes application whitelisting, disabling macros, educating users about anti-phishing techniques, monitoring network traffic, limiting admin access, setting password policies, disabling unused remote services, keeping software updated at all times, and preventing the storing of credentials in applications.

Exit mobile version