May 27, 2022

TheCyberThrone

Thinking Security ! Always

NIST Cyber Resiliency Now Includes Critical Infra Controls

NIST has published an update to its cyber resiliency engineering framework that advocates building resilient IT systems that can withstand a modern attack by limiting the damage an attacker can cause.

Cyber Resiliency engineering combines specialty systems engineering, systems security engineering, and resilience engineering to architect, design, develop, implement, maintain, and sustain the trustworthiness of systems. The point of cyber resiliency engineering is to develop “survivable, trustworthy secure systems” that can anticipate, withstand, recover from, and adapt to adverse conditions and attacks.

Advertisements

Cyber resiliency assumes the attacker has already gained access to a system or will gain access to the system at some point; the framework depends on that assumption. In “Developing Cyber resilient Systems: A Systems Security Engineering Approach” (SP 800-160 Vol. 2 Rev. 1), NIST outlines a series of tools, techniques, and approaches enterprise defenders can deploy to counter attacks by building resiliency, and they can be applied to both older systems already deployed or new ones being built from scratch.

The original framework helped organizations understand and apply cyber resiliency to traditional IT systems. This update expands the focus of the original framework and includes new sections on operational technology and how cyber resiliency approaches and controls can be used to counter adversarial attacks on industrial control systems.

The assessment is meant to be a starting point and can be tailored to meet the individual needs of the organization, which can select, adapt, and use some or all of the objectives, techniques, approaches, and design principles outlined in the framework and apply them as needed. Organizations can see how effective their implemented controls are and determine the strengths and weaknesses of their systems.

The framework is also designed to be used in conjunction with the MITRE ATT&CK framework. The update creates a single threat taxonomy based on the framework for organizations to use.

Advertisements

Finally, the updated framework is aligned to be consistent with NIST’s catalog for “Security and Privacy Controls for Information Systems and Organizations” (SP 800-53, Revision 5).

%d bloggers like this: