The fusionSpan Blog

Cybersecurity 101

Author Image
By Brian Scott |March 29, 2023
Cybersecurity

On February 12, 2013, President Obama signed an executive order named “Improving Critical Infrastructure Cybersecurity”.  From this directive, the National Institute of Standards and Technology was tasked with the development of what has become the granddaddy of cybersecurity frameworks.  The government may have its challenges in many areas, but I’ll give credit where credit is due.  NIST did a pretty darn good job organizing the massively broad topic of cybersecurity.

Mention the term “cybersecurity framework” with most business folks and you’re likely to see their eyes glaze over.  I get it.  That topic has three ingredients that make for a pretty dry discussion:  cybersecurity, framework, and government-made.  I was not born a fan of compliance frameworks and, in fact, it took many years of dealing with security as a function of my responsibilities to develop the appreciation I now have.  Yes, I’m a cyber-geek.

NIST 800-171, the framework suggested for non-governmental organizations, consists of 110 controls, which are basically requirements organizations should meet.  That’s a lot of controls, right?  So now I’m getting to my point.  With so many controls, NIST knew it would make sense to categorize these controls into groups that they call Functions.  These five functions are the highest level of abstraction of the framework and represent the five pillars that every organization should use to build their cybersecurity program.

So what are these five functions and why do they make so much sense?

Identify The first is Identify.  This may sound like a no brainer, but you’d be absolutely shocked at how many organizations are weak in this area.  “Identify” is all about enumerating your systems, people, assets, and data in order to properly manage the cybersecurity risk.  Peter Drucker famously said, “If you can’t measure it, you can’t manage it.”  Cybersecurity professionals resoundingly agree.  How can your team know to check if software is upgraded if they don’t know the software exists?  How can they know if an account being used within your network is legitimate if there is no list of legitimate accounts?  If you can’t list it, you can’t protect it!

I warned you; it was a no brainer.  If we don’t have a documented list of people, accounts, hardware devices, and approved software, how can any team adequately put together a plan to protect it?  Surprisingly, something as easy as this is often overlooked by busy IT groups that are trying their best to do the other tasks you’ve asked them to do.  It’s far too easy to intend to create or update a hardware and software inventory, but let it fall aside because that member list has to get to marketing like it was yesterday.  “Identify” is core to all the other functions.

ProtectThe next function is Protect.  Just protect everything and we’re good, right?  I wish it were that easy.  The Protect function can be difficult as there is so much change in our environments.  Included are tasks such as using proper access control procedures, building your “human firewall” with staff awareness training, configuring network firewalls, patching every piece of software and operating system in use, and ensuring that your endpoint protection is best-in-class.  Believe me, there’s a lot to execute in this area.

Detect Next up is Detect. If your organization’s perimeter protections were breached, likely because of unmitigated known vulnerabilities, then a solid “defense-in-depth” strategy means you will need  systems in place that can detect bad actors in your environment.  The cornerstone of detection is monitoring which means utilizing automated systems, often leveraging AI, to spot malicious activity.  This area is most often outsourced due to the labor and expense required to execute it yourself.

Respond In the event malicious activity has been detected in your environment, guess what?  You will need to Respond, which is the fourth NIST function.  This function requires the deployment of systems and processes that allow taking action against an attack.  This often includes isolating the danger, managing communications, analysis, and finally mitigation activities.  These activities are often managed by an organization’s Managed Service Provider (MSP) or, even better, an Incident Response Service Vendor.  An IR vendor can manage the analysis, containment, eradication, and even recovery from a cybersecurity incident.

Speaking of Recovery, we’ve finally reached the final NIST function.  Yes, after you’ve set the bug-bomb off in the house to kill the breaching critters, you need to move the furniture back in and uncover everything you’ve protected with plastic wrap.  Bringing things back online, recovering systems and data from backup copies, and informing staff, customers, and members are all part of this function.

So, we made it!  There is a huge amount of knowledge, systems, implementation, and effort involved in covering all the bases in each of these areas. Luckily, there is usually low-hanging fruit that should be addressed first to get the most bang for your buck.  The biggest part of this entire cybersecurity circus is knowing where you currently stand regarding risks and having a plan for covering as much ground as possible as efficiently as possible.

Brian Scott
Cybersecurity 101

Brian Scott provides expert CIO and CISO services based on a technology career spanning 35 years with the last 20 at the C-level.  He specializes in Cybersecurity, Software and Data Engineering, Cloud Services, Data Architecture, System Integration, and Association IT Strategy.  He has 22 years of experience within the nonprofit and association markets, is a patent holder in event technology, and a past board director for the International Association of Exhibitions and Events as well as the Center for Exhibitions Industry Research.

More posts