
Super awesome job! You have your team in a left-of-bang mindset related to cybersecurity, including implementing proactive security measures and monitoring threats as a steady state of cyber readiness. You also conduct Tabletop Exercises (TTX) that include a live-fire cyber range experience for the tactical team members. The practitioners on your team are disciplined and prepared.
Then – BANG – an asset your team did not have on their radar (unaware of its existence) is compromised, providing the threat actor access to other potentially vulnerable systems, and the threat actor is on the move. You’re cool; You breathe; You Observe, Orient, Decide, and Act; You have been here and done that. You know the number one priority is to contain the threat, and you start assigning Courses of Action (COA) to respond, eradicate, and recover. Outstanding!
Want to take how you think about those COA assignments to the next level? Of course, you do! Here’s how: Embrace two mental models: Prioritization and Gro
Prioritization is a forced ranking of the COA that will have the most significant impact on effective containment using three approaches for determination:
- Containment Without Risk (do these first):
- COA that will include no or minor collateral damage accompanied by effective containment
- COA that containment teams are familiar with and trained to perform
- COA that carry a high probability of execution success and containment effectiveness
- Containment With Risk (do these next):
- COA that may include collateral damage accompanied by effective containment
- COA that containment teams are less familiar with and trained to perform
- COA that carry less than a high probability of execution success and containment effectiveness
- Risk Without Containment (avoid doing these):
- COA that will include collateral damage without effective containment
- COA that containment teams are not familiar with and carry low to zero probability of execution success and containment effectiveness
Grouping organizes the COA into execution clusters that identify the desired outcome. Think about this organization using the mnemonic Inventory + 6 Ds:
- Inventory
- Identify assets that will or could be impacted by the compromise
- Enumerate the cyber battlefield for containment assets that will Detect, Deny, Disrupt, De
grade, Deceive, and Destroy the threat
- Detect
- Confirm existing assets that are capable of detection and observation
- Establish assets that are capable of detection and observation
- Deny
- Confirm existing assets that are capable of denying the threat
- Establish assets that are capable of denying the threat
- Disrupt
- Confirm existing assets that are capable of disrupting the threat
- Establish assets that are capable of disrupting the threat
- Degrade
- Confirm existing assets that are capable of degrading the threat
- Establish assets that are capable of degrading the threat
- Deceive
- Confirm existing assets that are capable of deceiving the threat
- Establish assets that are capable of deceiving the threat
- Destroy
- Confirm existing assets that are capable of destroying the threat
- Establish assets that are capable of destroying the threat
Remember two top-level pursuits when battling a threat actor after a successful compromise: Prioritize the COA based on the relationship between Containment and Risk; and Group the COA into Inventory + 6 Ds.
What does this mean for you as someone already utilizing or considering purchasing one of the GuardSight SECOPS protection packages? Reduced dwell time, improvements to cyber readiness posture, and continuity across teams responsible for response and containment.
Contact us to learn more about how we can help your team succeed in hybrid or surge-ops mode in the cyber fight against the bad guys!