Cyber Sec Framework
Cyber Sec Framework
Cyber Sec Framework
2 Illustrative Examples
3 The Cybersecurity Framework emphasizes processes/capabilities and supports a broad range of
4 technical solutions. While organizations and sectors may develop overall Profiles, these Threat
5 Mitigation Profile examples that illustrate how organizations may apply the Framework to
6 mitigate specific threats. These scenarios include cybersecurity intrusion, malware, and insider
7 threat.
8
9 Threat Mitigation Examples
10 A threat is characterized as any circumstance or event with the potential to have an adverse
11 impact on an information system through unauthorized access, destruction, disclosure,
12 modification of data, and/or denial of service (DoS). Threats continue to evolve in sophistication,
13 moving from exploitation (collection and interception of information) to disruption (denial of
14 service attacks) to destruction, with physical damage to a main operating component, whether it
15 is destruction of information or incorrect commands causing damage to computer-controlled
16 systems. The following examples describe Profiles crafted to address specific known threats.
17 Example 1: Mitigating Cybersecurity Intrusions
18 This example Profile is intended to describe key activities that address the cybersecurity risk
19 associated with a Cybersecurity Intrusion event. The Profile was crafted based on the activities
20 performed by adversaries during the life cycle of a cybersecurity intrusion. The cybersecurity
21 intrusion life cycle consists of three general phases: Gain Access, Maintain Access, and Act.
22 Gain Access: The goal of this phase is to achieve limited access to a device on a target
23 network. Adversaries often gain initial access to networks by exploiting a single
24 vulnerability in a product or by prompting user action. Techniques used include: spear
25 phishing, malicious e-mail content, Web browser attacks, exploitation of well-known
26 software flaws, and distribution of malware on removable media.
27 Maintain Access: During this phase the adversary takes steps to ensure continued access
28 to the targeted network. This is often accomplished by the installation of tools and/or
29 malware to allow the adversary to maintain a presence on the network. Malware
30 components establish command and control capabilities for the adversary and enable
31 additional attacks to be performed, such as capturing keystrokes and credentials. Example
32 actions taken during this phase include the installation of rootkits/backdoor programs and
33 execution of BIOS exploits.
34 Act: In the final phase the adversary focuses on gaining access privileges that enable
35 them to move, compromise, disrupt, exploit, or destroy data. Using the previously
36 established command and control capabilities and compromised accounts, adversaries
37 take steps to access and control additional data and resources. This includes establishing
38 communications channels to the adversary’s servers that facilitate remote access.
39 Privilege escalation and lateral movement enable an enterprise-wide compromise by an
40 adversary. The adversary is able to use the access gained to internal networks, where
41 security protections may not be as robust, to gain access to critical resources.
42
43 Threat Mitigation Profile: Cybersecurity Intrusion
44
Function Category Subcategories IR Comment
Identify Risk Identify threats to NIST SP 800-53 Allows the organization
Assessment organizational assets (both Rev. 4 to identify current
internal and external) PM-16 known IP addresses for
adversary servers and
Identify providers of threat ISO/IEC 27001 block inbound and
information A.13.1.2 outbound connections to
this source.
Protect Awareness and Provide awareness and training CCS CSC9 Training that is shaped
Training that ensures that general users by the existing threat
understand roles & landscape provides
responsibilities and act employees with an
accordingly awareness of active
threats and the basic
Provide awareness and training cybersecurity knowledge
that ensures that privileged needed to identify
users (e.g. system, network, suspicious applications
industrial control system, and not to open unknown
database administrators) email attachments. The
understand roles & benefit of awareness and
responsibilities and act training can be
accordingly extremely high and has a
relatively low cost.
Provide awareness and training
that ensures that third-party
stakeholders (suppliers,
customers, partners) understand
roles & responsibilities and act
accordingly
Identify classification/
criticality/business value of
hardware, devices, and software
Protect Access Perform identity and credential NIST SP 800-53 Access control should be
Control management (including account Rev. 4 risk informed, should be
management, separation of AC Family updated, and should
duties, etc.) for devices and anticipate threats.
users