Interior Page Icon

Core Services

Re-establishing a Trusted Foundation



Overview

Recovering from an incident, requires integrity in the core services (i.e., those key services needed for continuing an organization's critical missions and services - these will differ from one organization to another) in order to keep cyber adversaries from inserting themselves into response and recovery processes. This document describes how to apply Adaptive Response, Coordinated Defense, Redundancy, and Substantiated Integrity resiliency techniques to assure integrity in the core services.

Applying Adaptive Response to Limit Adversary Impacts

Adaptive Response - Implementing nimble cyber-courses-of-action to manage risks - Optimizes an organization's ability to respond in a timely and appropriate manner to adversary activities, thus maximizing the ability to maintain the integrity and availability of core services. There are three approaches to applying adaptive response:

Priorities for Immediate Action with Adaptive Response

The top priorities for Adaptive Response are:

Applying Coordinated Defense to Share Situational Awareness and Collaborate

Coordinated Defense - managing multiple, distinct mechanisms adaptively and in a coordinated way - can defend critical resources, such as core services, against adversary activities. There are two major implementation approaches to coordinated defense:

Priorities for Immediate Action with Coordinated Defense

The top priorities for Coordinated Defense are:

Applying Redundancy to Impede Adversary Actions

Redundancy - providing multiple protected instances of critical resources - can curtail the time during which the adversary can impact mission functions and degrade the extent of that impact. There are three major implementation approaches to redundancy.

Priorities for Immediate Action with Redundancy

Applying Substantiated Integrity to Curtail Exposure to the Adversary

Substantiated Integrity - ascertaining whether critical services, information stores, information streams, and components have been corrupted - can prevent an adversary from delivering a payload, curtail the adversary's impact and enable an enterprise to recover from an attack more effectively. There are three approaches to substantiated integrity:

Priorities for Immediate Action with Substantiated Integrity

Preparing for the Future

As new technology is incorporated into what is considered core services, practices must adjust. For example, appropriately incorporating virtualization into the policies and processes for maintaining redundancy offers both opportunity and challenges. Virtualization can vastly decrease the costs of redundancy but availability and separation concerns must be taken into consideration. In addition some challenges such as identifying priority systems and their dependencies will never disappear and may increase as new technologies change assumptions about connectivity and persistence.

Changes in technology almost always require changes in governance and concept of operations. These changes will bring conflicts between the roles and responsibilities of both system administrators and service recovery engineers. It is important to focus on the goals and resolve these conflicts in a way that does not leave gaps for the adversary to exploit.

The ability to withstand and recover from an incident relies heavily on the support of core services. Ensuring their presence is vital. Leveraging the synergies among resiliency techniques is critical to ensuring core services are available when needed. Incorporating elements of Diversity into Redundancy creates a more difficult environment for an attacker. An attack designed to target a homogenous environment will not be as effective in a heterogeneous environment. Likewise, incorporating Substantiated Integrity into Redundancy will provide early warning of compromised systems. This will enable defenders to limit or even prevent the corrupted systems from being used.

Resiliency can also be increased by incorporating Dynamic Positioning into Redundancy. For example providing an additional copy (or copies) of core services, situated outside the organizations usual perimeter in a mobile environment (e.g., an RV) increases resiliency by providing resources needed to recover from an attack that are unlikely to have been impacted by that attack.

See Key Concepts and Terms for definitions

Previous Activity Back to Menu Next Activity