Interior Page Icon

Data Recovery Strategies

Assuring Trustworthiness for Continued Performance



Overview

Responding to an adversarial attack requires protected data recovery processes and mechanisms in order to keep cyber adversaries from inserting themselves into response and recovery processes. This document describes how to apply Adaptive Response, Redundancy and Substantiated Integrity, resiliency techniques.

Applying Adaptive Response to Limit Adversary Impacts

Adaptive Response - Implementing nimble cyber courses of action to manage risks - Optimizes an organization's ability to respond in a timely and appropriate manner to adversary activities, thus maximizing the ability to maintain the integrity and availability of core services. There are three approaches to applying adaptive response, the one most applicable to Data Recovery is:

Priority for Immediate Action with Adaptive Response

Applying Redundancy to Limit Adversary Actions

Redundancy - Providing multiple protected instances of critical resources can curtail the time during which the adversary can impact mission functions and degrade the extent of that impact. There are three major implementation approaches to redundancy.

Priorities for Immediate Action with Redundancy

Applying Substantiated Integrity to Curtail Exposure to the Adversary

Substantiated Integrity - Ascertaining whether critical services, information stores, information streams, and components have been corrupted - can prevent an adversary from delivering a payload, curtail the adversary's impact and enable an enterprise to recover from an attack more effectively. There are three approaches to substantiated integrity:

Priorities for Immediate Action with Substantiated Integrity

The top priorities for Dynamic Positioning are:

Preparing for the Future

As cloud computing and embedded systems are integrated into the environment, the manner in which data recovery is performed must adapt. With cloud computing, administrators cannot physically touch the systems being restored. This removes some options (e.g. a CD with a gold copy) of data recover. On the other hand, an instance of the software or data in the cloud can be the backup resource used in the data recovery process. Embedded systems provide a challenge to data recovery due to rigid, sometimes misunderstood, interfaces. As the number of embedded systems in the environment increases, it becomes more critical to identify these systems and ensure that the interfaces are understood and taken into account when preparing for data recovery. Incorporating Diversity into Redundancy will bring strength to the redundant systems and data, enabling them to better withstand an attack and be available for recovery. In addition, adding cryptographic checksums to the data will enable defenders to identify corrupted malware more easily before it is used to restore a system. This will improve the defenders ability to remove the adversary from their systems.

See Key Concepts and Terms for definitions

Previous Activity Back to Menu Next Activity