Interior Page Icon

Disrupting the Attack Surface

Making Life Hard for the Adversary



Overview

The design principles for disrupting the attack surface create a more difficult environment for the adversary, provide defenders with the ability to observe and analyze adversary actions, and prevents the adversary from advancing their lifecycle. This document describes how to apply the adaptive response, deception, dynamic positioning, non-persistence, realignment, and unpredictability1 resiliency techniques.

Applying Adaptive Response to Impede Adversary Activities

Adaptive Response - Implementing nimble cyber courses of action to manage risks - can impede the spread of destructive malware in an enterprise information infrastructure and limit the damage that it does. There are three approaches that may be applied:

Priorities for Immediate Action with Adaptive Response

The top priorities for Adaptive Response are:

Applying Deception to Redirect and Impede Adversary Activities

Deception - misleading, confusing, or hiding critical assets from, the adversary - can redirect adversary activities into deception environments thereby impeding the attack flow, slowing down the attack lifecycle, and enabling defenders to study and expose the adversary activity. There are three approaches that may be applied:

Priorities for Immediate Action with Deception

The top priorities for Deception are:

Applying Dynamic Positioning to Limit Adversary Impacts

Dynamic Positioning - distributing and dynamically relocating functionality or assets - can limit the spread of destructive malware in an enterprise information infrastructure and aid in removing the malware from the infrastructure. There are four approaches that may be applied:

Priorities for Immediate Action with Dynamic Positioning

The top priorities for Dynamic Positioning are:

Applying Non-Persistence to Limit Adversary Impacts

Non-Persistence - Generating and retaining resources as needed or for a limited time - can limit the spread of destructive malware in an enterprise information infrastructure because the resources are terminated and reinitiated as needed. There are three approaches that may be applied:

Priorities for Immediate Action with Non-Persistence

The top priorities for Non-Persistence are:

Applying Realignment to Impede Adversary Actions

Realignment - aligning cyber resources with core aspects of mission and business functions - can impede the adversary's ability to spread destructive malware in an enterprise information infrastructure. There are four approaches that may be applied:

Priorities for Immediate Action with Realignment

The top priorities for realignment are:

Applying Unpredictability to Impede Adversary Impacts

Unpredictability - making changes randomly or unpredictability - can impede the adversary's ability to spread destructive malware in an enterprise information infrastructure. This technique does not stand on its own, rather it multiplies the impact of many other techniques (e.g., deception, non-persistence and dynamic positioning). There are two approaches that may be applied:

Priorities for Immediate Action with Unpredictability

The top priorities for Unpredictability are:

Preparing for the Future

As the attack surface increases due to the advent of the Internet of Things, and cloud computing, the need to disrupt and prevent attacks, and potentially reduce the attack surface also increases. The potential to adaptively respond to the adversary also increases because there are an increasing number of tools and techniques available to implement the techniques discussed in this document. However, it is important to test these tools and ensure they are mature enough for the environment in which they are deployed, since immature tools may have unintended adverse impacts on an organization's mission/operations. It is also extremely important to secure these tools and resources as they present a significant danger in being commandeered and used against the defender. The same can be said for offloading resources. As the number of services providers increases and becomes more competitive and secure, this option becomes more viable. At the same time, it is important to examine these service providers and their requirements to ensure compatibility and compliance with the mission's goals and purpose.

See Key Concepts and Terms for definitions

Back to Menu Next Activity