{"id":4091,"date":"2020-01-24T09:08:25","date_gmt":"2020-01-23T21:08:25","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=4091"},"modified":"2020-01-24T09:08:25","modified_gmt":"2020-01-23T21:08:25","slug":"with-yet-another-it-security-warning-from-the-nsa-were-being-asked-so-what-is-best-practice","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=4091","title":{"rendered":"With yet another IT security warning from the NSA, we&#8217;re being asked &#8220;so what is best practice?&#8221;"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;3.22&#8243;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.9.1&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2><strong>Aligning with NIST&#8230;..?<\/strong><\/h2>\n<h3><strong>Is your Cybersecurity protection matching best practice?<\/strong><\/h3>\n<p>Clearly the cybersecurity stakes are higher.\u00a0 <strong>The security precautions that used to be reasonable are no longer enough.<\/strong>\u00a0 Stakeholders expect businesses to do more \u2013 whether it\u2019s your insurer, your bank, your shareholders or your clients.<\/p>\n<p>The best guidance on \u201creasonable\u201d is the \u201cNIST\u201d Cybersecurity Framework.\u00a0 This is also reflected in NZ in the government\u2019s CERTNZ programme.<\/p>\n<h2><strong>So what is NIST, and how does Kinetics help you match the standard?<\/strong><\/h2>\n<p>The great news is that we\u2019ve built our KARE for Security service following this guidance.<\/p>\n<p>So, what do you need to do to match \u201creasonable\u2019? Is KARE for Security enough?<\/p>\n<p>&nbsp;<\/p>\n<p>In 2018 the US Department of Commerce, National Institute of Standards and Technology (NIST) released version 1.1 of its Cybersecurity Framework.\u00a0 The Framework was mandated by the US government to improve cybersecurity risk management in critical infrastructure.\u00a0 Because it references globally recognized standards for cyber<a href=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2020\/01\/NIST1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4092 alignright\" src=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2020\/01\/NIST1.jpg\" alt=\"\" width=\"432\" height=\"203\" \/><\/a>security, the Framework is used internationally as a guide to strengthening cybersecurity in critical infrastructure as well as other sectors and communities.<\/p>\n<p>The Framework consists of five Core Functions which organise the basic cybersecurity activities at their highest levels.<\/p>\n<p>Kinetics KARE For Security practices and features align with the five Core Functions. The list of features implemented, and the degree of their implementation, can vary from client to client depending on the client\u2019s commitment, technology and business needs.<\/p>\n<h3>Identify<\/h3>\n<p>&nbsp;<\/p>\n<p>NIST Description Develop an organisational understanding to manage cybersecurity risk to systems; people; assets; data; and capabilities.<\/p>\n<p>The activities in the \u2018Identify\u2019 function are foundational for effective use of the Framework.<\/p>\n<p>Understanding the business context; the resources that support critical functions; and the related cybersecurity risks enables an organisation to focus and prioritise its efforts; consistent with its risk management strategy and business needs.<\/p>\n<p>Examples of outcome categories within this function include: Asset Management; Business Environment; Governance; Risk Assessment; and Risk Management Strategy&#8221;]<\/p>\n<p>KARE for Security A FlightPlan review covering your technology; governance, risk identification and options on how to reduce it.<\/p>\n<ul>\n<li>Monthly reporting and quarterly review meeting including elevated rights and user account reporting<\/li>\n<li>Managed IT assets reporting<\/li>\n<li>Recommendation reporting; tracking and planning<\/li>\n<li>Darkweb identity breach reporting<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Protect<\/h3>\n<p>&nbsp;<\/p>\n<p>&#8220;NIST Description Develop and implement appropriate safeguards to ensure delivery of critical services.<\/p>\n<p>The \u2018Protect\u2019 function supports the ability to limit or contain the impact of a potential cybersecurity event.<\/p>\n<p>Examples of outcome categories within this function include:<\/p>\n<ul>\n<li>Identity Management and Access Control;<\/li>\n<li>Awareness and Training; Data Security;<\/li>\n<li>Information Protection Processes and Procedures;<\/li>\n<li>Maintenance;<\/li>\n<li>and Protective Technology.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>KARE for Security Multifactor Authentication for identity management and access control.<\/p>\n<ul>\n<li>Conditional Access.<\/li>\n<li>Awareness through reoccurring Phishing Testing; online Security training and Security Presentations.<\/li>\n<li>Microsoft and third party patching.<\/li>\n<li>Email record identity management.<\/li>\n<li>Office 365 ATP management.<\/li>\n<li>DNS Scrubbing.<\/li>\n<li>Endpoint Advanced Anti-Virus protection.<\/li>\n<li>Backup monitoring\/management.<\/li>\n<li>Office 365 Backup<\/li>\n<li>KARE DR Backup<\/li>\n<li>Firewall Packet inspection; Gateway Anti-Virus protection; ATP; Intrusion Prevention Services.<\/li>\n<li>Mail Scrubbing.<\/li>\n<li>Mobile Device Management.<\/li>\n<li>Kinetics Password monitoring and reporting.<\/li>\n<li>KARE Password Vault&#8221;]<\/li>\n<\/ul>\n<h3>Detect<\/h3>\n<p>NIST Description Develop and implement appropriate activities to identify the occurrence of a cybersecurity event.<\/p>\n<p>The \u2018Detect\u2019 function enables timely discovery of cybersecurity events.<\/p>\n<p>Examples of outcome categories within this function include: Anomalies and Events; Security Continuous Monitoring; and Detection Processes.<\/p>\n<p>KARE for Security<\/p>\n<ul>\n<li>Office 365 Forwarding alerts.<\/li>\n<li>Office 365 Activity (download and deletion) alerts.<\/li>\n<li>Elevated rights alerts.<\/li>\n<li>Unusual Location alerts.<\/li>\n<li>Virus activity alerts.<\/li>\n<li>Firewall; Bot; port scan; intrusion alerts.<\/li>\n<li>Darkweb identity breach alerting.<\/li>\n<li>Backup encryption alerts.&#8221;]<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Respond<\/h3>\n<p>NIST Description Develop and implement appropriate activities to take action regarding a detected cybersecurity incident.<\/p>\n<p>The \u2018Respond\u2019 function supports the ability to contain the impact of a potential cybersecurity incident.<\/p>\n<p>Examples of outcome categories within this function include: Response Planning; Communications; Analysis; Mitigation; and Improvements.<\/p>\n<p>KARE for Security<\/p>\n<ul>\n<li>Kinetics Security Response Team and process.<\/li>\n<li>Yearly FlightPlan review.<\/li>\n<li>Quarterly review.<\/li>\n<li>Recommendations tracking; reporting and planning.<\/li>\n<\/ul>\n<h3>Recovery<\/h3>\n<p>NIST Description Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.<\/p>\n<p>The \u2018Recover\u2019 function supports timely recovery to normal operations to reduce the impact from a cybersecurity incident.<\/p>\n<p>Examples of outcome categories within this Function include: Recovery Planning; Improvements; and Communications.<\/p>\n<p>KARE for Security<\/p>\n<ul>\n<li>Office 365 Backup.<\/li>\n<li>Backup monitoring and management.<\/li>\n<li>KARE DR Offsite Recovery.<\/li>\n<li>KARE DR regular image boot test.<\/li>\n<li>KARE DR Recovery test<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aligning with NIST&#8230;..? Is your Cybersecurity protection matching best practice? Clearly the cybersecurity stakes are higher.\u00a0 The security precautions that used to be reasonable are no longer enough.\u00a0 Stakeholders expect businesses to do more \u2013 whether it\u2019s your insurer, your bank, your shareholders or your clients. The best guidance on \u201creasonable\u201d is the \u201cNIST\u201d Cybersecurity [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":4093,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<h2><b>[header2 text=\"<\/b><strong>Aligning with NIST.....?<\/strong><b><\/b><b>\" align=\"left\" color=\"#336A40\" margintop=\"\"]<\/b><\/h2>\n<h3><strong>Is your Cybersecurity protection matching best practice?<\/strong><\/h3>\nClearly the cybersecurity stakes are higher.\u00a0 <strong>The security precautions that used to be reasonable are no longer enough.<\/strong>\u00a0 Stakeholders expect businesses to do more \u2013 whether it\u2019s your insurer, your bank, your shareholders or your clients.\n\nThe best guidance on \u201creasonable\u201d is the \u201cNIST\u201d Cybersecurity Framework.\u00a0 This is also reflected in NZ in the government\u2019s CERTNZ programme.\n<h2><b>[header2 text=\"<\/b><strong>So what is NIST, and how does Kinetics help you match the standard?<\/strong><b><\/b><b>\" align=\"left\" color=\"#336A40\" margintop=\"\"]<\/b><\/h2>\nThe great news is that we\u2019ve built our KARE for Security service following this guidance.\n\nSo, what do you need to do to match \u201creasonable\u2019? Is KARE for Security enough?\n\n&nbsp;\n\nIn 2018 the US Department of Commerce, National Institute of Standards and Technology (NIST) released version 1.1 of its Cybersecurity Framework.\u00a0 The Framework was mandated by the US government to improve cybersecurity risk management in critical infrastructure.\u00a0 Because it references globally recognized standards for cyber<a href=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2020\/01\/NIST1.jpg\"><img class=\"size-full wp-image-4092 alignright\" src=\"http:\/\/kinetics.co.nz\/wp-content\/uploads\/2020\/01\/NIST1.jpg\" alt=\"\" width=\"432\" height=\"203\" \/><\/a>security, the Framework is used internationally as a guide to strengthening cybersecurity in critical infrastructure as well as other sectors and communities.\n\nThe Framework consists of five Core Functions which organise the basic cybersecurity activities at their highest levels.\n\nKinetics KARE For Security practices and features align with the five Core Functions. The list of features implemented, and the degree of their implementation, can vary from client to client depending on the client\u2019s commitment, technology and business needs.\n<h3>Identify<\/h3>\n[col size=\"7\"]\n\n[table type=\"striped\" cols=\"NIST Description\" data=\"Develop an organisational understanding to manage cybersecurity risk to systems; people; assets; data; and capabilities.\n\nThe activities in the \u2018Identify\u2019 function are foundational for effective use of the Framework.\n\nUnderstanding the business context; the resources that support critical functions; and the related cybersecurity risks enables an organisation to focus and prioritise its efforts; consistent with its risk management strategy and business needs.\n\nExamples of outcome categories within this function include: Asset Management; Business Environment; Governance; Risk Assessment; and Risk Management Strategy\"]\n\n[\/col]\n\n[col size=\"5\"]\n\n[table type=\"striped\" cols=\"KARE for Security\" data=\"A FlightPlan review covering your technology; governance, risk identification and options on how to reduce it.\n<ul>\n \t<li>Monthly reporting and quarterly review meeting including elevated rights and user account reporting<\/li>\n \t<li>Managed IT assets reporting<\/li>\n \t<li>Recommendation reporting; tracking and planning<\/li>\n \t<li>Darkweb identity breach reporting<\/li>\n<\/ul>\n&nbsp;\n<h3><\/h3>\n<h2><\/h2>\n&nbsp;\n\n\"]\n\n[\/col]\n\n[wow_clear]\n<h3>Protect<\/h3>\n[col size=\"7\"]\n\n[table type=\"striped\" cols=\"NIST Description\" data=\"Develop and implement appropriate safeguards to ensure delivery of critical services.\n\nThe \u2018Protect\u2019 function supports the ability to limit or contain the impact of a potential cybersecurity event.\n\nExamples of outcome categories within this function include:\n<ul>\n \t<li>Identity Management and Access Control;<\/li>\n \t<li>Awareness and Training; Data Security;<\/li>\n \t<li>Information Protection Processes and Procedures;<\/li>\n \t<li>Maintenance;<\/li>\n \t<li>and Protective Technology.<\/li>\n<\/ul>\n&nbsp;\n\n&nbsp;\n\n&nbsp;\n\n&nbsp;\n\n&nbsp;\n\n\"]\n\n[\/col]\n\n[col size=\"5\"]\n\n[table type=\"striped\" cols=\"KARE for Security\" data=\"Multifactor Authentication for identity management and access control.\n<ul>\n \t<li>Conditional Access.<\/li>\n \t<li>Awareness through reoccurring Phishing Testing; online Security training and Security Presentations.<\/li>\n \t<li>Microsoft and third party patching.<\/li>\n \t<li>Email record identity management.<\/li>\n \t<li>Office 365 ATP management.<\/li>\n \t<li>DNS Scrubbing.<\/li>\n \t<li>Endpoint Advanced Anti-Virus protection.<\/li>\n \t<li>Backup monitoring\/management.<\/li>\n \t<li>Office 365 Backup<\/li>\n \t<li>KARE DR Backup<\/li>\n \t<li>Firewall Packet inspection; Gateway Anti-Virus protection; ATP; Intrusion Prevention Services.<\/li>\n \t<li>Mail Scrubbing.<\/li>\n \t<li>Mobile Device Management.<\/li>\n \t<li>Kinetics Password monitoring and reporting.<\/li>\n \t<li>KARE Password Vault\"]<\/li>\n<\/ul>\n[\/col]\n\n[wow_clear]\n<h3>Detect<\/h3>\n[col size=\"7\"]\n\n[table type=\"striped\" cols=\"NIST Description\" data=\"Develop and implement appropriate activities to identify the occurrence of a cybersecurity event.\n\nThe \u2018Detect\u2019 function enables timely discovery of cybersecurity events.\n\nExamples of outcome categories within this function include: Anomalies and Events; Security Continuous Monitoring; and Detection Processes.\n\n&nbsp;\n\n\"]\n\n[\/col]\n\n[col size=\"5\"]\n\n[table type=\"striped\" cols=\"KARE for Security\" data=\"\n<ul>\n \t<li>Office 365 Forwarding alerts.<\/li>\n \t<li>Office 365 Activity (download and deletion) alerts.<\/li>\n \t<li>Elevated rights alerts.<\/li>\n \t<li>Unusual Location alerts.<\/li>\n \t<li>Virus activity alerts.<\/li>\n \t<li>Firewall; Bot; port scan; intrusion alerts.<\/li>\n \t<li>Darkweb identity breach alerting.<\/li>\n \t<li>Backup encryption alerts.\"]<\/li>\n<\/ul>\n[\/col]\n\n[wow_clear]\n\n&nbsp;\n<h3>Respond<\/h3>\n[col size=\"7\"]\n\n[table type=\"striped\" cols=\"NIST Description\" data=\"Develop and implement appropriate activities to take action regarding a detected cybersecurity incident.\n\nThe \u2018Respond\u2019 function supports the ability to contain the impact of a potential cybersecurity incident.\n\nExamples of outcome categories within this function include: Response Planning; Communications; Analysis; Mitigation; and Improvements.\n\n\"]\n\n[\/col]\n\n[col size=\"5\"]\n\n[table type=\"striped\" cols=\"KARE for Security\" data=\"\n<ul>\n \t<li>Kinetics Security Response Team and process.<\/li>\n \t<li>Yearly FlightPlan review.<\/li>\n \t<li>Quarterly review.<\/li>\n \t<li>Recommendations tracking; reporting and planning.<\/li>\n<\/ul>\n&nbsp;\n\n&nbsp;\n\n\"]\n\n[\/col]\n\n[wow_clear]\n\n&nbsp;\n<h3>Recovery<\/h3>\n[col size=\"7\"]\n\n[table type=\"striped\" cols=\"NIST Description\" data=\"Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.\n\nThe \u2018Recover\u2019 function supports timely recovery to normal operations to reduce the impact from a cybersecurity incident.\n\nExamples of outcome categories within this Function include: Recovery Planning; Improvements; and Communications.\n\n\"]\n\n[\/col]\n\n[col size=\"5\"]\n\n[table type=\"striped\" cols=\"KARE for Security\" data=\"\n<ul>\n \t<li>Office 365 Backup.<\/li>\n \t<li>Backup monitoring and management.<\/li>\n \t<li>KARE DR Offsite Recovery.<\/li>\n \t<li>KARE DR regular image boot test.<\/li>\n \t<li>KARE DR Recovery test<\/li>\n<\/ul>\n<h3><\/h3>\n\"]\n\n[\/col]\n\n[wow_clear]\n\n&nbsp;","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-4091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/4091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4091"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/4091\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}