Join us for an insightful webinar where Ryan Winkler, 360 Advanced Practice Director, and Ryan Patrick, HITRUST Vice President of Adoption, delve into the comprehensive HITRUST approach to security, privacy, and compliance. Discover how this valuable certification is adapting to the ever-changing compliance and cybersecurity landscape, empowering organizations to stay ahead of the curve. Don’t miss this opportunity to gain a deep understanding of HITRUST’s robust framework and its impact on assurance in the industry.
If you liked this webinar, you may also be interested in:
Sep 3, 2024
September 3 , 2024
A robust security strategy is critical for organizations of all sizes. Cyber threats are becoming increasingly sophisticated, and the potential risks to businesses are more severe than ever. Developing a cybersecurity strategy isn’t just about protecting data; it’s about safeguarding the organization against evolving threats and aligning security measures with business objectives.
Organizations must focus on six essential steps to enhance their cybersecurity posture.
1. Protect your data
The first step of a cybersecurity strategy is to protect your data. Know where your data is, who has access to it, and how it is being used. Implement strong encryption protocols to ensure that sensitive information remains confidential. Regularly update and patch systems to protect against vulnerabilities that could be exploited by cybercriminals.
2. Minimize the attack surface
Reducing the attack surface means limiting the number of potential entry points an attacker could exploit. Start by auditing your network and identifying unnecessary services, applications, and systems that could pose security risks. Deactivate outdated hardware and software and ensure that all access points are monitored and controlled.
3. Complicate unauthorized access to data
Make it difficult for unauthorized individuals to access your data. Implement multi-factor authentication (MFA) to add an extra layer of security beyond just a password. Utilize role-based access controls (RBAC) to ensure that employees only have access to the data they need to perform their jobs. Regularly review and update access permissions to reflect changes in roles and responsibilities within your organization.
4. Rapidly detect, respond, and contain threats
Prepare for the possibility of a breach even if you have taken all the right preventive measures. Implement advanced threat detection tools to monitor real-time network activity. Develop an incident response plan that outlines the steps to be taken when a breach occurs, including communication protocols, roles, and responsibilities. You can minimize the impact of a breach and protect your data by acting quickly.
5. Align cybersecurity with business priorities
Understanding business priorities and integrating cybersecurity efforts with them ensures that security measures support and enhance business operations. Conduct regular risk assessments to identify potential threats that could impact business objectives and prioritize security investments accordingly. Ensure that your security strategy is effective and supports the organization’s growth.
6. Maximize operational excellence
The final step calls for a continuous commitment to improvement and adaptation. Foster a security culture within your organization, where every employee understands their role in protecting data. Conduct regular training and awareness programs. Leverage automation to enhance security operations, improve threat detection, and reduce response times.
Conclusion
These steps provide a strong starting point for developing a cybersecurity strategy, but they are just the beginning. It’s crucial to continuously enhance your approach and build a resilient cybersecurity posture.
Jason Clark, Chief Strategy Officer at Cyera, mentions these steps and provides additional insights in the podcast episode, Cybersecurity is Strategy — Not Just Settings and Systems. Listen to Trust vs. for a more in-depth discussion on integrating cybersecurity into your business strategy. It’s not just about preventing breaches; it’s about preparing for the future and positioning your organization for success in the digital world.
6 Essential Steps to Develop a Cybersecurity Strategy 6 Essential Steps to Develop a Cybersecurity Strategy
Aug 26, 2024
August 26 , 2024
T1070: Q2 Coverage Summary
Conclusion
By Brent Zelinski, Standards Senior Manager, HITRUST
Trending highlights
- Compromise Accounts (T1586)
- Indicator Removal (T1070)
New technique in MITRE ATT&CK
- Hide Infrastructure (T1665)
After analyzing second-quarter cyber threat data, we’ve put our i1 assessment controls to the test. Our i1 controls are selected to ensure coverage against tried and true and emerging cyber threats alike. The Q2 threat data and corresponding analysis confirm the relevance of previously trending threats, as well as highlighting the continuing need for baseline security controls.
Based on the top techniques and associated mitigations identified and addressed in the most recent version of the MITRE ATT&CK Framework (v15.1), the control requirements in the i1 assessment continue to address the top 20 cyber threats by volume identified during the second quarter of 2024 and address all techniques with associated MITRE mitigations including 99% of all cyber threats seen.
Q2 2024 threat data analysis details
Initial findings
HITRUST noted the following MITRE ATT&CK techniques shown below had the largest increase in occurrence during Q2 2024, compared to the same data from Q1 2024.
T1586 |
T1053 |
T1070 |
T1110 |
T1046 |
T1528 |
T1553 |
Compromise Accounts |
Scheduled Task/Job |
Indicator Removal |
Brute Force |
Network Service Discovery |
Steal Application Access Token |
Subvert Trust Controls |
i1 status evaluation
For each of the threat techniques identified above, HITRUST explored in depth the existing i1 assessment control set and found that the requirement statements currently included provided significant coverage against each of these techniques.
Overall technique coverage
T1586: Compromise Accounts
The T1586 attack technique was the top growing threat technique in Q2 of 2024.
T1586: i1 Coverage Evaluation
For the T1586: Compromise Accounts attack technique, MITRE associates a mitigation named Pre-compromise (M1056). The description of this mitigation states that “[t]his technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.” [emphasis added by HITRUST]
The following HITRUST CSF requirements contained in the i1 provide coverage for this technique.
- The organization (i) reviews the proposed content of information prior to posting on the publicly accessible information system and on a recurring bi-weekly basis to ensure non-public information is not included, and (ii) removes nonpublic information if discovered.
- Dedicated phishing awareness training is developed as part of the organization’s onboarding program, is documented and tracked, and includes the recognition and reporting of potential phishing attempts.
- The operating system has in place supporting technical controls such as antivirus, file integrity monitoring, host-based (personal) firewalls or port filtering tools, and logging as part of its baseline.
T1586: Q2 Coverage Summary
The expansive attack technique of compromising accounts will always be a popular primary step to gain a foothold in an environment. As MITRE suggests, it is nearly impossible to completely eradicate the possibility of compromised social media, email, cloud, or other account types. The above requirement statements from the HITRUST CSF framework provide sensible preventive controls to reduce attack surfaces and reduce the organization’s exposure to a potential cybersecurity incident.
T1070: Indicator Removal
The T1070 attack technique showed significant growth in Q2 of 2024.
T1070: i1 Coverage Evaluation
For the T1070: Indicator Removal attack technique, the existing coverage is currently addressed in the i1 through four HITRUST CSF requirements.
- Access to audit trails/logs is safeguarded from unauthorized access and use.
- Access control rules and rights for each user or group of users are based on clearly defined requirements for information dissemination and authorization (e.g., need-to-know, need-to-share, least privilege, security levels, and information classification). The policy further defines logical and physical access control rules and rights for each user or group of users are considered together and clearly defined in standard user access profiles (e.g., roles). The access control program takes into account the security requirements of individual business applications and business units and ensures standard user access profiles for common job roles in the organization.
- Covered and/or confidential information, at minimum, is rendered unusable, unreadable, or indecipherable anywhere it is stored, including on personal computers (laptops, desktops) portable digital media, backup media, servers, databases, or in logs. Exceptions to encryption requirements are authorized by management and documented. Encryption is implemented via one-way hashes, truncation, or strong cryptography and key-management procedures. For full-disk encryption, logical access is independent of O/S access. Decryption keys are not tied to user accounts. If encryption is not applied because it is determined to not be reasonable or appropriate, the organization documents its rationale for its decision or uses alternative compensating controls other than encryption if the method is approved and reviewed annually by the CISO.
- Access to information systems audit tools is protected to prevent any possible misuse or compromise.
T1070: Q2 Coverage Summary
When an adversary executes action against a target, it is common practice to attempt to cover their trails and remove indications of their presence. Without adequate coverage to prevent and/or detect such actions, compromised targets can remain in an environment without detection and can continue to be used by attackers.
New techniques
T1665: Hide Infrastructure
In addition to detecting ongoing and emerging trends of attacker techniques, it is also good practice to study new technique methods. In MITRE’s latest version release ATT&CK v15.1, the technique to Hide Infrastructure was added to the robust list of Enterprise Techniques. While similar methods such as the aforementioned T1070: Indicator Removal already existed for individual actions, T1665 expands on this line of malicious thinking. When utilizing this technique, adversaries manipulate network traffic in order to hide and evade detection of their command and control (C2) infrastructure. C2 infrastructure is a set of tools and protocols an attacker uses to maintain communication and manage their compromised machines. Since this infrastructure must live on the machine, common attempts to hide can include setting hostnames and domains to match the names of legitimate hostnames and/or services in the environment and using IP addresses within the victim’s correct address range as proxies or VPN to hide the true source of the attack.
While we have not yet seen significant activity with this technique since its introduction to the ATT&CK framework, it is important to stay informed and up-to-date with detection methods. This technique is also of note as it cannot easily be mitigated with mitigating controls due to its simple nature of abusing legitimate system features.
For a full breakdown of the new technique, refer to MITRE: T665: Hide Infrastructure.
Conclusion
As we continue to gather emerging cyber threat data and learn from real-world attack techniques, we will continue to update the HITRUST CSF framework and the preset controls in the i1 assessment. By committing to a dynamic and threat-adaptive control library, we can remain vigilant in a constantly evolving realm of cyber threats. This unique functionality sets the HITRUST i1 apart from other assessments.
Q2 2024 Threat-Adaptive Evaluation for the HITRUST i1 Assessment Q2 2024 Threat-Adaptive Evaluation for the HITRUST i1 Assessment
Aug 21, 2024
August 21 , 2024
AI has rapidly become a cornerstone of modern innovation, transforming industries and creating opportunities. However, these advancements can give rise to significant risks and challenges that organizations must address to ensure the safe and ethical use of AI. It is essential for organizations to establish a robust risk management program as threats evolve.
The challenge: Navigating AI risks
Organizations face a daunting task when it comes to managing AI risks. The landscape is complex with standards like ISO/IEC 23894:2023 and NIST AI Risk Management Framework (RMF) that are lengthy and difficult to harmonize. These critical standards span thousands of pages and require significant effort to understand and implement. Moreover, AI development outpaces the speed at which standards bodies adapt.
Businesses must select, implement, and maintain appropriate controls for safe AI use. They should assess their effectiveness and continuously update their risk management programs to keep pace with new developments. The stakes are high as failure can lead to regulatory challenges, legal consequences, operational disruptions, and loss of stakeholder trust.
The solution: HITRUST AI Risk Management Assessment
Recognizing these challenges, HITRUST has developed the AI Risk Management Assessment, a comprehensive solution designed to help organizations effectively manage AI risks. This first-of-its-kind assessment is tailored to meet the needs of any organization involved in the development or use of AI.
Key features
- Comprehensive control requirements: The assessment includes 51 practical and prescriptive risk management control requirements harmonized with leading standards such as ISO/IEC 23894:2023 and NIST AI RMF. It provides a unified approach that is comprehensive and easy to understand for AI governance.
- Advanced software platform: The assessment is supported by HITRUST’s MyCSF platform, a powerful SaaS-based assessment tool that simplifies the entire risk management process and enables seamless results sharing.
- Actionable reporting: The assessment generates an AI Risk Management Insights Report. The report provides detailed scoring and observations, helping organizations identify vulnerabilities and prioritize actions. The report offers demonstratable proof of the organization’s commitment to managing AI risks.
- Flexible application: The HITRUST assessment is adaptable to any organization’s needs, whether it is just starting an AI journey or is deeply involved in AI development. It can be used as a self-assessment or for independent validation through an external assessor.
- Efficiency and consistency: The HITRUST AI Risk Management Assessment follows a systematic, consistent protocol that directly maps to multiple authoritative standards. This approach ensures reliable assurance and reporting. It is designed to save time and resources, enabling organizations to focus on what matters most — innovation and growth.
Why choose HITRUST?
HITRUST provides a solution that addresses unique AI risks, while also being scalable and accessible to organizations of all sizes and across all industries with its AI Risk Management Assessment.
By choosing HITRUST, you’re not just implementing a risk management program — you’re partnering with a leader in the field who is committed to helping you navigate the complexities of AI governance with confidence.
Get in touch and secure your AI future with HITRUST.