web analytics

AWS Blueprint for Ransomware Defense

Rate this post

In support of the Ransomware Task Force (RTF) initiatives and the Institute for Security and Technology (IST) Blueprint for Ransomware Defense publication, AWS developed the AWS Blueprint for Ransomware Defense to assist AWS customers in aligning with these controls. This artifact is complementary to the IST Blueprint, because we’ve aligned to the same 40 recommended controls that were carefully selected for their specific effectiveness in defending against ransomware events, as well as their ease of implementation. The AWS Blueprint for Ransomware Defense provides guidance and a mapping of AWS services and features as they align to aspects of the Center for Internet Security Critical Security Controls (CIS Controls), which provides the basis for the IST Blueprint.
Analysis by the CIS Community Defense Model found that implementing these 40 controls helped mitigate 70 percent of the techniques associated with ransomware. It should be noted that CIS has described these controls as “essential.” Implementing these controls an help IT professionals with limited cybersecurity expertise in their efforts to defend against general and non-targeted ransomware events. These 40 controls are also aligned with the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) five security functions: identify, protect, detect, respond, and recover.
Although implementing these essential security controls, which are outlined in the CIS Implementation Group 1 (IG1), may not prevent all attacks, it can help protect you from many. These controls are targeted to organizations that might have gaps in their cybersecurity knowledge. In reviewing and taking action on the guidance in this publication, your organization can help improve your resilience against ransomware.
Ransomware is a business for threat actors, who are now commonly using ransomwareas-a-service models; however, ransomware events are typically a consequence of a lack of security hygiene. More than ever, it’s become important to protect your environment from the challenges that come with non-targeted events in the form of ransomware.

Views: 3

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post