• Infrastructure
    • Endpoint Security
  • Cloud
  • IoT
  • Governance
  • Incident Response
  • Identity Management
  • Applications
  • Resources
GovCyberHub | Network Security is National Security
GovCyberHub | Network Security is National Security Creating a cyber crisis management plan- 6 key priorities federal agencies should focus on
  • Home
  • About
  • Our Sponsors
  • Become a Sponsor
  • Events
  • Contact
GovCyberHub | Network Security is National Security

  • Infrastructure
    • Endpoint Security
  • Cloud
  • IoT
  • Governance
  • Incident Response
  • Identity Management
  • Applications
  • Resources
Application Security

Creating a cyber crisis management plan- 6 key priorities federal agencies should focus on

Alex Goin
February 14, 2023
0
crisis management

In today’s digital age, technology is rapidly advancing—making it easier for federal government agencies to better serve their constituents and assist their internal workforces in streamlining and facilitating agency workflows and processes.

However, these technological leaps have created a massive amount of agency data, which is unfortunately creating new attack vectors for malicious cyber actors to breach critical data and information that sit within federal networks and databases.

Since the COVID-19 pandemic shifted a majority of federal employees to remote work, agencies have adopted and implemented various kinds of cybersecurity solutions to protect their sensitive data.

To have a secure environment, agencies must think about how to detect potential cyber threats, create a plan of action to automate a response during cyber attacks, and how to go about properly and efficiently implement these security solutions so they can maximize the cyber postures of their agencies networks.

The importance of a cyber crisis management plan
When thinking about the sensitive data that’s held within federal agency databases and networks, it is important to think about the risks that are posed if that data was compromised or lost. Federal agency databases typically hold years’, and sometimes decades’, worth of sensitive data.. This can pose a huge threat to federal agencies if that data is accessed by individuals outside of the agency.

When agencies only have one form of security protection, it leaves them vulnerable  for hackers to exploit. There are various forms of cybersecurity breaches, but the most common forms include phishing, malware, password attacks, man-in-the-middle attacks, and denial-of-service attacks.

Because of the wide-ranging methods a hacker can implement to access agency data, it is crucial for agencies to develop a cyber crisis management plan. The purpose of this plan is to establish the strategic framework in order to prepare for, respond to, and begin to coordinate recovery from a cyber breach.

The most successful way to protect agency data is to look at the data and account access from both a hacker’s and agency employee’s point of view. Once the hacker accesses the accounts through phishing, for example, they then become a network user. In order to accomplish both of these points of views, agencies can perform what is called a penetration test.

A penetration test, also known as a pentest, is where an agency performs an authorized simulated cyberattack on a computer system to evaluate its cybersecurity posture. Agencies are able to check every attack path a cybercriminal may be able to exploit to gain access from within the network.

One thing to remember for any agency, however, is that effective cyber defense is a long game that requires continuous strategic investment.

Six priorities to keep agency data protected from new risks
When implementing a cyber crisis management plan, it’s important to look at the following six key factors in order to keep agency data protected from a cyber attack. These six forms of protection work together as a unified form of defense.

1.) Having a well-configured firewall

When developing a well-configured firewall, agencies must think about what programs are running, the processes that are executed within the system, and how these are communicating with the network.

When looking at a phishing attack for example, the phishing message is sent to the user’s computer and the user clicks on the message—causing this phishing attack to be executed within their system. Now there is something within the user’s system that starts to relay sensitive information back to the hacker.

In this case, the hacker can easily gain all of the user’s information with a simple click. This is why it is imperative to create access blocks to agency programs within the firewall and check that the firewall is not misconfigured.

2.) MFA and conditional access

Multi-factor authentication (MFA) is a widely used form of protection that federal agencies use to secure their data. This requires the user to have a two-step form of identification to access an account, computer, or mobile device.

The misconception with this form of user security is that MFA is a failproof way of protecting data. However, this is not the case. If a hacker has access to an agency workstation, for example, they have the ability to access password information that is either stored within the browser or the cookies within that computer—allowing them to bypass the MFA and gain access.

In order to combat this access from happening, agencies can implement conditional access policies. This allows agencies to create fine-grained controls over how MFA is applied during authentication to Microsoft services such as Microsoft 365 and Azure.

3.) Network segmentation and SMB signing

Network segmentation is a security technique that divides a network into multiple segments, also known as subnets, and each subnet acts as its own small network.

Network segmentation allows greater control over who is allowed to access certain programs, allows the user to set rules within the infrastructure to limit traffic to the network, and reduces security incidents by segmenting one network into multiple— making it harder for the hacker to access the entire network.

Creating subnets is a great form of securing data, but it unfortunately still has gaps where hackers can still find a way to access data. Network segmentation coupled with server message block signing (SMB signing) is a more successful way of providing data protection.

SMB signing is a feature within Windows that provides authentication and message integration protection for transmissions using SMB. This provides protection from man-in-the-middle and message relay attacks.

4.) Whitelisting

A whitelist is a cybersecurity strategy where the user creates a list of email addresses, IP addresses, domain names, and applications that are allowed access to the network while denying all others.

The user is able to deny and block unusual code extensions, MFA bypassing, subnet access, and much more by creating a specific list of who and what is allowed to access their network and data.

5.) Configuration Audit

Much like a pentest, a configuration audit is the process of checking every facet of the network for vulnerabilities that hackers can use to exploit and gain access to sensitive data.

When performing a configuration audit, it is important for agencies to look at it from a hacker’s viewpoint and identify where they can penetrate and access agency networks and data. Through this viewpoint, agencies should practice shortening the time a hacker is able to stay within the network.

Agencies should also access and review their old protocols and default settings within the network to see if there are any anomalies. These protocols and default settings could be years old and may be leaving a wide-open gap within the agency’s user security protection.

The more frequently an agency is able to perform audits, the better its chances are   of responding to cyber-attacks through its monitoring capability.

6.) Monitoring privileged accounts and identity misuse

When looking at service accounts or other accounts that have access to the agency’s network, it is imperative to look at what they are used for. There may be identities within the network infrastructure that have been overused or misused—leaving a window open for hackers to access that data.

Service account passwords within the network have access to accounts both online and offline. Some of these accounts are known as privileged users and have administrative access to critical information. These users sometimes have more access than an agency will realize— making it critical to know if these user accounts have been used more than they should have.

Agencies should be frequently monitoring their user account activity to make sure there are no anomalies within these accounts, and ultimately, protect themselves against any incidents that could occur from the misuse of these accounts’ credentials.

To learn more about how to protect your agency’s data by implementing a cyber crisis management plan through Quest, click HERE.

Tags Active Directory AD conditional access configuration audit CQUIRE cyber attack cybersecurity denial-of-service attack identity management identity misuse malware man-in-the-middle attack MFA Microsoft Microsoft 365 network segmentation password attack penetration testing pentest Phishing privileged account Quest Quest Software SMB signing TEC whitelisting
Alex Goin

Alex Goin is a Staff Writer for the GovCyberHub, alongside a steadily growing list of other online trade publications focused on universal communication solutions, federal government agency technology, military, and cybersecurity. When she's not writing, she spends her free time educating thousands on lizard care, hanging out with her five lizards, animating, and going to raves and EDM festivals.

Previous Article
Emerging threats against workload identities in Azure AD and what federal agencies should do about it
Next Article
How federal agencies can defend themselves against ransomware
February 14, 2023
Recent Posts
  • Why the federal government’s lagging MFA adoption rate poses severe cyber risks to agency networks

    Why the federal government’s lagging MFA adoption rate poses severe cyber risks to agency networks

    March 15, 2023
  • How cyber hackers are leveraging Group Policy infrastructures to penetrate federal networks

    How cyber hackers are leveraging Group Policy infrastructures to penetrate federal networks

    March 7, 2023
  • 4 ways agencies can protect themselves from cyber attacks in Microsoft directory services

    4 ways agencies can protect themselves from cyber attacks in Microsoft directory services

    February 27, 2023
Latest Tweets
Nextgov
Nextgov@NextgovSoldiers Can Now Steer Robot Dogs With Brain Signals buff.ly/40qedcc8 minutes ago23 March 2023
CrowdStrike
CrowdStrike@CrowdStrike.@CoreWeave needed an end-to-end security platform to protect their cloud workloads and endpoints with no impact to… twitter.com/i/web/status/1…1 hour ago23 March 2023
CrowdStrike
CrowdStrike@CrowdStrike.@CoreWeave needed an end-to-end security platform to protect their cloud workloads and endpoints with no impact to… twitter.com/i/web/status/1…1 hour ago23 March 2023
CrowdStrike
CrowdStrike@CrowdStrikeOne Team 🤝 Stronger Together. Sign up for @RSAConference to hear CrowdStrike leaders offer key insights into prot… twitter.com/i/web/status/1…2 hours ago23 March 2023
CrowdStrike
CrowdStrike@CrowdStrikeOne Team 🤝 Stronger Together. Sign up for @RSAConference to hear CrowdStrike leaders offer key insights into prot… twitter.com/i/web/status/1…2 hours ago23 March 2023
Nextgov
Nextgov@NextgovIRS Taxpayer Advocate Says Congress Shortchanged IT Modernization Efforts buff.ly/40rgm7q2 hours ago23 March 2023
CrowdStrike
CrowdStrike@CrowdStrikeLay a secure foundation for modern cloud workloads with insights from CrowdStrike and @RedHat. Watch the CrowdCas… twitter.com/i/web/status/1…3 hours ago23 March 2023
CrowdStrike
CrowdStrike@CrowdStrikeLay a secure foundation for modern cloud workloads with insights from CrowdStrike and @RedHat. Watch the CrowdCas… twitter.com/i/web/status/1…3 hours ago23 March 2023
Axonius
Axonius@AxoniusIncJoin us at Adapt 2023: a conference for federal agencies presented by Axonius on April 13 in Washington, D.C. You’l… twitter.com/i/web/status/1…3 hours ago23 March 2023
NETSCOUT
NETSCOUT@NETSCOUTFrom coffee shops to parked cars at athletic fields, today's work "offices" demand high connectivity. Overcome… twitter.com/i/web/status/1…3 hours ago23 March 2023
Nextgov
Nextgov@NextgovFTC Seeks Info on Cloud Computing Market’s Influence buff.ly/3yWZNVk4 hours ago23 March 2023
Nextgov
Nextgov@NextgovIRS Taxpayer Advocate Says Congress Shortchanged IT Modernization Efforts buff.ly/3JZhzO25 hours ago23 March 2023
Nextgov
Nextgov@NextgovSoldiers Can Now Steer Robot Dogs With Brain Signals buff.ly/3FGlYmr6 hours ago23 March 2023
CrowdStrike
CrowdStrike@CrowdStrike.@Dell’s selection of CrowdStrike underscores the importance of cybersecurity in our digital world. Today’s threat… twitter.com/i/web/status/1…6 hours ago23 March 2023
CrowdStrike
CrowdStrike@CrowdStrike.@Dell’s selection of CrowdStrike underscores the importance of cybersecurity in our digital world. Today’s threat… twitter.com/i/web/status/1…6 hours ago23 March 2023
Axonius
Axonius@AxoniusInc#Databreaches originating from #SaaSapps continue to rise. The latest: GitHub-related security incidents. Learn abo… twitter.com/i/web/status/1…7 hours ago23 March 2023
Axonius
Axonius@AxoniusIncBig news! Axonius Federal Systems is now approved for use within the U.S. Department of Defense (DoD)! Read more ab… twitter.com/i/web/status/1…7 hours ago23 March 2023
NETSCOUT
NETSCOUT@NETSCOUTDon't let DDoS attacks bring down your digital services! The key to effective protection is a combination of on-pre… twitter.com/i/web/status/1…9 hours ago23 March 2023
LogRhythm
LogRhythm@LogRhythmMalaysia announced the #BeCyberSmart cybersecurity campaign and Protect 360, an all-in-one network security solutio… twitter.com/i/web/status/1…17 hours ago23 March 2023
CrowdStrike
CrowdStrike@CrowdStrikeCrowdStrike placed furthest right in the Completeness of Vision axis in 2022 Gartner® Magic Quadrant™ for Endpoint… twitter.com/i/web/status/1…22 hours ago22 March 2023
CrowdStrike
CrowdStrike@CrowdStrikeCrowdStrike placed furthest right in the Completeness of Vision axis in 2022 Gartner® Magic Quadrant™ for Endpoint… twitter.com/i/web/status/1…22 hours ago22 March 2023
Cloudera
Cloudera@clouderaThink you know the ins and outs of the Cloudera Data Platform? Test your knowledge with the Cloudera CDP certific… twitter.com/i/web/status/1…1 day ago22 March 2023
Cloudera
Cloudera@cloudera"My very first responsibility was to oversee the COVID-19 committee at Cloudera." Kimberly Lewis said, "challenge… twitter.com/i/web/status/1…1 day ago22 March 2023
IBM
IBM@IBMRT @IBMWatson: Tasked with protecting the public water supply against the climate and population pressures of tomorrow, @MelbourneWater use…1 day ago22 March 2023
NETSCOUT
NETSCOUT@NETSCOUTWhat tools or ideology will help you detect suspicious behavior sooner? One key approach is to focus on visibility… twitter.com/i/web/status/1…1 day ago22 March 2023
Axonius
Axonius@AxoniusIncAsset inventory is fundamental to your company’s attack surface. Learn how Axonius provides a comprehensive invento… twitter.com/i/web/status/1…1 day ago22 March 2023
Cloudera
Cloudera@cloudera#ChatGPT has all the answers! Or does it? 🤔 Director of Product Marketing, Navita Sood, puts it to the test with a… twitter.com/i/web/status/1…1 day ago22 March 2023
LogRhythm
LogRhythm@LogRhythmRead this @CIOInfluence interview with #LogRhythm’s #CISO, Andrew Hollister to learn how our latest enhancements an… twitter.com/i/web/status/1…1 day ago22 March 2023
Quest
Quest@QuestThe holiest of months for the Muslim community—Ramadan has arrived.🌙During Ramadan, Muslims fast, pray, and gather… twitter.com/i/web/status/1…1 day ago22 March 2023
LogRhythm
LogRhythm@LogRhythmCouldn't make it to the live session of "In the News: Part 5"? Watch the webinar on-demand today to find out which… twitter.com/i/web/status/1…1 day ago22 March 2023
LogRhythm
LogRhythm@LogRhythm#LogRhythm appoints Mazen Adnan Dohaji to Vice President and General Manager, and Ramy Muhammad Ahmad to Principal… twitter.com/i/web/status/1…1 day ago22 March 2023
LogRhythm
LogRhythm@LogRhythmWishing you a blessed and joyous Ramadan! 🌙✨ May this holy month bring you peace, happiness, and spiritual enlighte… twitter.com/i/web/status/1…2 days ago22 March 2023
NETSCOUT
NETSCOUT@NETSCOUTBotnet proliferation is growing at an alarming rate. How do you block it? 🔎 An always-on packet-level mitigation so… twitter.com/i/web/status/1…2 days ago21 March 2023
Cloudera
Cloudera@clouderaWhat's going on at #GartnerDA? Join us live. linkedin.com/events/7043685…2 days ago21 March 2023
NETSCOUT
NETSCOUT@NETSCOUTRT @CyberSecInt: ~ Conflict Drives A Significant Increase In DDoS Attacks: Recent data analysis reveals increased DDoS attacks, combined wi…2 days ago21 March 2023
Axonius
Axonius@AxoniusIncConsidering migrating your environment to the cloud? Join Axonius and AWS Tuesday March 28th at 12 pm EST to learn… twitter.com/i/web/status/1…2 days ago21 March 2023
IBM
IBM@IBMRT @IBMResearch: We’re excited to see IBM Quantum System One up and running at its new home, @ClevelandClinic’s HQ in Cleveland, OH. Learn…2 days ago21 March 2023
IBM
IBM@IBMIBMer Jessica Scott, Global Sustainable Supply Chain Exec, is helping reimagine supply chains for a brighter future… twitter.com/i/web/status/1…2 days ago21 March 2023
Cloudera
Cloudera@clouderaRT @Philip_Russom: Interesting panel now at #GartnerDA with ex-@Gartner_inc and popular consultant @SanjMo, with folks from @cloudera. Talk…2 days ago21 March 2023
Amazon Web Services
Amazon Web Services@AWSInterested in Amazon Web Services & #CloudComputing? Follow @awscloud for updates, news, hints, info & more!3 years ago04 November 2019
Sponsored By








Powered By

Related News

MFA
Identity Management
Why the federal government’s lagging MFA adoption rate poses severe cyber risks to agency networks
group policy
Governance
How cyber hackers are leveraging Group Policy infrastructures to penetrate federal networks
Active Directory
Application Security
4 ways agencies can protect themselves from cyber attacks in Microsoft directory services


We launched GovCybersecurityHub to act as a forum and resource to those that are responsible for steadfastly protecting our government and its networks from those that would seek to attack them in cyberspace.

In this publication, we’ll highlight the new cybersecurity trends, technologies and approaches that are helping to make networks, devices and applications more secure.

Categories
  • Infrastructure
    • Endpoint Security
  • Cloud
  • IoT
  • Governance
  • Incident Response
  • Identity Management
  • Applications
  • Resources
Quick Links
  • Home
  • About
  • Events
  • Privacy Policy
  • Terms of Use
  • Home
  • About
  • Our Sponsors
  • Become a Sponsor
  • Events
  • Contact

© 2023 GovCyberHub

  • Lost Password Back ⟶
  • Login
  • Register
Lost Password?
Registration is disabled.