COI Report –
Part VIIPage
250 of
425 37.1 Identify gaps in the cyber stack by mapping layers of the IT stack against existing security technologies 722. The “cyber stack is a construct that conveys the notion that IT security must bean integrated set of solutions. No fixed or universally accepted definition of the “cyber stack is available, but it can be understood as the layers of security technology that an organisation puts in place to form an integrated defence to cyber attacks,
by providing prevention, detection and response capabilities to an organisation.
52
The IT stack is a hierarchical framework for computing, where network infrastructure and endpoints
53
provide a foundation, with various layers of software and applications on top. Mapping the cyber stack, and the capability provided
by security technologies, against the IT stack, provides a framework for gaining greater visibility of the extent to which existing technologies address risks, and allows for gaps in coverage to be identified. This is illustrated in the following figure
52
The completeness of the cyber stack is necessary but not sufficient for effective defense. The organisation must have the appropriate expertise and intelligence to effectively operate the cyber stack. The term endpoint as used in this Recommendation refers to both end-user workstations and servers.
COI Report – Part VII
Page
251 of
425 Figure 14: Mapping of IT stack against cyber stack Prevention Detection Response ApplicationsEndpointsNetworkIntrusion Detection / Prevention Systems, Web Application Firewalls, Application Penetration Testing, Patch & Configuration Management Intrusion Detection / Prevention Systems, Access Log Alerts Backups and
Disaster Recovery Processes, Application Remediation Antivirus, Anti-
Malware, Host-
Based Firewalls, Application
Whitelisting, Patch
& Configuration Management Antivirus, Anti-
Malware, Advanced
Threat Protection Network, Email, Host Based Intrusion Detection, Endpoint
Detection and Response (EDR) Backups and Disaster Recovery Processes for Critical Systems, Endpoint Forensics, Endpoint Detection and Response
(EDR) Disaster Recovery Processes for Critical Networks, Network Forensics Security Information
& Event Management, Intrusion Detection / Prevention Systems,
Web Proxy,
Network Traffic Analysis, Data
Analytics, Threat Intelligence, Honeypots Firewalls, Intrusion Prevention / Detection Systems, Web Proxy, Network Traffic Analysis, Patch & Configuration Management