Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page261/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   257   258   259   260   261   262   263   264   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 324 of 425

941. Accordingly, the CERT should identify events that serve as a signor signal of an attack (e.g. failed logins, deletion of logs, communication to unusual IP addresses etc.) that could provide contextual information about an incident, and establish processes for recording, aggregating, and making sense of such data points. The crucial point is that individual events and pieces of evidence must be meticulously recorded, and aggregated in a single place, so that responders are easily able to look at the cumulative mass of evidence to determine if an attack is taking place. This can best be accomplished by the establishment of a single, consolidated ASOC.
41.5 An Advanced Security Operation Centre or Cyber Defence
Centre should be established to improve the ability to detect and
respond to intrusions
942. The traditional prevention-dominant approach to cybersecurity, which focuses on defending the perimeter, has failed to prevent intrusions. The reality is that no network is impenetrable. Prevention is crucial – organisations cannot lose sight of it as the primary goal. However, anew proactive approach to security is needed to enhance capabilities to detect threats that will inevitably slip through the perimeter defences.
41.5.1
Importance of a proactive defence strategy
943. It is therefore critical to move to a detection-oriented strategy to defend against cyber attacks. It is not possible to control when a security incident happens, whereas it is possible to control one’s response to the incident. The strategy must be one of prioritising efforts that enhance visibility, allow early detection and enable a proactive response through monitoring, analytics and prompt detection. The best defence is a good offence – responding early and aggressively can deter attackers from penetrating further into the network and realising their ultimate objectives. Vivek gave the example of a bank that had been breached and successfully responded aggressively



Download 5.91 Mb.

Share with your friends:
1   ...   257   258   259   260   261   262   263   264   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page