Table of contents exchange of letters with the minister executive summary


RECOMMENDATION #2: THE CYBER STACK MUST BE REVIEWED



Download 5.91 Mb.
View original pdf
Page179/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   175   176   177   178   179   180   181   182   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019
37
RECOMMENDATION #2: THE CYBER STACK MUST BE REVIEWED
TO ASSESS IF IT IS ADEQUATE TO DEFEND AND RESPOND TO
ADVANCED THREATS ......................................................................................... 249
37.1
Identify gaps in the cyber stack by mapping layers of the IT stack against existing security technologies ...................................................................... 250



COI Report – Part VII
Page 214 of 425

37.2
Gaps in response technologies must be filled by acquiring endpoint and network forensics capabilities ...................................................................... 252
37.2.1
Endpoint forensics .......................................................................................... 252
37.2.2
Network forensics ........................................................................................... 254 Effectiveness of current endpoint security measures must be reviewed to fill gaps exploited by the attacker ...................................................................... 255
37.3.1
Detection ......................................................................................................... 258
37.3.2
Response ......................................................................................................... 259 Network security must be enhanced to disrupt the Command and Control and Actions on Objective phases of the Cyber Kill Chain ........................ 260
37.4.1
A solution must be put in place to better detect and block malicious outgoing
traffic .............................................................................................................. 262
37.4.2
Modifications to network architecture and/or monitoring of east-west traffic
within the network must be undertaken to limit the ability of attackers to move
laterally within a network ............................................................................... 264 Application security for email must be heightened as it is the most common attack vector for cyber attacks ..................................................................... 267

Download 5.91 Mb.

Share with your friends:
1   ...   175   176   177   178   179   180   181   182   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page