You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/fundamentals/ransomware-prepare.md
+12-7Lines changed: 12 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: security
6
6
ms.subservice: security-fundamentals
7
7
ms.topic: article
8
8
ms.author: mbaldwin
9
-
ms.date: 06/28/2024
9
+
ms.date: 04/23/2025
10
10
---
11
11
12
12
# Prepare for a ransomware attack
@@ -38,7 +38,12 @@ Ultimately, the Framework is aimed at reducing and better managing cybersecurity
38
38
39
39
## Prioritize mitigation
40
40
41
-
Based on our experience with ransomware attacks, we find that prioritization should focus on: 1) prepare, 2) limit, 3) prevent. This may seem counterintuitive, since most people want to prevent an attack and move on. Unfortunately, we must assume breach (a key Zero Trust principle) and focus on reliably mitigating the most damage first. This prioritization is critical because of the high likelihood of a worst-case scenario with ransomware. While it's not a pleasant truth to accept, we're facing creative and motivated human attackers who are adept at finding a way to control the complex real-world environments in which we operate. Against that reality, it's important to prepare for the worst and establish frameworks to contain and prevent attackers' ability to get what they're after.
41
+
Based on our experience with ransomware attacks, we find that prioritization should focus on:
42
+
1. Prepare
43
+
1. Limit
44
+
1. Prevent
45
+
46
+
This may seem counterintuitive, since most people want to prevent an attack and move on. Unfortunately, we must assume breach (a key Zero Trust principle) and focus on reliably mitigating the most damage first. This prioritization is critical because of the high likelihood of a worst-case scenario with ransomware. While it's not a pleasant truth to accept, we're facing creative and motivated human attackers who are adept at finding a way to control the complex real-world environments in which we operate. Against that reality, it's important to prepare for the worst and establish frameworks to contain and prevent attackers' ability to get what they're after.
42
47
43
48
While these priorities should govern what to do first, we encourage organizations to run steps in parallel where possible, including pulling quick wins forward from step 1 when you can.
44
49
@@ -48,7 +53,7 @@ Prevent a ransomware attacker from entering your environment and rapidly respond
48
53
49
54
To achieve this, organizations should identify and execute quick wins to strengthen security controls to prevent entry, and rapidly detect/evict attackers while implementing a sustained program that helps them stay secure. Microsoft recommends organizations follow the principles outlined in the Zero Trust strategy [here](https://aka.ms/zerotrust). Specifically, against Ransomware, organizations should prioritize:
50
55
- Improving security hygiene by focusing efforts on attack surface reduction and threat and vulnerability management for assets in their estate.
51
-
- Implementing Protection, Detection and Response controls for their digital assets that can protect against commodity and advanced threats, provide visibility and alerting on attacker activity and respond to active threats.
56
+
- Implementing Protection, Detection and Response controls for their digital assets that can protect against commodity and advanced threats, provide visibility, and alerting on attacker activity and respond to active threats.
52
57
53
58
## Limit scope of damage
54
59
@@ -138,18 +143,18 @@ Ensure your organization undertakes a number of activities roughly following the
138
143
1.**Investigation / Analysis**: This stage describes the activities that should be undertaken to investigate and analyze available data when it isn't clear that an incident has occurred, with the goal of either confirming that an incident should be declared or concluded that an incident hasn't occurred.
139
144
1.**Incident Declaration**: This stage covers the steps that must be taken to declare an incident, typically with the raising of a ticket within the enterprise incident management (ticketing) system and directing the ticket to the appropriate personnel for further evaluation and action.
140
145
1.**Containment / Mitigation**: This stage covers the steps that may be taken either by the Security Operations Center (SOC), or by others, to contain or mitigate (stop) the incident from continuing to occur or limiting the effect of the incident using available tools, techniques, and procedures.
141
-
1.**Remediation / Recovery**: This stage covers the steps that may be taken to remediate or recover from damage that was caused by the incident before it was contained and mitigated.
142
-
1.**Post-Incident Activity**: This stage covers the activities that should be performed once the incident has been closed. This can include capturing the final narrative associated with the incident as well as identifying lessons learned.
146
+
2.**Remediation / Recovery**: This stage covers the steps that may be taken to remediate or recover from damage caused by the incident before it was contained and mitigated.
147
+
3.**Post-Incident Activity**: This stage covers the activities that should be performed once the incident is closed. This can include capturing the final narrative associated with the incident and identifying lessons learned.
143
148
144
149
:::image type="content" source="./media/ransomware/ransomware-17.png" alt-text="Flowchart of an incident handling process":::
145
150
146
151
## Prepare for a quick recovery
147
152
148
153
Ensure that you have appropriate processes and procedures in place. Almost all ransomware incidents result in the need to restore compromised systems. So appropriate and tested backup and restore processes and procedures should be in place for most systems. There should also be suitable containment strategies in place with suitable procedures to stop ransomware from spreading and recovery from ransomware attacks.
149
154
150
-
Ensure that you have well-documented procedures for engaging any third-party support, particularly support from threat intelligence providers, antimalware solution providers and from the malware analysis provider. These contacts may be useful if the ransomware variant may have known weaknesses or decryption tools may be available.
155
+
Ensure that you have well-documented procedures for engaging any third-party support, particularly support from threat intelligence providers, anti-malware solution providers and from the malware analysis provider. These contacts may be useful if the ransomware variant may have known weaknesses or decryption tools may be available.
151
156
152
-
The Azure platform provides backup and recovery options through Azure Backup as well built-in within various data services and workloads.
157
+
The Azure platform provides backup and recovery options through Azure Backup as well builtin within various data services and workloads.
153
158
154
159
Isolated backups with [Azure Backup](../../backup/backup-azure-security-feature.md#prevent-attacks)
0 commit comments