You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/fundamentals/ransomware-prepare.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,37 +83,37 @@ There are a number of activities that may be undertaken to prepare for potential
83
83
84
84
### Educate end users on the dangers of ransomware
85
85
86
-
As most ransomware variants rely on end-users to install the ransomware or connect to compromised Web sites, all end users should be educated about the dangers. This would typically be part of annual security awareness training as well as ad hoc training available through the company's learning management systems. The awareness training should also extend to the company's customers via the company's portals or other appropriate channels.
86
+
As most ransomware variants rely on end-users to install the ransomware or connect to compromised Web sites, all end users should be educated about the dangers. This would typically be part of annual security awareness training as well as ad hoc training available through the company's learning management systems. The awareness training should also extend to the company's customers via the company's portals or other appropriate channels.
87
87
88
88
### Educate security operations center (SOC) analysts and others on how to respond to ransomware incidents
89
89
90
-
SOC analysts and others involved in ransomware incidents should know the fundamentals of malicious software and ransomware specifically. They should be aware of major variants/families of ransomware, along with some of their typical characteristics. Customer call center staff should also be aware of how to handle ransomware reports from the company's end users and customers.
90
+
SOC analysts and others involved in ransomware incidents should know the fundamentals of malicious software and ransomware specifically. They should be aware of major variants/families of ransomware, along with some of their typical characteristics. Customer call center staff should also be aware of how to handle ransomware reports from the company's end users and customers.
91
91
92
92
## Ensure that you have appropriate technical controls in place
93
93
94
-
There are a wide variety of technical controls that should be in place to protect, detect, and respond to ransomware incidents with a strong emphasis on prevention. At a minimum, SOC analysts should have access to the telemetry generated by antimalware systems in the company, understand what preventive measures are in place, understand the infrastructure targeted by ransomware, and be able to assist the company teams to take appropriate action.
94
+
There are a wide variety of technical controls that should be in place to protect, detect, and respond to ransomware incidents with a strong emphasis on prevention. At a minimum, SOC analysts should have access to the telemetry generated by antimalware systems in the company, understand what preventive measures are in place, understand the infrastructure targeted by ransomware, and be able to assist the company teams to take appropriate action.
95
95
96
96
This should include some or all of the following essential tools:
97
97
98
98
- Detective and preventive tools
99
99
- Enterprise server antimalware product suites (such as Microsoft Defender for Cloud)
100
100
- Network antimalware solutions (such as Azure Anti-malware)
101
101
- Security data analytics platforms (such as Azure Monitor, Sentinel)
102
-
- Next generation intrusion detection and prevention systems
102
+
- Next generation intrusion detection and prevention systems
103
103
- Next generation firewall (NGFW)
104
104
105
105
- Malware analysis and response toolkits
106
106
- Automated malware analysis systems with support for most major end-user and server operating systems in the organization
107
-
- Static and dynamic malware analysis tools
107
+
- Static and dynamic malware analysis tools
108
108
- Digital forensics software and hardware
109
109
- Non- Organizational Internet access (for example, 4G dongle)
110
110
- For maximum effectiveness, SOC analysts should have extensive access to almost all antimalware platforms through their native interfaces in addition to unified telemetry within the security data analysis platforms. The platform for Azure native Antimalware for Azure Cloud Services and Virtual Machines provides step-by-step guides on how to accomplish this.
111
111
- Enrichment and intelligence sources
112
112
- Online and offline threat and malware intelligence sources (such as sentinel, Azure Network Watcher)
113
113
- Active directory and other authentication systems (and related logs)
114
-
- Internal Configuration Management Databases (CMDBs) containing endpoint device info
114
+
- Internal Configuration Management Databases (CMDBs) containing endpoint device info
115
115
116
-
- Data protection
116
+
- Data protection
117
117
- Implement data protection to ensure rapid and reliable recovery from a ransomware attack + block some techniques.
118
118
- Designate Protected Folders – to make it more difficult for unauthorized applications to modify the data in these folders.
119
119
- Review Permissions – to reduce risk from broad access enabling ransomware
@@ -131,25 +131,25 @@ This should include some or all of the following essential tools:
131
131
132
132
## Establish an incident handling process
133
133
134
-
Ensure your organization undertakes a number of activities roughly following the incident response steps and guidance described in the US National Institute of Standards and Technology (NIST) Computer Security Incident Handling Guide (Special Publication 800-61r2) to prepare for potential ransomware incidents. These steps include:
134
+
Ensure your organization undertakes a number of activities roughly following the incident response steps and guidance described in the US National Institute of Standards and Technology (NIST) Computer Security Incident Handling Guide (Special Publication 800-61r2) to prepare for potential ransomware incidents. These steps include:
135
135
136
-
1.**Preparation**: This stage describes the various measures that should be put into place prior to an incident. This may include both technical preparations (such as the implementation of suitable security controls and other technologies) and non-technical preparations (such as the preparation of processes and procedures).
137
-
1.**Triggers / Detection**: This stage describes how this type of incident may be detected and what triggers may be available that should be used to initiate either further investigation or the declaration of an incident. These are generally separated into high-confidence and low-confidence triggers.
138
-
1.**Investigation / Analysis**: This stage describes the activities that should be undertaken to investigate and analyze available data when it isn't clear that an incident has occurred, with the goal of either confirming that an incident should be declared or concluded that an incident hasn't occurred.
139
-
1.**Incident Declaration**: This stage covers the steps that must be taken to declare an incident, typically with the raising of a ticket within the enterprise incident management (ticketing) system and directing the ticket to the appropriate personnel for further evaluation and action.
140
-
1.**Containment / Mitigation**: This stage covers the steps that may be taken either by the Security Operations Center (SOC), or by others, to contain or mitigate (stop) the incident from continuing to occur or limiting the effect of the incident using available tools, techniques, and procedures.
141
-
1.**Remediation / Recovery**: This stage covers the steps that may be taken to remediate or recover from damage that was caused by the incident before it was contained and mitigated.
142
-
1.**Post-Incident Activity**: This stage covers the activities that should be performed once the incident has been closed. This can include capturing the final narrative associated with the incident as well as identifying lessons learned.
136
+
1.**Preparation**: This stage describes the various measures that should be put into place prior to an incident. This may include both technical preparations (such as the implementation of suitable security controls and other technologies) and non-technical preparations (such as the preparation of processes and procedures).
137
+
1.**Triggers / Detection**: This stage describes how this type of incident may be detected and what triggers may be available that should be used to initiate either further investigation or the declaration of an incident. These are generally separated into high-confidence and low-confidence triggers.
138
+
1.**Investigation / Analysis**: This stage describes the activities that should be undertaken to investigate and analyze available data when it isn't clear that an incident has occurred, with the goal of either confirming that an incident should be declared or concluded that an incident hasn't occurred.
139
+
1.**Incident Declaration**: This stage covers the steps that must be taken to declare an incident, typically with the raising of a ticket within the enterprise incident management (ticketing) system and directing the ticket to the appropriate personnel for further evaluation and action.
140
+
1.**Containment / Mitigation**: This stage covers the steps that may be taken either by the Security Operations Center (SOC), or by others, to contain or mitigate (stop) the incident from continuing to occur or limiting the effect of the incident using available tools, techniques, and procedures.
141
+
1.**Remediation / Recovery**: This stage covers the steps that may be taken to remediate or recover from damage that was caused by the incident before it was contained and mitigated.
142
+
1.**Post-Incident Activity**: This stage covers the activities that should be performed once the incident has been closed. This can include capturing the final narrative associated with the incident as well as identifying lessons learned.
143
143
144
144
:::image type="content" source="./media/ransomware/ransomware-17.png" alt-text="Flowchart of an incident handling process":::
145
145
146
146
## Prepare for a quick recovery
147
147
148
-
Ensure that you have appropriate processes and procedures in place. Almost all ransomware incidents result in the need to restore compromised systems. So appropriate and tested backup and restore processes and procedures should be in place for most systems. There should also be suitable containment strategies in place with suitable procedures to stop ransomware from spreading and recovery from ransomware attacks.
148
+
Ensure that you have appropriate processes and procedures in place. Almost all ransomware incidents result in the need to restore compromised systems. So appropriate and tested backup and restore processes and procedures should be in place for most systems. There should also be suitable containment strategies in place with suitable procedures to stop ransomware from spreading and recovery from ransomware attacks.
149
149
150
-
Ensure that you have well-documented procedures for engaging any third-party support, particularly support from threat intelligence providers, antimalware solution providers and from the malware analysis provider. These contacts may be useful if the ransomware variant may have known weaknesses or decryption tools may be available.
150
+
Ensure that you have well-documented procedures for engaging any third-party support, particularly support from threat intelligence providers, antimalware solution providers and from the malware analysis provider. These contacts may be useful if the ransomware variant may have known weaknesses or decryption tools may be available.
151
151
152
-
The Azure platform provides backup and recovery options through Azure Backup as well built-in within various data services and workloads.
152
+
The Azure platform provides backup and recovery options through Azure Backup as well built-in within various data services and workloads.
153
153
154
154
Isolated backups with [Azure Backup](../../backup/backup-azure-security-feature.md#prevent-attacks)
0 commit comments