Sponsored By

IT Security Refresh: The Cyber Defense MatrixIT Security Refresh: The Cyber Defense Matrix

With the Cyber Defense Matrix, enterprises can measure their security coverage and discover gaps in their IT strategy.

Terry Slattery

October 1, 2019

4 Min Read
Security concept

In part one of this series, we described three foundational functions that NSA recommends to reduce cyber security attacks: Multi-Factor Authentication, Role-Based Access, and Application Whitelisting. Upon this foundation, we at NetCraftsmen recommend three additional functions: network segmentation, operating system patching, and backups, described in part two of this series.

 

The Cyber Defense Matrix

You should now be asking, “What’s next?” The answer to that question is the Cyber Defense Matrix (CDM), a security model created by Sounil Yu. He combined the NIST’s list of five operational functions with five asset classes, and then overlaid the matrix with technology that can be applied at each intersection of functions and assets (see The Cyber Defense Matrix: A Scientific Model for Cybersecurity).

Image.png

The “Dependency” section at the bottom of the grid shows the mix of people, process, and technology that are required for each of the five operational functions. Automated technology is used to a greater extent in the functions to the left, while people are more important in the functions to the right.

 

The “Identify” and “Protect” functions, colored light green on the left, are used prior to a security event and the three remaining functions, highlighted in light red, are used after a security event. So, Identify and Protect are functions that protect the IT systems from attacks, while “Detect, Respond,” and “Recover” are functions related to handling a security event that has occurred.

 

Each intersection within the matrix identifies a security mechanism that applies that column’s function to the corresponding asset of that row. The intersections that have no mechanism are blank. A mix of people, process, and technology are needed to implement each mechanism. For example, Netflow provides the “Identify” function for “Network” assets, because it identifies conversations between network endpoints. The process for using Netflow would use technology to identify network traffic flows that are of interest. Those flows would be investigated further by the security team.

 

Using the CDM

Each mechanism in the CDM can be colored to show whether it’s purchased, fully implemented, or staffed (including staff training):

  • Red: Not implemented

  • Yellow: Purchased but not implemented

  • Blue: Purchased and implemented but staffed and not fully operational

  • Green: Fully operational

The colors allow you to quickly identify holes or duplication in your security systems. Adding budget information for CapEx and OpEx spending allows you to see how your security budget is being used (see Security Budget Analysis with CDM). You may find that most of your budget is going into the “Detect” function, while “Protect” is under-supported. As with any endeavor, it’s always better and less costly to implement preventive functions than to use remedial functions.

 

Additional Steps

The CDM is a useful tool to identify mechanisms that should be on your list of next steps. Not all mechanisms have the same return on investment. For example, so-called spear-phishing campaigns are becoming more prevalent. Improving phishing awareness with simulations and education could easily be much more effective in reducing security events than spending a lot of money on detection tools.

 

At NetCraftsmen, we recommend the following CDM mechanisms for implementation on top of the foundational functions:

  • Conduct phishing awareness campaigns. Teach everyone how to recognize malware attempts and avoid clicking on joke links. Awareness campaigns can significantly reduce the number of malware intrusions. Just know that it’s unlikely to eliminate this as a source of malware. It’s just too easy to construct convincing emails that lead to clicking on a link that loads malware.

  • Use a DNS (Domain Name System) validation service. Prevent command and control connections that malware uses to contact its control systems. This is because DNS names are frequently used by malware to easily move their control infrastructure and avoid static blocking techniques.

  • Install security scanning and remediation systems. Scan end systems for malware and when found, isolate those systems until remediation can be performed. The remediation process should be as automated as possible.

Defense in Depth

Good IT security relies on defense in depth, which means that multiple systems are used to prevent, detect, and remediate attacks. The mechanisms in the CDM work together to provide comprehensive IT security measures. Ultimately, a network security strategy should be built on a solid IT foundation, and additional mechanisms can be added as needed when the budget allows.

About the Author

Terry Slattery


Terry Slattery is a Principal Architect at NetCraftsmen, an advanced network consulting firm that specializes in high-profile and challenging network consulting jobs.  Terry works on network management, SDN, network automation, business strategy consulting, and network technology legal cases. He is the founder of Netcordia, inventor of NetMRI, has been a successful technology innovator in networking during the past 20 years, and is co-inventor on two patents. He has a long history of network consulting and design work, including some of the first Cisco consulting and training. As a consultant to Cisco, he led the development of the current Cisco IOS command line interface. Prior to Netcordia, Terry founded Chesapeake Computer Consultants, a Cisco premier training and consulting partner.  Terry co-authored the successful McGraw-Hill text "Advanced IP Routing in Cisco Networks," is the second CCIE (1026) awarded, and is a regular speaker at Enterprise Connect. He blogs at nojitter.com and netcraftsmen.com.