{"id":521323,"date":"2024-07-11T09:00:00","date_gmt":"2024-07-11T13:00:00","guid":{"rendered":"https:\/\/www.commvault.com\/?p=521323"},"modified":"2024-07-11T07:06:11","modified_gmt":"2024-07-11T11:06:11","slug":"modern-security-can-seem-like-the-cha-cha-slide","status":"publish","type":"post","link":"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide","title":{"rendered":"Shift Left? Shift Right? Modern security can seem like the Cha Cha Slide"},"content":{"rendered":"\n

Organizations worldwide have aligned their security strategies with the NIST Cyber Security Framework (CSF) because it offers a good way of breaking down the tactical needs of modern cybersecurity teams. The latest version, CSF 2.0, introduced an overarching category that had been sorely overlooked \u2013 Governance.<\/p>\n\n\n\n

The key point to note is that the CSF is not necessarily meant to be a \u201cstart here, finish there\u201d type of application. The goal is for organizations to invest in people, processes, and technology across the entire framework in a balanced way that reflects business risk.<\/p>\n\n\n\n

The areas of focus for the CSF<\/strong><\/p>\n\n\n\n

\"\"
Fig. 1: A diagram of the NIST Cyber Security Framework<\/em><\/figcaption><\/figure>\n\n\n\n

\u201cIdentify\u201d is a critical element because you can\u2019t protect it or prioritize your efforts if you don’t know what you have. What\u2019s critical? What\u2019s regulated? What\u2019s necessary for our business to function and generate revenue?<\/p>\n\n\n\n

Most teams struggle with this element, especially with the prevalence of decentralized and shadow IT. Aside from the CSF, most other cyber frameworks and regulatory guidance require identifying and inventorying systems and data as a foundational step.<\/p>\n\n\n\n

\u201cProtect\u201d is all about technologies deployed to prevent attackers from gaining access to data in the first place. This spans the gamut of tech from vulnerability scanners to identity and access management to antivirus and anti-malware.<\/p>\n\n\n\n

These tools need to be configured properly and, most importantly, deployed across every device and system across the organization. This isn\u2019t always the case. Sometimes, things are purchased on corporate P cards, not through IT. Sometimes, systems simply don\u2019t update properly and thus are running out-of-date, vulnerable software.<\/p>\n\n\n\n

\u201cDetect\u201d is about setting traps and ensuring alarms function when actions indicate something out of the ordinary. Unfortunately, many organizations have dozens of tools that generate millions of alerts to detect threat actors infiltrating their systems.<\/p>\n\n\n\n

This massive influx of alerts that may or may not be truly something awry can cause alert fatigue \u2013 spending immense amounts of time chasing down possible anomalies only to learn they were a false-positive. This also diverts attention away from other alerts, which may be real threats.<\/p>\n\n\n\n

Then we have the two Rs of the framework, \u201cRespond\u201d and \u201cRecover.\u201d These two cybersecurity areas are where your mettle is tested. Organizations will be breached. It\u2019s not a matter of \u201cif\u201d but \u201cwhen and how bad?\u201d<\/p>\n\n\n\n

To be good at \u201cRespond,\u201d teams need alignment on many fronts. Good leadership, solid strategy and tactics, great documentation and planning, and the most critical thing of all \u2013 practice.<\/p>\n\n\n\n

For incident response, you will not rise to the occasion but rather fall to the level of preparation. Without practice and testing the processes you\u2019ve built, you\u2019re being set up for potential failure, or at least more stress than needed when an actual incident occurs.<\/p>\n\n\n\n

\u201cRecover\u201d is where the rubber hits the road. Following the inevitable breach, it\u2019s the job of everyone on the security and IT teams to get the systems and environments back to good. But to do so requires you to step back and think about how to do this safely, effectively, and without recovering the bad guys and everything they\u2019ve poisoned.<\/p>\n\n\n\n

Each element must be given the same level of rigor and attention to be effective. Unfortunately, that\u2019s not always the case. Historically, organizations have focused most efforts and investments on preventing cyber incidents rather than establishing technology, processes, and strict workflows to abide by when a cyber incident occurs.<\/p>\n\n\n\n

With data spread across hybrid environments, prevention is no longer adequate. Enterprises of all sizes seek peace of mind in a chaotic hybrid world. Security leaders and CISOs must adapt their strategies to address frictionless recovery and cyber resilience, and implement practices, processes, and technology around data cleanliness and recoverability.<\/p>\n\n\n\n

Ransomware has changed the face of recovery. Due to increased cyber threats, security leaders are evaluating isolated recovery environments (IRE) to serve as clean and uninfected locations to recover to. However, with the nuanced type of attacks that occur, that IRE needs to be more than just a secure space. It is a part of the recovery process, but not all.<\/p>\n\n\n\n

Commvault\u00ae Cloud Cleanroom\u2122 Recovery is a comprehensive testing and failover offering, providing a safe, new IRE that promotes (1) testing cyber recovery plans, (2) conducting forensic analysis, and (3) business continuity in the event of a breach.<\/p>\n\n\n\n

Pivot from preventive measures and invest in response and recovery<\/strong><\/p>\n\n\n\n

Whether you look at the CSF as a list, organizations have, for better or worse, started at the top or the right. The problem lies in the sequential nature of the work. Most organizations don\u2019t get to Respond<\/em> or Recover<\/em> because they\u2019ve spent all their time and money on Protect<\/em> and Detect<\/em>.<\/p>\n\n\n\n

The fact that organizations have not spread their budget and resources over all sections of the CSF has meant that attackers still have the upper hand. When they get through your defenses and evade your detection, the typical cyber security team\u2019s incident response can do an excellent job of investigating the breach but not much in the way of recovering from it.<\/p>\n\n\n\n

You can\u2019t always rely on the IT team\u2019s backups<\/strong><\/p>\n\n\n\n

With the average dwell time of attackers in organizations standing at 204 days<\/a>, chances are that the attackers have likely found, infiltrated, and possibly poisoned your backups. This is something we\u2019ll cover in a future blog, but it\u2019s absolutely worth noting here. When dealing with breaches, not only will your production data likely be tampered with, but more threat actors are actively seeking also to take down and compromise some of the efforts you\u2019ve made to ensure that you can restore good copies of data.<\/a>\u00a0<\/p>\n\n\n\n

You can\u2019t count on just blocking an IP address<\/strong><\/p>\n\n\n\n

Many tools respond to breaches by blocking IP addresses to kick attackers out of the network. This doesn\u2019t work with the cloud anymore. They\u2019ve found or bought legitimate credentials and\/or infiltrated your identity and access management systems. So now they\u2019ve become legitimate users.<\/p>\n\n\n\n

In a word, you can\u2019t trust anything<\/strong><\/p>\n\n\n\n

In a world where the phrase zero trust<\/em> is thrown around quite a bit following a breach, there truly is and shouldn\u2019t be any trust. Data needs to be scrutinized and checked for infection. Infrastructure needs to be rebuilt to ensure that only authorized folks are inside.<\/p>\n\n\n\n

If you\u2019re looking for ways to improve your organization\u2019s cyber resilience, reach out to our sales team at Commvault for a consultation<\/a>. We\u2019ll discuss all elements that make up a good cyber recovery strategy to tailor to your business.<\/p>\n","protected":false},"excerpt":{"rendered":"

Exploring modern security strategies and the importance of balancing prevention and recovery within the NIST Cyber Security Framework.<\/p>\n","protected":false},"author":164,"featured_media":521325,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_jetpack_memberships_contains_paid_content":false,"i18n_hreflangs":"","footnotes":""},"categories":[212],"tags":[],"cmv_author":[1551],"class_list":{"0":"post-521323","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-and-compliance-2","8":"cmv_author-sam-curcuruto","9":"entry"},"yoast_head":"\nShift Left? Shift Right? Modern security can seem like the Cha Cha Slide | Blog<\/title>\n<meta name=\"description\" content=\"Exploring modern security strategies and the importance of balancing prevention and recovery within the NIST Cyber Security Framework.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shift Left? Shift Right? Modern security can seem like the Cha Cha Slide\" \/>\n<meta property=\"og:description\" content=\"Exploring modern security strategies and the importance of balancing prevention and recovery within the NIST Cyber Security Framework.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-11T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-11T11:06:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-Blog-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"rijnashpk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@commvault\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rijnashpk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Shift Left? Shift Right? Modern security can seem like the Cha Cha Slide | Blog","description":"Exploring modern security strategies and the importance of balancing prevention and recovery within the NIST Cyber Security Framework.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide","og_locale":"en_US","og_type":"article","og_title":"Shift Left? Shift Right? Modern security can seem like the Cha Cha Slide","og_description":"Exploring modern security strategies and the importance of balancing prevention and recovery within the NIST Cyber Security Framework.","og_url":"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_published_time":"2024-07-11T13:00:00+00:00","article_modified_time":"2024-07-11T11:06:11+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-Blog-1.png","type":"image\/png"}],"author":"rijnashpk","twitter_card":"summary_large_image","twitter_creator":"@commvault","twitter_site":"@commvault","twitter_misc":{"Written by":"rijnashpk","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide#article","isPartOf":{"@id":"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide"},"author":{"name":"rijnashpk","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/e8397b26dc620551baacfb35c66ec01d"},"headline":"Shift Left? Shift Right? Modern security can seem like the Cha Cha Slide","datePublished":"2024-07-11T13:00:00+00:00","dateModified":"2024-07-11T11:06:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide"},"wordCount":1117,"publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-Blog-1.png","articleSection":["Security and Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide","url":"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide","name":"Shift Left? Shift Right? Modern security can seem like the Cha Cha Slide | Blog","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-Blog-1.png","datePublished":"2024-07-11T13:00:00+00:00","dateModified":"2024-07-11T11:06:11+00:00","description":"Exploring modern security strategies and the importance of balancing prevention and recovery within the NIST Cyber Security Framework.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-Blog-1.png","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-Blog-1.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/blogs\/modern-security-can-seem-like-the-cha-cha-slide#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Shift Left? Shift Right? Modern security can seem like the Cha Cha Slide"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]},{"@type":"Person","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/e8397b26dc620551baacfb35c66ec01d","name":"rijnashpk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/37c838d5879db9a6fc3632ac17fcc4a8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37c838d5879db9a6fc3632ac17fcc4a8?s=96&d=mm&r=g","caption":"rijnashpk"}}]}},"jetpack_featured_media_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-Blog-1.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/521323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=521323"}],"version-history":[{"count":1,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/521323\/revisions"}],"predecessor-version":[{"id":521326,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/521323\/revisions\/521326"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/521325"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=521323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/categories?post=521323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/tags?post=521323"},{"taxonomy":"cmv_author","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_author?post=521323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}