Page 133 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 133

Initial Access:


               1. RDP

                       a. If  possible,  replace  RDP  with  a  remote  access  solution  that  requires  two-factor
                          authentication; many VPNs now support that. This will require attackers to be verified by,
                          for example, a code sent via SMS.
                       b. If you choose to still use RDP, make sure its Windows Update is enabled and is working.

               2. Email Phishing
                       a. Educate  the  organization’s  employees  about  phishing  attacks.  Employees  should  be
                          suspicious of emails that don’t seem right and not click on suspicious links.
                       b. Install an anti-phishing solution.
               3. Software Vulnerabilities of Internet-Facing Servers

                       a. Scan  your  organization’s  IP  range  from  outside  the  network.  Verify  that  all  exposed
                          IP/ports are what you expect them to be.

                       b. Make sure that automatic security updates are enabled for your exposed services. If one
                          of your services (such as web servers, for example) does not have that feature, consider
                          changing it to a similar one that has this feature.


             Lateral Movement:


               1. Firewalls & Windows Update

                   Enable firewalls on all of your workstations and servers.
                   Make sure that Windows Update is enabled. This will ensure that your machines will be patched
                   for the latest vulnerabilities and will also be less prone to lateral movement techniques.
                   Microsoft constantly updates their security policies and their firewall rules.
                   One good example is that they disabled the remote creation of processes using the task
                   scheduler ‘at’ command.


               2. Endpoint Protection


                   Endpoint protection works. Beyond blocking classic hackers’ techniques, some also have
                   defenses against ransomware and will protect your assets from encryption.

                  3. Network Segmentation


                   Ideally, you would want to minimize the risk of your industrial network being impacted when
                   suffering a ransomware attack.


                       a. To the possible extent, separate the IT network from the OT network segment. Monitor
                          and limit the access between the segments.





                                                                                                            133
   128   129   130   131   132   133   134   135   136   137   138