Ransomware Risk Management on AWS Using the NIST Cyber Security Framework (CSF)
Publication date: August 30, 2021 (Document history)
Today, many Chief Information Security Officers (CISOs) and cybersecurity practitioners are looking for effective security controls that will provide their organizations with the ability to identify, protect, detect, respond, and recover from ransomware events. The National Institute of Standards and Technology (NIST) has published practice guides and guidance to create a standards-based risk management framework to serve this need. This paper outlines the AWS services you can use to help you achieve the prescribed security controls.
This document is intended for cybersecurity professionals, risk
management officers, or other organization-wide decision makers
considering the implementation of security controls to manage the
risks associated with ransomware and other destructive events using
the NIST cybersecurity framework in their organization. For details
on how to configure the AWS services identified in this document and
in the associated
customer
workbook
Introduction
Organizations have the responsibility to protect the data they hold and safeguard their systems. This can be challenging, as technology changes in size and complexity, and as resources and workforces become more limited. Organizations must remain vigilant, as outside parties may attempt to gain unauthorized access to sensitive data through ransomware.
Ransomware refers to a business model and a wide range of associated technologies that bad actors use to extort money. The bad actors use a range of tactics to gain unauthorized access to their victims’ data and systems, including exploiting unpatched vulnerabilities, taking advantage of weak or stolen credentials, and using social engineering. Access to the data and systems is restricted by the bad actors, and a ransom demand is made for the “safe return” of these digital assets.
There are several methods such actors use to restrict or eliminate legitimate access to resources, including encryption and deletion, modified access controls, and network-based denial of service attacks. In some cases, even after data access is restored, bad actors have demanded a “second ransom,” promising that its payment guarantees the deletion of victims’ sensitive data, instead of selling it or publicly releasing it.
Ransomware attacks are typically opportunistic in nature, targeting end users through emails, embedding malicious code within websites, or gaining access through unpatched systems. Ransomware can cost organizations a significant amount of resources in response and recovery, as well as impact their ability to operate.
To help entities establish a holistic defense, the
National
Institute of Standards and Technology
NIST subsequently published additional draft guidance and practice guides for organizations specific to ransomware.
NIST's National Cybersecurity Center of Excellence (NCCoE) has published Practice Guides to demonstrate how organizations can develop and implement security controls to combat the data integrity challenges posed by ransomware and other destructive events. These are described in:
-
NIST Special Publication (SP) 1800-11, Data Integrity: Recovering from Ransomware and Other Destructive Events
-
SP 1800-25, Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events
, -
SP 1800-26, Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events
In addition, the draft NISTIR 8374,
Cybersecurity
Framework Profile for Ransomware Risk Management
This whitepaper outlines the security controls recommended by NIST related to ransomware risk management, and maps those technical capabilities to AWS services and implementation guidance. While this whitepaper is primarily focused on managing the risks associated with ransomware, the security controls and AWS services outlined are consistent with general security best practices.
Are you Well-Architected?
The
AWS Well-Architected Framework
For more expert guidance and best practices for your cloud
architecture—reference architecture deployments, diagrams, and
whitepapers—refer to the
AWS Architecture Center