Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • How to Leverage NIST Cybersecurity Framework for Data Integrity
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

How to Leverage NIST Cybersecurity Framework for Data Integrity

4 years ago Lane Thames
How to Leverage NIST Cybersecurity Framework for Data Integrity

Together with the National Cybersecurity Center of Excellence (NCCoE), the National Institute of Standards and Technology (NIST) has released a series of practice guides that focuses on data integrity. Data integrity is the property that records have not been altered in an unauthorized manner. Tripwire is very proud to have contributed and collaborated with other technology vendors in the development of these practice guides.

Challenges to Data Integrity

Destructive malware, ransomware, malicious insider activity, and even honest mistakes all set the stage for why organizations need to quickly detect and respond to an event that impacts data integrity. Businesses must be confident that these events are detected quickly and responded to appropriately.

Attacks against an organization’s data can impact business operations, revenue, and reputation. Examples of data integrity attacks include unauthorized insertion, deletion, or modification of data to corporate information such as emails, employee records, financial records, and customer data.

Some organizations have experienced systemic attacks that force operations to cease. While ransomware remains the most prominent attack method, other data integrity attacks may be more dynamic, targeting machines, spreading laterally across networks, and continuing to cause damage throughout an organization. These behaviors are usually targeted against multiple files at a time.  After all, for most organizations there would be little impact if a single file is held hostage. Most attackers tend to choose high impact over subtle craftiness.  This makes the events easily detectable if the correct monitoring tools are in place.

NIST Cybersecurity Framework

NIST published version 1.1 of the Cybersecurity Framework in April 2018 to provide guidance for protecting and developing resiliency for critical infrastructure and other sectors. The framework core contains five functions, outlined in a handy, easy-to-remember graphic:

  • Identify – Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities.
  • Protect – Develop and implement appropriate safeguards to ensure the delivery of critical services.
  • Detect – Develop and implement appropriate activities to identify the occurrence of a cybersecurity event.
  • Respond – Develop and implement appropriate activities to take action regarding a detected cybersecurity incident.
  • Recover – Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident

NIST SP 1800-25, Identifying and Protecting Assets Against Ransomware and Other Destructive Events

Applying the Cybersecurity Framework to data integrity, this practice guide informs organizations of how to identify and protect against a data integrity attacks, and in turn, understand how to manage data integrity risks and implement the appropriate safeguards.

The solution developed by NCCoE isolates the opportunities that would allow for cybersecurity events to occur and implements strategies to remediate those conditions. Also, the solution uses information from known cybersecurity events, and applies them to protecting IT infrastructure. To achieve this, the following core capabilities should be in place:

  • Inventory
  • Vulnerability management
  • Policy enforcement
  • Integrity monitoring
  • Logging
  • Backups
  • Secure storage
  • Network protection

Of course, it all starts with an accurate inventory of all the devices in an environment.  Following that, a vulnerability management capability facilitates scanning and revealing weaknesses across the enterprise. A good vulnerability management system delineates priority for these exposures based on severity and exploitability, and it should also log resolved vulnerabilities. The information produced by vulnerability management is used either to fix the discovered vulnerabilities or quarantine the affected system until they are fixed.

Figure 1: Identify and Protect High-Level Architecture. Source: NIST SP 1800-25

On the other hand, and in parallel with vulnerability management, integrity monitoring provides the ability to test, understand, and measure alterations that occur on files and components within the enterprise. It is important to first establish an integrity baseline for files and systems across the enterprise. A baseline of the system in its optimal state is what is used to establish any drifts from that condition. The value of integrity monitoring becomes clear both during, and after an event.

Alerts can be set to notify the security team to act when abnormal changes are detected to a file or system, such as changes made at abnormal times or by users who typically do not make changes to these assets. Furthermore, the information produced by integrity monitoring systems can be used to inform a recovery process; they provide information about what changes happened, when changes began to take place, as well as what programs were involved in the changes.

The outcomes of vulnerability management and integrity monitoring are fed into the logging capability. Logging from each enterprise component serves several functions in an architecture that aims to identify and protect assets.

NIST SP 1800-26, Detecting and Responding to Ransomware and Other Destructive Events

The NCCoE, also offers a practice guide to assist organizations about how to quickly detect and respond to data integrity attacks. This incorporates multiple systems working in concert to detect an ongoing data integrity cybersecurity event. Additionally, it provides guidance about how to respond to the detected event. Addressing these functions together enables organizations to have the necessary tools to act during a data integrity attack.

Detecting and responding to attacks against data integrity could be done when the following capabilities work together:

  • Integrity monitoring
  • Event detection
  • Vulnerability management
  • Reporting capabilities
  • Mitigation and containment

Integrity monitoring, in combination with event detection not only function as tools to inform recovery, but also act as early indicators of compromise. Event detection uses these records and its own mechanisms to actively disclose anomalous actions as they happen, and to take appropriate action through other components of the reference architecture.

Figure 2: Detect and Respond High-Level Architecture. Source: NIST SP 1800-26

Logging collects information from event detection and integrity monitoring for use in response functions. Mitigation and containment provide capabilities to stop ongoing attacks, limiting their effect on the system. Forensics/Analytics enables analysis of logs and threat behavior to aid the organization in learning from the event. Reporting provides capabilities for memorializing information for the appropriate parties both during and after an incident.

The information gained from these records can be used to inform products that fall in the Identify function of the Cybersecurity Framework to indicate vulnerabilities in the enterprise that need to be remediated.

Benefits of the Practice Guides

Prior to the practice guides, NIST had also released the NIST SP 1800-11 guide, “Recovering from Ransomware and Other Destructive Events.” These practice guides to data integrity can help your organization:

  • develop a strategy for identifying, protecting, detecting, responding, and recovering from a data integrity cybersecurity event;
  • facilitate comprehensive protection from adverse events, effective detection and response, and smoother recovery from an adverse event both to maintain operations and to ensure the integrity of data critical to supporting business operations and revenue-generating activities; and
  • manage enterprise risk.

Benefits of Tripwire Solutions

Tripwire is very proud to be part of the NCCoE project. Companies have considered Tripwire functionality a key component to successfully implementing the NIST Cybersecurity Framework because the controls found in Tripwire solutions provide support for all five functions.

The NCCoE used Tripwire IP360 to perform the vulnerability management functions. Tripwire IP360 is a vulnerability scanner and management tool, which can scan a variety of hosts for known vulnerabilities and report on the results. Furthermore, the tool can manage and assign risk levels to these vulnerabilities, allowing security teams to effectively manage vulnerabilities throughout the enterprise.

For integrity monitoring, Tripwire Enterprise was used. Tripwire Enterprise is a file integrity monitoring tool that establishes a baseline for integrity activity within the enterprise. This baseline is used in the event of an attack to detect and alert on changes within the enterprise as well as aid recovery should it be necessary.

Finally, Tripwire Log Center was used for logging purposes. Tripwire Log Center collected, transformed, and forwarded logs from Tripwire IP360 and Tripwire Enterprise.

If you want to learn more about how Tripwire solutions can help your organization implement data integrity functions, contact the experts or ask for a demo.


* The NCCoE is a public-private partnership that brings together industry organizations, government agencies and academic institutions under cooperative research and development agreements to collaborate in the creation of practical cybersecurity solutions that address the needs of specific industries as well as broad, cross-sector technology challenges. NIST does not evaluate commercial products under this project and does not endorse any product or service used.

The post ” How to Leverage NIST Cybersecurity Framework for Data Integrity” appeared first on TripWire

Source:TripWire – Lane Thames

Tags: Critical Severity, Encryption, Goverment, High Severity, Malware, Ransomware, TripWire, Vulnerability

Continue Reading

Previous Ukraine Arrests Cybercrime Group for Selling Data of 30 Million People
Next Google to Make Account Login Mandatory for New Fitbit Users in 2023

More Stories

  • Cyber Attacks
  • Data Breach

Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack

1 day ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Vulnerabilities

Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug

1 day ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Vulnerabilities

CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation

2 days ago [email protected] (The Hacker News)
  • Vulnerabilities

TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign

2 days ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks

Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files

2 days ago [email protected] (The Hacker News)

Recent Posts

  • Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack
  • Citrix NetScaler Under Active Recon for CVE-2026-3055 (CVSS 9.3) Memory Overread Bug
  • TA446 Deploys DarkSword iOS Exploit Kit in Targeted Spear-Phishing Campaign
  • CISA Adds CVE-2025-53521 to KEV After Active F5 BIG-IP APM Exploitation
  • Apple Sends Lock Screen Alerts to Outdated iPhones Over Active Web-Based Exploits

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT