Ransomware: When Policy Matters Most

Ransomware: When Policy Matters Most

Most CISOs divide their approach to cyber defense into three pillars: people, technology, and processes. These pillars define a cybersecurity program’s defensive architecture and arsenal, available assets, and policies and procedures that together inform critical processes.

Ransomware crystalizes the value of this pillared approach, and in particular, points to the necessity for a focus on policy.

Poorly Trained People Can Create Ransomware Risks

CISOs value the people who comprise and support critical programs. Any component of a program that isn’t automated relies on personnel to develop, configure, operate, and maintain it. Any automated component achieves a state of confidence only because personnel test and confirm that steady state.

“Processes inform a cybersecurity team about how to get things done as well as indisputable clarity on the organization’s expectations.”

People form the core of every successful cybersecurity program. Quality cybersecurity professionals are hard to find and retain, and modern CISOs therefore emphasize recruiting and retention as a key objective for their cybersecurity programs.

Report Assess Your Sensitive Content Communications Privacy and Compliance Kiteworks 2022 Sensitive Content Communications Report

Technology

CISOs also value the technology that we deploy to protect and defend our organization’s assets, information, and operations. In simple terms, CISOs can’t deliver on the expectations set by organizations without technology that is current, usable, designed, and devoted to the cybersecurity mission. Technology must be properly configured and maintained, but first those technical parts and pieces must be procured—as a product or service—and deployed.

Most CISOs have a significant collection of technology with specific cybersecurity tasks: secure the organization’s network or endpoints, protect data, observe, collect, and detect potential indicators. The list of available technology is growing, and CISOs’ choices are only constrained by budgets and detailed design conflicts.

When developing their cybersecurity risk management strategy, CISOs must ensure that this list of available technologies is reflected in it.

Processes and Policy

The third pillar, processes, is the one that is typically deemphasized, or worse, sometimes entirely neglected.

Processes include how a cybersecurity organization operates, its procedures and policies, and finally standards and guidelines. Processes inform a cybersecurity team about how to get things done as well as indisputable clarity on the organization’s expectations.

“Policy, by comparison, is the place where an organization exhibits its rules for all cybersecurity engagement. Policy lies at the nexus of procedure and culture.”

To begin, processes define an organization’s behavioral expectations; not just how an organization operates, but why it operates that way. They are documented rules of behavior. Policy, by comparison, is the place where an organization exhibits its rules for all cybersecurity engagement.

Policy lies at the nexus of procedure and culture. What are an organization’s compliance considerations? What are approved behaviors for activity monitoring, log collection, and behavioral observation? What are the limits of the organization’s risk tolerance?

Most policy is established outside of the CISO’s organization. Policy—with a capital P—is owned by the broader organization and fostered by the organization’s leadership. Policy at this level can define an organization, and so it makes sense that the most senior level of an organization must approve it. Most organizations have a limited number of policies at this level, because each of them matters so much. A subset of these policies may even require approval and stewardship by an organization’s board of directors.

Webinar What Are the Key Trends and Benchmarks You Need to Know About Sensitive Content Communications

Ransomware and Its Impact on Processes and Policy

As the unprecedented risk of ransomware continues to pervade every business, CISOs have redoubled their efforts to attract and train ever more capable cybersecurity teams. They have also identified gaps in their technology set and filled in as many of those gaps as possible, to detect and react to ransomware attempts early and comprehensively.

While people and technology try to mitigate the risk or impact of ransomware, policy development or redevelopment for ransomware tends to lag. Some organizations have no particular ransomware policy at all. Others have a basic policy that may fail to serve the organization when it is pressed to make critical ransomware-related decisions.

“It’s not sufficient for most organizations to stipulate that, if confronted with a successful ransomware attack, they will or won’t pay.”

These decisions aren’t easy, and each option needs to be informed by a clear understanding of its implications. A smart organization, for example, contemplates the ransomware scenarios it may someday face, long before the first evidence of an actual attack. The organization then articulates and adopts policy that guides its response to each scenario. If organizations haven’t done so already, they should develop or redevelop ransomware policy right now.

Ransomware scenarios appear, on the surface, fairly binary: pay or don’t pay.

It’s not sufficient for most organizations to stipulate that, if confronted with a successful ransomware attack, they will or won’t pay. While some organizations may have a blanket “never pay” policy, there are still details or conditions they should consider: the size of the ransomware demand, the organization’s ability to respond with mitigations, recalls, and restores, and the organization’s culture and mission. More on this in a moment.

By contrast, for an organization to adopt an “always pay” policy in all ransomware cases, it must assume worst-case scenarios in which the ransom demand may exceed the organization’s ability to pay. More reasonably, an organization’s policy to pay would need to be capped at some amount so that the organization could actually afford to pay. Otherwise, you have an untenable policy.

An organization with an “always pay” policy arguably doesn’t have much confidence in its organization’s—or its CISO’s—ability to weather a successful ransomware attack. Could an organization recall and restore all its data and systems? Are there viable, tested backups that could serve as trustworthy replicas of the production environment? Are the backup, recall, and restore processes themselves reliable?

An organization that has an “always pay” policy doesn’t have much faith in its ability to withstand the storm. If it had any faith, then its policy wouldn’t be to always pay, but instead to pay in certain conditions and not to pay in other conditions.

The reliability of the ransomware attackers and the financial structure behind them matters, too. Would an “always pay” policy make sense if cryptocurrency intermediaries assess the attackers are unreliable and that, even if they get paid, they may not release some or any of the ransomed assets?

What if the criminal was simply inept, very good at encrypting things, but not very good at decrypting them? What would an organization do if it paid the ransom but was unable to get whole after? That is a bridge no organization wants to cross.

“An organization with an ‘always pay’ policy arguably doesn’t have much confidence in its organization’s—or its CISO’s—ability to weather a successful ransomware attack.”

More recently, we’ve seen a hybrid kind of ransomware attack, which combines asset encryption (data and systems) and possible data exfiltration (a copy of the organization’s data has been stolen). An organization’s ransomware policy becomes much more complicated in this scenario.

Would it be okay to “always pay” to receive a decryption key for an organization’s data even if a copy of that data was already available on the dark web?

An alternative to an “always pay” policy is a “never pay” policy. Such a policy can be equally challenging to abide. There are well-publicized examples of ransomware victims that flatly refused to pay a ransom under any conditions.

Such a policy position places enormous faith in an organization’s ability to restore to a workable production state in all cases; that is, regardless of what data and systems have been encrypted, what operations have been disrupted, or what degree of impact severity the organization experiences, it will not pay any amount to recover, but instead, will in all cases rely on its backup/recall/restore processes to get whole.

While a “never pay” policy may align with an organization’s culture, the inherent pain caused by unknowns in the recovery process likely can’t be calculated in advance. Thus, an organization with a “never pay” policy says that, regardless of surprises in backup processes, regardless of failures in recalls and restores, regardless of any eventuality other than success, the organization is willing to accept every potential outcome.

A “never pay” policy also assumes that an organization is prepared to weather a different kind of storm—potentially of its own making. Processes don’t always work as expected, technology fails more often than any of us plan for, and people under stress sometimes make mistakes. Establishing a “never pay” policy means that an organization is willing to accept surprises, detours, and failures of every kind along the way to a state of recovery that may not satisfy the organization’s needs.

There are happy mediums, of course, including policies that are neither so loose that they are unworkable nor so tight as to restrict granular considerations for “what-ifs.” An organization may decide to pay up to a specific, previously defined amount, or it may decide to never pay unless the potential impact, as projected or calculated, is more than an organization can reasonably bear.

“A ‘never pay’ policy also assumes that an organization is prepared to weather a different kind of storm—potentially of its own making.”

The critical path for an organization’s ransomware policy discussion runs right through the boardroom. No two organizations are the same, and generic policy should be filtered out early in that discussion. Every organization should decide what matters most, appreciating that often organizational imperatives conflict with organizational culture.

It’s crucial that every organization establish and understand its position on ransomware. It is equally critical that organizations establish and understand this position before an attack, not in the heat of a fire but before the flame starts.

Additional Resources

 

Get started.

It’s easy to start ensuring regulatory compliance and effectively managing risk with Kiteworks. Join the thousands of organizations who feel confident in their content communications platform today. Select an option below.

Lancez-vous.

Avec Kiteworks, se mettre en conformité règlementaire et bien gérer les risques devient un jeu d’enfant. Rejoignez dès maintenant les milliers de professionnels qui ont confiance en leur plateforme de communication de contenu. Cliquez sur une des options ci-dessous.

Jetzt loslegen.

Mit Kiteworks ist es einfach, die Einhaltung von Vorschriften zu gewährleisten und Risiken effektiv zu managen. Schließen Sie sich den Tausenden von Unternehmen an, die sich schon heute auf ihre Content-Kommunikationsplattform verlassen können. Wählen Sie unten eine Option.

Comienza ahora.

Es fácil empezar a asegurar el cumplimiento normativo y gestionar los riesgos de manera efectiva con Kiteworks. Únete a las miles de organizaciones que confían en su plataforma de comunicación de contenidos hoy mismo. Selecciona una opción a continuación.

Table of Content
Share
Tweet
Share
Explore Kiteworks