Site icon Snowdrop Solution

Systematically Pre-Empting Cybersecurity Threats And Damages

Systematically Pre-Empting Cybersecurity Threats And Damages
Systematically Pre-Empting Cybersecurity Threats And Damages

At BCG, we created a methodology for determining hidden cyber vulnerabilities. This cyber methodology is called STACHT (pronounced “stacked”), which stands for “system theoretic analysis of cyber hazards and threats.” When you adopt this methodology, you can identify hidden cybersecurity vulnerabilities using a six-step method. The methodology depends upon two basic principles:

  1. Hazardous versus nonhazardous states: Systems in a hazardous state can potentially be compromised. Systems in a non-hazardous state cannot be compromised. As the environment changes, systems can migrate one state to the other. The goal of STACHT analysis is to systematically determine how to keep all systems in a non-hazardous state and to preemptively detect and prevent systems from migrating to a hazardous state.

Using a model built from a hierarchy of controller-controlled process building blocks, you can uncover hidden vulnerabilities with a six-step approach:

  1. Identifying in-scope systems and their vulnerabilities: Take stock of critical assets like personally identifiable information, financial transactions, physical assets (e.g., industrial control systems, medical technology and electric grids), human capital, business operations, and intellectual property, and map these assets to their associated systems and applications — then develop a catalog of existing or potential vulnerabilities in the associated systems and applications.
  1. Control coverage: Your coverage for a system will vary from “systems are not covered by controls” at the bottom of the Y-axis to “systems are well covered by several controls” at the top of the Y-axis.

This approach is different from traditional cyber incident analysis because it prevents systems from migrating to hazardous states where they could be compromised, and because the models include, in addition to technology: people, processes, managerial policies, regulatory requirements and legislation. It allows organizations to understand causal factors leading to cyber incidents and implement effective controls to address potential vulnerabilities before they become vulnerable.

You can use this analysis to show how the interrelationships between legislation, regulation, management policies, personnel, procedures, applications, clouds, data and hardware can cause a system to degrade from a cyber-secure state to a cyber-hazardous state in which it may be compromised.

In a cyber analysis, an organization may have a policy to “never give out the SysAdmin password to a third party,” and another policy to “do whatever it takes to get a crashed business-critical system back online.” An employee might give a supplier remote access and the SysAdmin password — so that the third party can quickly repair the downed system. This moves the system from a secure state to a hazardous state, where malware on the third party’s computers could infect your systems. To mitigate issues like these, you should use STACHT to create clear priorities in policies that the cybersecurity control always takes precedence over the cyber-business policy and that the employee will never be punished for making the decision to enforce security over speed of restoration.

When you adopt STACHT, you have a systematic way to set up security requirements which prevent inside and external threats from exploiting vulnerabilities and prevent cyber incidents from occurring. Once your organization understands the relationships between all the policies, procedures and technologies, and relates them to the concepts of a cyber-secure state versus a cyber-hazardous state, you have a powerful methodology to prevent your systems — including data and cyber-physical systems — from entering a cyber-hazardous state.

originally posted on Forbes.com by Michael Coden

Exit mobile version