Setting Up An Operational Resilience Framework

You are in charge of disaster response and recovery at your organization and you have just been hit with a wiperware attack. Your team has executed its playbook to retrieve data from your back-up files.  However, all of your organization’s systems, applications, networks, and devices are inaccessible.

You quickly realize that by following traditional disaster recovery practices you have focused almost exclusively on data recovery, with little regard for providing critical services to customers as you work to recover fully from this crisis.

This is the nightmare that many enterprises have faced when they have become victims of a destructive attack.  

Today’s cyberthreat landscape illustrates the need for enterprises to not just have back-ups of user and business data, but to also have immutable and distributed backups of applications, systems, networks, processes and other critical services to enable swift recovery of operations. It has become clear that just having good back-ups of data is an inadequate business response.   

Without the ability to quickly restore minimal viable service levels with accurate data and restoration of critical applications, networks, devices and systems architecture, organizations are at high risk of extending disruption from attacks. Executive management, shareholders, customers and then journalists will ask legitimate questions regarding how quickly minimal service levels can be restored. How have you prepared for this type of attack? 

Three years ago, Global Resilience Federation’s Business Resilience Council (BRC) launched a multi-sector working group to establish a framework to address all aspects of data, systems, and processes recovery from a destructive attack. The ORF’s multi-sector volunteer team of experts included security and resilience practitioners and consultants from many industry sectors. The working group spent over two years to develop the Operational Resilience Framework (ORF) which was then reviewed by over a hundred organization before version 1.0 was released (www.grf.org/orf). 

The ORF provides rules and implementation aids that support a company’s recovery of data, systems and processes based on establishment of minimum viable services levels and objectives for immutable backup and recovery. The ORF is a vendor agnostic solution and establishes a set of rules that are uniquely not prescriptive with a goal of reaching a goal of operational resilience for the enterprise that is consistent with existing standards.

 A summary of the path towards operational resilience identified by the ORF include:

  1. Implement an industry-recognized standard IT and cybersecurity controls framework.
  2. Understand the organization’s role in the ecosystem. 
  3. Conduct an inventory and allocate business processes, systems, and data sets into three categories- Operations Critical, Business Critical, and Business as Usual.
  4. Define your organization’s impact tolerance for disruptions to each Operations Critical service. 
  5. Preserve the Data Sets necessary to support Operations Critical and Business Critical services.
  6. Develop Operations Resilience processes to enable recovery and restoration of Operations Critical and Business Critical services within acceptable impact tolerances.
  7. Independently evaluate design and test periodically.

The ORF is designed to be broadly applicable, with downloadable documents including:  

  • Rules targeted to practitioners with information on the steps, terminology, implementation aids, and future activities.
  • A mapping of the rules to NIST and ISO controls.
  • A glossary document with defined key terms.
  • A business-oriented implementation scenario to explain use cases in the form of a plausible incident.

In the face of a destructive cyberattack or massive natural disaster, enterprises must plan to mitigate the impact based on pre-established minimal viable service levels and objectives. Don’t be unprepared.

The ORF working group is now working on various ORF implementation tools including a maturity model, training programs and operational resilience exercises for multiple sectors. Visit www.grf.org/orf to download the complimentary documents to enhance your organization’s resilience against destructive events and maintain operational continuity.  

Bill Nelson is Chair at the Global Resilience Federation

You Might Also Read:

Zero Trust: A Paradigm Shift in Cybersecurity:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Hollywood Stars Strike Over AI Human Replacements
WEBINAR | Uplevel Your Cloud Security Posture With CSPM »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

Indium Software

Indium Software

Indium Software is an Independent Software Testing Company offering software testing services (including security testing) and offshore Quality Assurance solutions.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

BPC Banking Technologies

BPC Banking Technologies

BPC’s advanced fraud prevention solution helps card issuers and acquirers combat the growing threat by monitoring 100% of transactions, online, in real-time across all channels.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

iTechArt Group

iTechArt Group

iTechArt is a top-tier custom software development company offering Cybersecurity Consulting, Application Security Testing, Risk Management and Compliance, and Infrastructure Security services.

Infinite Ranges

Infinite Ranges

Infinite Ranges delivers secure, comprehensive digital solutions by connecting experts with the best products and services for the digital age.

Secure Systems Innovation Corp (SSIC)

Secure Systems Innovation Corp (SSIC)

SSIC is a cyber risk analytics firm whose mission is to improve how businesses manage cyber risk through the power of data analytics. SSIC developed the X-Analytics cyber risk decisioning platform.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

Cyclops

Cyclops

Cyclops is the first Contextual Search Platform for cybersecurity.

Intracis

Intracis

Intracis is a 'Made in India' cyber incident management solution aimed at ‘Making Security Simple’ by simplifying cyber incident management for CERTS and CSIRTS.