Setting Up An Operational Resilience Framework

You are in charge of disaster response and recovery at your organization and you have just been hit with a wiperware attack. Your team has executed its playbook to retrieve data from your back-up files.  However, all of your organization’s systems, applications, networks, and devices are inaccessible.

You quickly realize that by following traditional disaster recovery practices you have focused almost exclusively on data recovery, with little regard for providing critical services to customers as you work to recover fully from this crisis.

This is the nightmare that many enterprises have faced when they have become victims of a destructive attack.  

Today’s cyberthreat landscape illustrates the need for enterprises to not just have back-ups of user and business data, but to also have immutable and distributed backups of applications, systems, networks, processes and other critical services to enable swift recovery of operations. It has become clear that just having good back-ups of data is an inadequate business response.   

Without the ability to quickly restore minimal viable service levels with accurate data and restoration of critical applications, networks, devices and systems architecture, organizations are at high risk of extending disruption from attacks. Executive management, shareholders, customers and then journalists will ask legitimate questions regarding how quickly minimal service levels can be restored. How have you prepared for this type of attack? 

Three years ago, Global Resilience Federation’s Business Resilience Council (BRC) launched a multi-sector working group to establish a framework to address all aspects of data, systems, and processes recovery from a destructive attack. The ORF’s multi-sector volunteer team of experts included security and resilience practitioners and consultants from many industry sectors. The working group spent over two years to develop the Operational Resilience Framework (ORF) which was then reviewed by over a hundred organization before version 1.0 was released (www.grf.org/orf). 

The ORF provides rules and implementation aids that support a company’s recovery of data, systems and processes based on establishment of minimum viable services levels and objectives for immutable backup and recovery. The ORF is a vendor agnostic solution and establishes a set of rules that are uniquely not prescriptive with a goal of reaching a goal of operational resilience for the enterprise that is consistent with existing standards.

 A summary of the path towards operational resilience identified by the ORF include:

  1. Implement an industry-recognized standard IT and cybersecurity controls framework.
  2. Understand the organization’s role in the ecosystem. 
  3. Conduct an inventory and allocate business processes, systems, and data sets into three categories- Operations Critical, Business Critical, and Business as Usual.
  4. Define your organization’s impact tolerance for disruptions to each Operations Critical service. 
  5. Preserve the Data Sets necessary to support Operations Critical and Business Critical services.
  6. Develop Operations Resilience processes to enable recovery and restoration of Operations Critical and Business Critical services within acceptable impact tolerances.
  7. Independently evaluate design and test periodically.

The ORF is designed to be broadly applicable, with downloadable documents including:  

  • Rules targeted to practitioners with information on the steps, terminology, implementation aids, and future activities.
  • A mapping of the rules to NIST and ISO controls.
  • A glossary document with defined key terms.
  • A business-oriented implementation scenario to explain use cases in the form of a plausible incident.

In the face of a destructive cyberattack or massive natural disaster, enterprises must plan to mitigate the impact based on pre-established minimal viable service levels and objectives. Don’t be unprepared.

The ORF working group is now working on various ORF implementation tools including a maturity model, training programs and operational resilience exercises for multiple sectors. Visit www.grf.org/orf to download the complimentary documents to enhance your organization’s resilience against destructive events and maintain operational continuity.  

Bill Nelson is Chair at the Global Resilience Federation

You Might Also Read:

Zero Trust: A Paradigm Shift in Cybersecurity:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Hollywood Stars Strike Over AI Human Replacements
WEBINAR | Uplevel Your Cloud Security Posture With CSPM »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NuHarbor Security

NuHarbor Security

NuHarbor is a leading information security consulting and advisory firm specializing in Information Security, Compliance, and Risk Management.

Orolia

Orolia

Orolia are experts in deploying high precision GPS time through network infrastructure to synchronize critical operations.

Solarflare

Solarflare

Solarflare is a leading provider of intelligent networking I/O software and hardware platforms that accelerate, monitor and secure network data.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

Verifi

Verifi

Verifi is an award-winning provider of end-to-end payment protection and risk management solutions.

Firedome

Firedome

Firedome's tailormade solution for IoT companies is designed to proactively prevent, detect, and respond to inevitable vulnerabilities in connected devices.

Eperi

Eperi

Eperi is a leading provider of Cloud Data Protection (CDP) solutions with 15 years of experience in data encryption for databases, (SaaS) applications and files.

Wynyard Group

Wynyard Group

Wynyard Group is a niche, technology-driven company specializing in Integrated Border Security solutions for enhanced public safety.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Auvik Networks

Auvik Networks

Auvik is easy-to-use cloud-based networking management and monitoring software - true network visibility and control without the hassle.

Crowe

Crowe

Crowe is a public accounting, consulting, and technology firm that combines deep industry and specialized expertise with innovation.

Sunday Cyber

Sunday Cyber

Sunday is a personal cybersecurity platform, built to protect the world’s top executive teams beyond the enterprise perimeter.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

Intuitive Research & Technology Corp

Intuitive Research & Technology Corp

Intuitive Research and Technology is an aerospace engineering and analysis firm providing services to the Department of Defense, government agencies, and commercial companies.