Announcing the AWS Blueprint for Ransomware Defense

The AWS Blueprint for Ransomware Defense, a new resource that business and public sector organizations can use to put preventative measures in place to protect data from ransom malware events, is introduced by Amazon Web Services( AWS ) in this post. AWS services and features are mapped to various components of the Center for Internet Security ( CIS ) Critical Security Controls, or” CIS ,” in the” AWS Blueprint for Ransomware Defense.” Customers may evaluate and guard their data from trojan events using this information.

 <p>The following is background on ransomware, CIS, and the initiatives that led to the publication of this new blueprint.</p> <h2>The Ransomware Task Force</h2> <p>In April of 2021, the U.S. government launched the <a href="https://securityandtechnology.org/ransomwaretaskforce/" target="_blank" rel="noopener">Ransomware Task Force (RTF)</a>, which has the mission of uniting key stakeholders across industry, government, and civil society to create new solutions, break down silos, and find effective new methods of countering the ransomware threat. The RTF has since launched several progress reports with specific recommendations, including the development of the RTF <a href="https://www.cisecurity.org/about-us/media/press-release/ransomware-task-force-releases-blueprint-for-ransomware-defense" target="_blank" rel="noopener">Blueprint for Ransomware Defense</a>, which provides a framework with practical steps to mitigate, respond to, and recover from ransomware. AWS is a member of the RTF, and we have taken action to create our own AWS Blueprint for Ransomware Defense that maps actionable and foundational security controls to AWS services and features that customers can use to implement those controls. The AWS Blueprint for Ransomware Defense is based on the CIS Controls framework.</p> <h2>Center for Internet Security</h2> <p>The <a href="https://www.cisecurity.org/about-us" target="_blank" rel="noopener">Center for Internet Security (CIS)</a> is a community-driven nonprofit, globally recognized for establishing best practices for securing IT systems and data. To help establish foundational defense mechanisms, a subset of the <a href="https://www.cisecurity.org/controls/v8" target="_blank" rel="noopener">CIS Critical Security Controls (CIS Controls)</a> have been identified as important first steps in the implementation of a robust program to prevent, respond to, and recover from ransomware events. This list of controls was established to provide safeguards against the most impactful and well-known internet security issues. The controls have been further prioritized into three implementation groups (IGs), to help guide their implementation. IG1, considered “essential cyber hygiene,” provides foundational safeguards. IG2 builds on IG1 by including the controls in IG1 plus a number of additional considerations. Finally, IG3 includes the controls in IG1 and IG2, with an additional layer of controls that protect against more sophisticated security issues.</p> <p>CIS recommends that organizations use the CIS IG1 controls as basic preventative steps against ransomware events. We’ve produced a mapping of AWS services that can help you implement aspects of these controls in your AWS environment. Ransomware is a complex event, and the best course of action to mitigate risk is to apply a thoughtful strategy of defense in depth. The mitigations and controls outlined in this mapping document are general security best practices, but are a non-exhaustive list.</p> <p>Because data is often vital to the operation of mission-critical services, ransomware can severely disrupt business processes and applications that depend on this data. For this reason, many organizations are looking for effective security controls that will improve their security posture against these types of events. We hope you find the information in the AWS Blueprint for Ransomware Defense helpful and incorporate it as a tool to provide additional layers of security to help keep your data safe.</p> <p>Let us know if you have any feedback through the <a href="https://pages.awscloud.com/security-contact-us.html" target="_blank" rel="noopener">AWS Security Contact Us</a> page. Please reach out if there is anything we can do to add to the usefulness of the blueprint or if you have any additional questions on security and compliance. You can find more information from the IST (Institute for Security and Technology) describing ransomware and how to protect yourself on the <a href="https://securityandtechnology.org/ransomwaretaskforce/blueprint-for-ransomware-defense/" target="_blank" rel="noopener">IST website</a>.</p> <p>If you have feedback about this post, submit comments in the<strong> Comments</strong> section below. If you have questions about this post, <a href="https://console.aws.amazon.com/support/home" target="_blank" rel="noopener noreferrer">contact AWS Support</a>.</p> <p><strong>Want more AWS Security news? Follow us on <a title="Twitter" href="https://twitter.com/AWSsecurityinfo" target="_blank" rel="noopener noreferrer">Twitter</a>.</strong></p> <!-- '"` --> 
%d bloggers like this: