Mar 8, 2021

What we can Learn from SolarWind Incident?

Lesson learned from SolarWind incident:

  1. Your risk boundary is not your network boundary.
  2. An attack timeline, from start till release date, can take almost 19 months.
  3. Identity is the new "perimeter".
  4. Behavioral analysis techniques are required to identify an identity compromise.
  5. Network baselining and abnormal behavior analytics are instructive.
  6. Think if you built software using third party library.
  7. Think if you are using products/services from any compromised parties, including open source software. 
  8. Think who you trust and when did you last validate?
  9. Build capability to detects TTP, not IOC.
  10. CTI likes to use different code name to identify malware.