Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events

Download the Practice Guide

The NCCoE recently released a draft of NIST Cybersecurity Practice Guide SP 1800-25, Identifying and Protecting Assets Against Ransomware and Other Destructive Events. Use the button below to view this publication in its entirety or scroll down for links to a specific section.

Download PDF »

Current Status

The National Cybersecurity Center of Excellence (NCCoE) recently released a draft of National Institute of Standards and Technology (NIST) Cybersecurity Special Publication 1800-25, Identifying and Protecting Assets Against Ransomware and Other Destructive Events. The public comment period closed on March 20, 2020, and the received comments are now being reviewed.

This practice guide can benefit executives, chief Information security officers, system administrators, or those who have a stake in protecting their organizations' data, privacy, and overall operational security.

The NCCoE released the full draft which comprises the following volumes:

  • SP 1800-25A: Executive Summary (PDF)
  • SP 1800-25B: Approach, Architecture, and Security Characteristics (PDF)
  • SP 1800-25C: How-To-Guides (PDF)

Or download the complete guide (PDF).

Summary

The National Cybersecurity Center of Excellence (NCCoE) at NIST proposed a project that could help organizations identify and protect their assets from data integrity attacks across multiple industries. This project includes the development of a reference design and uses commercially available technologies to develop an example solution that will help various organizations implement stronger security controls.

Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to an organization’s infrastructure. Database records, system files, configurations, user files, applications, and customer data are all at risk should an attack occur. 

Organizations that do not implement identification and protection solutions leave themselves at risk for many types of data integrity attacks. These risks could be reduced using capabilities such as:

  • secure storage
  • backup capabilities for databases, VMs, and file systems
  • log collection
  • asset inventory
  • file integrity checking mechanisms

This project focuses on methods to effectively identify assets that may become targets of data integrity attacks. It also explores methods to protect these assets against data integrity attacks through the use of audit logs, vulnerability management, maintenance, and other potential solutions. 

Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

Cisco
CryptoniteNXT
GreenTec USA logo
Micro Focus logo
Semperis
Tripwire logo