Bolstering cyber defensesLessons of Estonia: Ten steps to prepare for cyberwar

Published 27 August 2007

Two months ago Estonia came under a coordinated cyber attack; experts say the attack — and Estonia’s response — tell us how IT executives can prepare for the worst

We wrote a couple of weeks ago about the organized cyber attacks by Russian nationalists (and, perhaps, elements within the Russian government) on the Baltic state of Estonia. The paralyzing atack came after Estonia offended Russian sensibilities by moving a Second World War memorial, cherished by Russians but not by Estonians, to a less central location in the state’s capital. Security experts examining the Russian attack and the Estonain response say CIOs should take steps to prepare for politically motivated network attacks. NetworkWorld summarizes their recommendations:

1. Conduct a network inventory. You need to know what is on your network and what are the key network resources you must have available at all times to keep your business running. Make sure these key resources are geographically and logically dispersed.

2. Keep your private network logically and physically separated from the public Internet. This way it can not be shut down by a denial-of-service attack. Have your network audited to ensure that you understand your dependence on the public Internet.

3. Be vigilant. You need to have an around-the-clock, seven-day-a-week operational team monitoring your networks. They need to have network cognizance. They need to know what your infrastructure is and be able to monitor it.

4. Educate your work force about IT security practices. Train and educate your work force. They need to be educated to know when something is not right, and they need to know whom to call to report it.

5. Have security policies and plans in place and test them regularly. Empower your information security officers and their teams to be able to defend your networks.

6. Know whom to call at your ISP in case of an emergency. Get in contact with your ISP’s technical staff before you have a problem. Make sure your SLA with your ISP is adequate to protect your infrastructure.

7. Have a backup plan. CIOs need a disaster recovery plan in case their Internet connectivity is affected. The plan should take into consideration long-term outages.

8. Reduce your profile. Use physical defenses such as fences and security cameras, not just cyberdefenses. Do not publicize where your corporate headquarters are located.

9. Beware of insiders. The recent car bombings in London demonstrate that terrorists will infiltrate an organization and wait several years before launching an attack. That could occur in an IT department, too. Someone could insinuate themselves into an organization over time or blackmail an employee.

10. Have an emergency response plan. If you do not have a response manual worked out and you come under attack, you are going to have a problem. You should develop the plan in conjunction with your service providers. You should also know whom to contact in law enforcement.