Cyberattacks can lead to a wide range of consequences. Unfortunately, it is impossible to protect an organization from absolutely all threats. However, by building results-driven cybersecurity, it's possible to strengthen the organization's cyber resilience so that even if an attacker penetrates the organization's perimeter, they cannot inflict irreparable damage or cause non-tolerable events.
The consequences of a cyberattack on a single government institution can affect not only that institution but also other organizations and the entire state. For example, the theft of personal data as a result of an attack on one government institution can lead to unauthorized access to both other governmental resources and commercial services. Additionally, the reputational damage resulting from such attacks is not limited to that government institution but extends to the entire administration; that is, if services of one government organization become unavailable due to a cyberattack, citizens will be dissatisfied with the performance of the entire government. Therefore, when building results-driven cybersecurity for government institutions, it's crucial not to limit the context to a single organization: a comprehensive approach across the entire state is crucial.
Block 1 Defining non-tolerable events and primary targets of impact on infrastructure
Defining non-tolerable events
The first step towards cyber resilience is to identify and approve a list of non-tolerable events for the organization. For example, for a court, this might include interference with court proceedings or leakage of data about judicial cases; for local authorities, it might involve the unavailability of emergency service phones for several hours and losses amounting to a significant portion of the budget. To form a complete list with specific thresholds and criteria, it is necessary to understand what constitutes truly irreparable damage for that government institution. Management is usually in a position to create such a list. Next, with the help of IT and cybersecurity experts, potential scenarios for these events and target systems should be identified.
When assessing non-tolerable events in government institutions, it is necessary to analyze additional structural factors, such as the type of consequences, the timing of their occurrence, or the dynamics of their emergence. The damage from some non-tolerable events will be fully manifested at the moment of the attack, such as interference in elections, misinformation, or false alarms.
Other types of non-tolerable events may have delayed, extended consequences; for example, stolen personal data can be used by attackers for identity theft and fraud for years to come.
Furthermore, the damage from some non-tolerable events will increase with extended service unavailability or an increase in the frequency of their occurrence. For example, prolonged unavailability of government digital service portals will lead to reduced use of government digital services, which, in turn, will increase costs for providing offline services, physical queues, and dissatisfaction — resulting in financial and reputational losses, which can be costly for the state to recover from.
Understanding non-tolerable events with delayed losses is necessary in determining measures to mitigate long-term negative impacts. Knowing what consequences may arise over the long term helps the development of various action algorithms and even legislative measures to reduce possible delayed damage. For example, if it is known that an individual's passport data has leaked, the individual can be informed and given the opportunity to block transactions, document signing, or loan applications in their name through a government service until the data is changed.
The resulting list of unacceptable events must be prioritized and the events themselves must be detailed. For example, the theft of different types of personal data can have varying significance: it's one thing when phone numbers are leaked, and quite another when biometric data is involved.
Mapping non-tolerable to the IT infrastructure
The second step involves conducting an inventory of the IT assets of government institutions to identify key systems and points of entry that are primary targets for attackers. The obtained information should be correlated with business processes to reduce the attack surface and minimize protection costs. After this, the sequence of steps can be determined, and a cybersecurity transformation program for the state can be formulated.
Block 2 Cyber transformation
Cyber transformation must be carried out comprehensively for the entire state, coordinated among all government organizations. If a vulnerability in one government institution is not addressed and this leads to consequences for citizens, it will not matter which government structure is to blame: the state as a whole will suffer the damage.
Hardening IT infrastructure
To strengthen the protection of IT infrastructure components, it is essential to ensure the secure and effective configuration of target and key systems, as well as points of entry. To do this, attention should be paid to operating systems and applications, web resources, domain infrastructure, virtualization environments, and cloud services.
Employee training
Regular training of employees and managers with knowledge assessments reduces the number of successful cyberattacks on an organization. Every government employee should understand cybersecurity issues such as strong passwords, phishing protection, software updates, information confidentiality, safe use of public wireless networks, secure channels and mobile devices.
Incident monitoring and threat response
To prevent non-tolerable events, it is necessary to create a threat response center. This could be a global center for automated collection of non-tolerable events for the state in one place. Such a center would monitor events and promptly identify and respond to suspicious activities or other deviations from the norm that could be indicators of attacks, as well as take measures to counter attackers.
Security checks
To check the effectiveness of implemented security mechanisms, a method should be chosen based on the organization's goals and level of information security maturity. The feasibility of non-tolerable events can be understood through such testing and by conducting cyberexercises.
Building processes
It is necessary to identify critical government business processes and upgrade them to improve quality, performance, and security, as well as reduce their cost. It is also crucial to properly organize work and communication between IT and cybersecurity departments.
Performance assessment
To determine the current state of security and understand whether further steps are needed, it is necessary to define metrics for results-driven cybersecurity and regularly assess performance using these metrics.
Block 3 Verifying cyber resilience
Maintaining cyber resilience
Given the constant emergence of new vulnerabilities, the development of attack techniques and tactics, and the digital transformation and expansion of IT infrastructure, it is essential to maintain the high level of cyber resilience achieved by each government organization individually and the state as a whole.
Running Bug Bounty programs
The final step in building cyber resilience processes is to run bug bounty programs for all government organizations in the country in the format of implementing non-tolerable events. Continuous and comprehensive assessment of the security of all government institutions significantly strengthens the cyber resilience of organizations and the entire country.