Menu

Steps for Planning for Cyber Resiliency

Prevention

1) Verify all security settings for systems – access and administration at all level, software including operating systems and applications, networks, and other management/monitoring tools. A plan for auditing and regular updating of security settings should be developed and followed.  This should be exercised according governance practices but at least monthly.

2) Tools used to detect attempts to penetrate the environment should be implemented and tested periodically. These tools continue to evolve and will require continual updating and transitioning to improved tools.

Detection

Detection of an attack in progress is done through a limited number of means:

  • – Log analysis software collects logs from software and hardware systems and performs analysis to determine if suspect activity is occurring. This software will do alerting, notification to systems/software that could be used to freeze activity, and report on detailed activity that could be used to identify the point in time of an attack.
  • – Software that interacts with data such as backup software that monitors access to the protected data and can determine if anomalous activity is occurring. The actions to be taken upon detection can vary and are usually configurable.
  • – Some storage systems that are used for data protection (backup targets) can monitor for anomalous activity, similar to backup software. These systems report on the activity and may also take action based on control settings.

Recovery

There is great variance in what the recovery processes are considering the environment – systems and software.  There are some general considerations to be undertaken but detailed understanding of recovery requires efforts with technical staff who understand the environment and the organization requirements.

1) The first step is to understand what potentially is required to be done in the case of a recovery due to a cyber-attack. The starting point for this, from an expediency standpoint, is to begin with an existing Disaster Recovery plan.  Using that will serve as an outline where the reasons for recovery with an understanding of the potential for altered/infected data and those implications can the introduced.

2) The recovery sequence from a cyber attack is what will be developed first. With the DR recovery sequence as an outline (without a DR recovery plan that includes a detailed sequence of actions, the effort becomes much greater).

    1. 1) The first consideration is to add steps to validate the information before proceeding. ‘Was the data protected (before the problem/infection occurred?’ is the first question assuming the time of the first indication of an attack is known. This is where the identification of the different recovery copies and the understanding of recovery points becomes critical and the expertise of the staff and their data protection strategy is important.  Some primary storage systems provide capabilities to make copies of data as ‘logical air gaps’ that can be used to reduce the recovery point and recovery time.  These storage systems need to be factored into the recovery strategy if they are available.
    2. 2) Dependencies such recovering identity access management credentials and authentication systems must be addressed first as these have been seen major target to compromise in attacks.
    3. 3) The sequence to recover will be very dependent on the expertise of staff, knowing the relationship of data and applications and the status of the protected copies.

3) Use of existing DR plans is an expedient outline after understanding what data could be infected/altered and the systems that could be compromised. Examination of the DR plan with a focus on where recovery changes for cyber attack would need to be made will lead first to additional investigation that may need to be done and then insertion of additional steps for this type of recovery.  Adding the steps for identification of ‘known good copy’ of data and validation of data are the first consideration.  Another is the ‘sandbox.’  Propagation of an infection/alteration during recovery is a major concern during recovery.  To address this, recovering data to a trial area, termed a ‘sandbox’ where tests can be done to prove the validity of the data recovered is an additional, time-consuming step that needs to be taken.

4) Exercising the recovery from a cyber attack must be added to the regular process for IT operations.

Author Information

Randy Kerns

Randy has written numerous industry articles and papers as an educator and presenter, and he is the author of two books: Planning a Storage Strategy and Information Archiving – Economics and Compliance. The latter is the first book of its kind to explore information archiving in depth. Randy regularly teaches classes on Information Management technologies in the U.S. and Europe.

Related Insights
CLEAR and Snappt Target Property Management’s Identity Crisis—Will It Move the Needle?
April 13, 2026

CLEAR and Snappt Target Property Management’s Identity Crisis—Will It Move the Needle?

CLEAR and Snappt integrate biometric identity verification into the Applicant Trust Platform, addressing fraud and bad debt in multifamily property management while advancing enterprise-grade security standards....
Can AI Save the Mainframe BMC Bets on Governance and Agentic AI
April 10, 2026

Can AI Save the Mainframe? BMC Bets on Governance and Agentic AI

Brad Shimmin and Mitch Ashley, Analysts at Futurum, examine BMC Software’s April 2026 AI expansion. The report details how uniting AMI with Control-M's new Agent Gateway addresses the mainframe demographic...
Anthropic Glasswing: AI Vulnerability Detection Has Crossed a Threshold
April 8, 2026

Anthropic Glasswing: AI Vulnerability Detection Has Crossed a Threshold

Analysts Mitch Ashley and Fernando Montenegro explore Anthropic's Project Glasswing. As AI vulnerability detection crosses a new threshold, the economics and speed of offensive and defensive cybersecurity are forever changed....
April 7, 2026

Secure Access Service Edge (SASE) – Futurum Signal

The Secure Access Service Edge (SASE) market is rapidly evolving as enterprises modernize their networking and security architectures to support distributed workforces, multi-cloud environments, and AI-driven operations....
RSAC 2026: The AI 'Tragedy of the Commons' and the Future of Agentic Security
April 3, 2026

RSAC 2026: The AI ‘Tragedy of the Commons’ and the Future of Agentic Security

Fernando Montenegro and Mitch Ashley, VPs and Practice Leads at Futurum, convey their observations from the RSAC 2026 Conference, with a focus on AI and agentic security....
Can UK Public Sector Security Keep Up With Its Own Digital Growth?
April 2, 2026

Can UK Public Sector Security Keep Up With Its Own Digital Growth?

The UK public sector's complex digital infrastructure has outpaced manual audits. Palo Alto Networks offers visibility to uncover critical security gaps in government and NHS environments....

Book a Demo

Newsletter Sign-up Form

Get important insights straight to your inbox, receive first looks at eBooks, exclusive event invitations, custom content, and more. We promise not to spam you or sell your name to anyone. You can always unsubscribe at any time.

All fields are required






Thank you, we received your request, a member of our team will be in contact with you.