U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

White Paper (Draft)

[Project Description] Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events

Date Published: November 2017
Comments Due: December 12, 2017 (public comment period is CLOSED)
Email Questions to: di-nccoe@nist.gov

Author(s)

Timothy McBride (NIST), Michael Ekstrom (MITRE), Lauren Lusty (MITRE), Julian Sexton (MITRE), Anne Townsend (MITRE)

Announcement

This objective of this project from the National Cybersecurity Center of Excellence (NCCoE) is to effectively identify assets (devices, data, and applications) that may become targets of data integrity attacks, as well as the vulnerabilities in the organization’s system that facilitate these attacks. It will also explore methods to protect these assets against data integrity attacks through the use of backups, secure storage, integrity checking mechanisms, audit logs, vulnerability management, maintenance, and other potential solutions. The project will also result in a freely available NIST Cybersecurity Practice Guide, documenting an example solution that demonstrates how to perform the following actions:

  • secure storage;
  • vulnerability management and identification;
  • log collection;
  • asset inventory; and
  • file integrity checking mechanisms.

Abstract

Keywords

data integrity; malware; ransomware; attack vector; malicious actor; data protection; asset awareness
Control Families

Contingency Planning; Audit and Accountability; Access Control; Configuration Management; Identification and Authentication; Incident Response; Maintenance; Media Protection; Physical and Environmental Protection; Program Management; Risk Assessment; Assessment, Authorization and Monitoring; System and Communications Protection; System and Information Integrity; System and Services Acquisition