U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Project Description (Initial Public Draft)

Data Integrity: Identifying and Protecting Assets Against Ransomware and Other Destructive Events

Date Published: November 2017
Comments Due: December 12, 2017 (public comment period is CLOSED)
Email Questions to: di-nccoe@nist.gov

Author(s)

Timothy McBride (NIST), Michael Ekstrom (MITRE), Lauren Lusty (MITRE), Julian Sexton (MITRE), Anne Townsend (MITRE)

Announcement

This objective of this project from the National Cybersecurity Center of Excellence (NCCoE) is to effectively identify assets (devices, data, and applications) that may become targets of data integrity attacks, as well as the vulnerabilities in the organization’s system that facilitate these attacks. It will also explore methods to protect these assets against data integrity attacks through the use of backups, secure storage, integrity checking mechanisms, audit logs, vulnerability management, maintenance, and other potential solutions. The project will also result in a freely available NIST Cybersecurity Practice Guide, documenting an example solution that demonstrates how to perform the following actions:

  • secure storage;
  • vulnerability management and identification;
  • log collection;
  • asset inventory; and
  • file integrity checking mechanisms.

Abstract

Keywords

data integrity; malware; ransomware; attack vector; malicious actor; data protection; asset awareness
Control Families

Access Control; Audit and Accountability; Assessment, Authorization and Monitoring; Configuration Management; Contingency Planning; Identification and Authentication; Incident Response; Maintenance; Media Protection; Physical and Environmental Protection; Program Management; Risk Assessment; System and Services Acquisition; System and Communications Protection; System and Information Integrity