To better protect supply chains, the United States federal government is encouraging many government agencies and contractors to have cyber resiliency. The National Institute of Standards and Technology (NIST) defines cyber resiliency in its Special Publication 800-160 Volume 2 as “the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources.”
In support of NIST’s guidelines, along with requirements from the U.S. Department of Homeland Security, the U.S. Department of Defense (DoD) is requiring defense contractors to comply with its newly released Cybersecurity Maturity Model Certification (CMMC) model. In the CMMC model, only defense contractors that can meet CMMC ‘Level 5’ requirements will be able to bid on the widest range of DoD contracts.
In this white paper, Illusive Networks highlights how distributed deception technology helps organizations achieve cyber resiliency techniques for CMMC Level 5—and finding and stopping APTs.
Download this paper to learn:
- How to preempt APTs through cyber hygiene techniques specific to the identification and removal of excessive credentials and connection pathways
- How to detect and respond to APTs faster and more effectively by creating a hostile environment for attackers with the use of deceptions.
- How to map Illusive’s deception platform capabilities to DoD, NIST and DHS guidelines.