Page 22 - Risk Management Bulletin April-June 2022
P. 22

RMAI BULLETIN APRIL - JUNE 2022


             used one-offs, or duplications. By identifying them and  systematically start to eliminate or remediate at-risk
             critically challenging which are still needed, companies  interfaces. In some cases, it may make the most sense
             can start to reduce them.                        to “cut off” the data flowing through certain interfaces,
                                                              either because it is no longer needed or is redundant.
             Creating this map isn’t easy. The scale and complexity  This essentially reduces the number of vectors that can
             of ERP systems could mean that  assessments      introduce an attack.
             themselves are time consuming, sometimes taking as
             much as two months. Companies sometimes analyze  When it comes to remediating at-risk interfaces, many
             router-network traffic to track down interfaces. One  companies are tempted to focus on those that are the
             company built a ring of firewalls around its ERP  most  complex, but they could instead consider
             landscape for the sole purpose of reading the    focusing on those interfaces that are easiest to
             messages going in and out. In this way, it was able to  remove—for example, where standard interfaces are
             gradually build a complete map of the point-to-point  available or the data is simple and doesn’t need to be
             connections between the ERP system and other parts  converted. Many ERP systems use vulnerable legacy
             of the IT domain.                                technologies such as file transfer protocol (FTP) or
                                                              clear text exchanges, which are easy to hack. Phasing
             Other companies use scanners to observe their own  out legacy technologies could allow the company to
             systems and use the results to build a map of the  make quick progress in shutting down vulnerabilities
             underlying systems. Some companies we know have  and building momentum.
             used the scans to build digital twins for process
             optimization in ERP systems and also for cybersecurity  For any remaining interfaces that are difficult to
             purposes.                                        migrate, companies could consider a thoughtful risk
                                                              assessment that accounts for how often each one is
             3. Install middleware to monitor data            used and what type of data is going through it—and
                                                              then decide whether to keep it with additional
             flows                                            monitoring or simply remove it.
             Companies could consider putting in place a service
             bus, or middleware, to reroute all the identified  5. Stop backing up ‘hacked’ systems
             interfaces to it. This step is instrumental in enabling
                                                              Most modern ransomware attacks start with encrypting
             management of data flow between the ERP system
                                                              backup data to prevent it from being restored. That
             and the legacy environment. By collecting and
                                                              means when companies run their backups, they are in
             organizing system interfaces in one place, the
                                                              effect backing up an already corrupted  system.
             middleware layer makes them easier to monitor and
                                                              Exacerbating the issue is the fact that companies often
             quickly shut off when an interface is under attack.
                                                              run instant backups, making it hard to separate
                                                              uncorrupted systems from corrupted ones.
             Rerouting each interface connection to the
             middleware can be arduous, but it’s crucial. The
                                                              An alternative approach has emerged. First, companies
             rerouting process is generally not complex, though that
                                                              should consider running backups daily or weekly. This
             depends on the kind of data passing through or what
                                                              could increase the chance to spot an attack and keep
             conversions are necessary. The complexity comes in
                                                              it from being backed up. In fact, software is available
             managing the scale of this interface-by-interface
                                                              to run ransomware-detection checks across the
             rerouting process, which may require discipline in
                                                              network on a daily basis. When the system is certified
             systematically executing, tracking, and testing each
             change.                                          as clean, it can be safely backed up. Similarly, there is
                                                              software available now to monitor backup systems as
             4. Reduce vulnerabilities and data               well for any unusual backup activity, often a sign of an
                                                              attack.
             flows where possible

             With the middleware in place, a company  could   One company stopped real-time backups. Instead, it

                                                           20
   17   18   19   20   21   22   23   24   25   26   27