This post is also available in: heעברית (Hebrew)

The current battlefield encompasses growing numbers of electronic systems – microprocessors, microcontrollers, sensors, actuators, and internal and external communication networks. Hardening and securing these systems in a contested cyber environment is currently performed using checklist approaches like the Risk Management Framework (RMF). 

However, more sophisticated cyberattacks are challenging the military and industry every day, proving that defense-in-depth solutions are not enough to evade and recover from tomorrow’s adversarial attack.

We need to shift from ‘Defense-in-Depth’ strategies to incorporate ‘Resilience-in-Depth’ strategies, according to Fifthdomain.com, which offers a new cyber defense strategy that places multiple layers of security controls throughout the system, providing defensive redundancy to displace cyber-attacks.

These practices applied by BAE include five principals introducing new dimensions of design and providing a foundation for Resilience-in-Depth, offering cyber resilience instead of cyber defense:

  1. Prepare. Identify the relevant cyber threats and attack vectors, understand the consequences of a cyber-attack, and analyze the attack pathways
  2. Prevent. Harden the system environment using cybersecurity best practices
  3. Detect. Monitor the system and its operating environment for signs of intrusion
  4. Respond. Dynamically react to cyber-attacks to reduce or eliminate harmful impacts
  5. Recover. Autonomously repair damage from a cyber-attack to assure continuity of operations

Resiliency-in-depth solutions are developed through engineering processes that use dynamic architecture models

Applying offensive thinking to solve defensive problems goes beyond integrated defense-in-depth engineering processes and is the difference between cyber defended platforms, and cyber resilient platforms. 

Creating capabilities with the adversary in mind uses threat intelligence, attack-vector analysis, offensive developed architectures, and attack models that describe adversarial threats in a platform’s operational environment.

The approach includes a scale of five levels ranging from the individual microchip to the fully integrated platform vehicle. At each level, preventative defensive security controls are placed in strategic locations specifically to break attack vectors and provide a layered defense. Then, resiliency controls are added to the defensive controls to address the dynamic aspects of attack detection, response, and recovery. These actions provide a core level of layered defense and resilience at each of the five levels of scale (chip, board, assembly, bus, and platform).

Interested in learning more about cyber technologies and the defense of critical assets? Attend i-HLS’s InnoTech Expo in Tel Aviv – Israel’s largest innovation, HLS, and cyber technologies expo – on November 18-19, 2020 at Expo Tel Aviv, Pavilion 2.

For details and registration