4
VIPDDR CYBERSECURITY FRAMEWORK SMSAM SYSTEMS LTD is a disruptive PAN African advanced cybersecurity services firm- with a mission to securing Africa's digital assets and critical infrastructures organizations, against ALL of form of cyber-attacks. Headquartered in Nigeria and with presence across many African countries, we deliver on our mission by leveraging the VIPDDR CyberSecurity Framework developed by us. The motivation behind the framework is to have a practical and realistic cybersecurity program with proven security rather than vaguely assuming same. The ultimate mission of the framework is to STOP BREACHES as we leverage of automated, best-in class, AI /ML powered technologies to DISRUPTS, FRUSTRATES and SLOW DOWN the adversaries (External and Internal). CATEGORIES OF ORGANIZATIONS SERVICED 1 - Telecoms and ISP Organizations. We focus on helping MNOs and Internet service providers in preventing and mitigating the exploitation of inherent security flaws found in the SS7/Diameter signaling protocols. We also offer services around the security of subscribers cellular networks, i.e preventing IMSI Catcher attacks, Man-in-themiddle attacks, port infection attacks, phishing, fundamental cellular network loopholes amongst others. 2 - SCADA/ICS/OT Organizations. We provide a Platform that enables operational engineers and Cybersecurity personnel to gain control over industrial-networks, detecting malicious activities, identify unauthorized changes, troubleshoot problems caused by control device mis-configuration or firmware updates, and address compliance and change management requirements. 3 - Enterprise Organizations. We assist organizations across Financial, Education, Government, Insurance, etc in implementing proven Cyber security program with the end game of STOPPING BREACHES. In the final analysis, this framework empowers CISOs, CIOs and Security managers in PROVING to their respective managements and boards - HOW SECURE IS THE ORGANIZATION AT ANY TIME? THE VIPDDR CYBER ATTACK KILL CHAIN PROACTIVE PROTECTION AND DETECTION AUTOMATED CONTAINMENT AND PROTECTION The first stage in reconnaissance is identifying potential targets (companies or individuals) that satisfy the mission of the attackers (e.g. financial gain, targeted access to sensitive information, brand damage, etc.). Once the target or targets are identified, the attackers determine their best mode of entry. The initial compromise is usually in the form of hackers bypassing your perimeter defenses and, in one way or another, gaining access to your internal network through a compromised system or user account. Compromised systems might include your externally facing servers or end-user devices, such as laptops or desktops. The compromised device is used as a beachhead into your organization. Typically, this involves the attacker surreptitiously downloading and installing a remote-access Trojan (RAT) so they can establish persistent, long- term, remote access to your environment. Once the attacker has an established (persistent) connection to your internal network, they seek to compromise additional systems and user accounts. First, they take over the user account on the compromised system. This account helps them scan, discover, and compromise additional systems from which additional user accounts can be stolen. At this stage of the Kill Chain, the attacker typically has multiple remote access entry points and may have compromised hundreds (or even thousands) of your internal systems and user accounts. They have mapped out and deeply understand the aspects of your IT environment of highest interest to them. The final stage of the attack kill chain, and is where cost to your business rises exponentially if the attack is not defeated. This is the stage where the attacker executes the final aspects of their mission, stealing intellectual property or other sensitive data, corrupting mission-critical systems, and generally disrupting the operations of your business. VISIBILITY ISOLATION PREVENTION DECEPTION DETECTION RESPONSE DIGITAL ASSETS & IT'S CRITICAL INFRASTRUCTURES! CYBER ATTACKS AFRICA’S ON PROVEN CYBER DEFENSES AGAINST

SMSAM VIPDDR Frameworkdrive.smsam.net/SMSAM_VIPDDR_Framework.pdf · VIPDDR CYBERSECURITY FRAMEWORK SMSAM SYSTEMS LTD is a disruptive PAN African advanced cybersecurity services firm-

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SMSAM VIPDDR Frameworkdrive.smsam.net/SMSAM_VIPDDR_Framework.pdf · VIPDDR CYBERSECURITY FRAMEWORK SMSAM SYSTEMS LTD is a disruptive PAN African advanced cybersecurity services firm-

VIPDDR CYBERSECURITY FRAMEWORK

SMSAM SYSTEMS LTD is a disruptive PAN African advanced cybersecurity services firm- with a mission to securing

Africa's digital assets and critical infrastructures organizations, against ALL of form of cyber-attacks.

Headquartered in Nigeria and with presence across many African countries, we deliver on our mission by leveraging

t h e V I P D D R C y b e r S e c u r i t y F r a m e w o r k d e v e l o p e d b y u s . T h e m o t i v a t i o n b e h i n d t h e

framework is to have a practical and realistic cybersecurity program with proven security rather than vaguely assuming

same. The ultimate mission of the framework is to STOP BREACHES as we leverage of automated, best-in class, AI /ML

powered technologies to DISRUPTS, FRUSTRATES and SLOW DOWN the adversaries (External and Internal).

CATEGORIES OF ORGANIZATIONS SERVICED

1 - Telecoms and ISP Organizations. We focus on helping MNOs and Internet service providers in preventing and

mitigating the exploitation of inherent security flaws found in the SS7/Diameter signaling protocols. We also offer

services around the security of subscribers cellular networks, i.e preventing IMSI Catcher attacks, Man-in-themiddle

attacks, port infection attacks, phishing, fundamental cellular network loopholes amongst others.

2 - SCADA/ICS/OT Organizations. We provide a Platform that enables operational engineers and Cybersecurity

personnel to gain control over industrial-networks, detecting malicious activities, identify unauthorized changes,

troubleshoot problems caused by control device mis-configuration or firmware updates, and address compliance and

change management requirements.

3 - Enterprise Organizations. We assist organizations across Financial, Education, Government, Insurance, etc in

implementing proven Cyber security program with the end game of STOPPING BREACHES.

In the final analysis, this framework empowers CISOs, CIOs and Security managers in PROVING to their respective

managements and boards - HOW SECURE IS THE ORGANIZATION AT ANY TIME?

THE VIPDDR CYBER ATTACK KILL CHAIN

RECONNAISSANCEINITIAL

COMPROMISECOMMAND & CONTROL

LATERAL MOVEMENT

TARGET ATTAINMENT

EXFILTRATION, CORRUPTION

& DISRUPTION

PROACTIVE PROTECTION AND DETECTION AUTOMATED CONTAINMENT AND PROTECTION

The first stage in reconnaissance is

identifying potential targets (companies or

individuals) that satisfy the mission of the attackers

(e.g. financial gain, targeted access to

sensitive information, brand damage, etc.).

Once the target or targets are identified, the

attackers determine their best mode of entry.

The initial compromise is usually in the form of

hackers bypassing your perimeter defenses and, in one way or another, gaining access to your

internal network through a compromised system or

user account. Compromised systems

might include your externally facing servers

or end-user devices, such as laptops or desktops.

The compromised device is used as a beachhead into your organization.

Typically, this involves the attacker surreptitiously

downloading and installing a remote-access Trojan

(RAT) so they can establish persistent, long-

term, remote access to your environment.

Once the attacker has an established (persistent)

connection to your internal network, they seek to compromise additional

systems and user accounts. First, they take over the user account on the compromised system. This account helps them

scan, discover, and compromise additional

systems from which additional user accounts

can be stolen.

At this stage of the Kill Chain, the attacker

typically has multiple remote access entry points and may have

compromised hundreds (or even thousands) of

your internal systems and user accounts. They have mapped out and deeply

understand the aspects of your IT environment of

highest interest to them.

The final stage of the attack kill chain, and is

where cost to your business rises

exponentially if the attack is not defeated. This is the stage where the attacker

executes the final aspects of their mission, stealing intellectual property or other sensitive data,

corrupting mission-critical systems, and generally

disrupting the operations of your business.

VISIBILITY ISOLATION PREVENTION DECEPTION DETECTION RESPONSE

DIGITAL ASSETS & IT'S CRITICAL INFRASTRUCTURES!

CYBER ATTACKS AFRICA’SONPROVEN CYBER DEFENSES AGAINST

Page 2: SMSAM VIPDDR Frameworkdrive.smsam.net/SMSAM_VIPDDR_Framework.pdf · VIPDDR CYBERSECURITY FRAMEWORK SMSAM SYSTEMS LTD is a disruptive PAN African advanced cybersecurity services firm-

VIPDDR CYBERSECURITY ARCHITECTURE

Page 3: SMSAM VIPDDR Frameworkdrive.smsam.net/SMSAM_VIPDDR_Framework.pdf · VIPDDR CYBERSECURITY FRAMEWORK SMSAM SYSTEMS LTD is a disruptive PAN African advanced cybersecurity services firm-

RECOMMENDED TECHNICAL CONTROLS

FOR VIPDDR CYBERSECURITY FRAMEWORK

a. PEOPLE (EMPLOYEES/USERS, CUSTOMERS, VENDORS/3RD PARTIES)

Ÿ Email Authentication (DMARC), www.dmarcian.com

Ÿ File Sanitization (CDR), www.votiro.com

Ÿ Email Security Gateway (SaaS/CASB) - and On-Premise www.avanan.com www.ironscales.com

Ÿ Vendors Risk Management (VRM), www.securityscorecard.com

Ÿ Cyber Threat Intelligence (CTI), www.intsights.com

Ÿ Email and File Encryption - www.echoworx.com

b. NETWORKSŸ Threat Intelligence Gateway (TIG), www.ixiacom.com/products/threatarmor

Ÿ IT Assets Management (ITAM), www.axonius.com

Ÿ Anti IP Hijack (AIH), www.bgprotect.com

Ÿ Visibility Fabric Architecture (VFA), www.ixiacom.com/solutions/visibility-architecture

Ÿ Multi Factor Authentication (MFA), www.silverfort.io

Ÿ Browser Isolation Technology (BIT), www.ericomshield.com

Ÿ Zero Trust Software Defined Perimeter (ZT- SDP), www.safe-t.com

Ÿ Insider Threats Monitoring Platform (ITMP), www.teramind.co

Ÿ Network Access Control (NAC), - i.e. Supports IPAM, DHCP and L2 Preventionwww.genians.com

c APPLICATIONSŸ Network Based Website Security (NBWS), - i.e. supports BOT/DDoS, WAF and www.reblaze.com

Traffic Management

Ÿ Interactive Application Security Testing (IAST), www.contrastsecurity.com

Ÿ Runtime Application Self Protection (RASP), www.contrastsecurity.com

Ÿ Next Gen AI Powered SIEM (aiSIEM), www.seceon.com

d ENDPOINTSŸ Active Directory Security (ADS), www.javelin-networks.com

Ÿ Endpoint Protection Platform and Endpoint Detection/Response (EPP/EDR),

www.sentinelone.com

Ÿ Logon Management Platform ( LMP), www.isdecisions.com

e AUTOMATED & CONTINUOS CYBERSECURITY ASSESSMENT PLATFORM (ACCAP)Ÿ IT Assets Management (ITAM), www.axonius.com

Ÿ Breach and Attack Simulation (BAS), www.cymulate.com

Ÿ Vulnerability Risk Management (VRM), www.cronus-Cyber.com

Ÿ Automated Penetration Testing Platform (APTP), www.pcysys.com

f INDUSTRIAL CYBER SECURITY PROGRAM (ICSP)

Ÿ SCADA/ICS/OT, www.indegy.com

Ÿ Telcoms - SS7 Assessment Services, www.ptsecurity.com

Ÿ SAP Security, www.erpscan.com

j CYBERSECURITY EDUCATION PROGRAM (CSEP)

Ÿ Cyber Security Capacity Building

Page 4: SMSAM VIPDDR Frameworkdrive.smsam.net/SMSAM_VIPDDR_Framework.pdf · VIPDDR CYBERSECURITY FRAMEWORK SMSAM SYSTEMS LTD is a disruptive PAN African advanced cybersecurity services firm-

Accra, GhanaAdentan – Frafraha, Accra, Ghana.Tel:  +233 244 865815

Addis Ababa, EthiopiaEnat Tower 901-3 Kazanchis, Addis Ababa, EthiopiaTel: +251 947313735

Conakry, GuineaKipe T2, Commune de Ratoma, BP :249 | GUINEE - Conakry, Appelez Nous.Tel: +224 660 846 484, + 224 655747676

Dakar, Senegal4 Cite COMICO - 3 VDN | BP : 5841Dakar - SenegalTel: +221 776399565

Douala, CameroonRue Joffre Byblos plus building at the 3th floor, Akwa, Douala, Cameroon.Tel: +237 651 448 283, +237 666 925 663

Harare, Zimbabwe1st floor Zimpost House, Harare, Zimbabwe. Tel: +263 733 782490, +263 773796365

Kampala, UgandaPlot 8 Kanjokya, Kampala, UgandaTel: +256 772712259

INTERNATIONAL OFFICES

GLOBAL HEADQUARTERS

Lagos, Nigeria

131, Obafemi Awolowo Way, Alausa, 100212, Ikeja, Lagos – Nigeria.

+234 80 999 SMSAM (+234 80 999 76726)+234 818 781 3483, +234 802 632 5087, +234 809 999 2009

[email protected] www.smsam.net

Kigali, RwandaKN 2 AV 2 Nyarugenge, Kigali, Rwanda.Tel: +250 783108740, +250 788682433

Lusaka, ZambiaLubambe Rd, Lusaka, ZambiaTel: +260 965791347

MalawiBox 459, Blantyre, Malawi Tel: +265 999 561003

Nairobi, KenyaWestlands Court, Hse 12, Mangu Gardens, Church Road, off Waiyaki Way, Westlands.Tel: +254 722102854

The Gambia6 Kairaba Avenue, Serrekunda, KSMD, The GambiaTel: +220 2005885

CAMEROON | ETHIOPIA | GHANA | GUINEA | KENYA | NIGERIA

MALAWI | RWANDA | THE GAMBIA | UGANDA | ZAMBIA | ZIMBABWE

Contact Information