<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>88f0988d</title>
    <link>https://www.cybervio.co.uk</link>
    <description />
    <atom:link href="https://www.cybervio.co.uk/feed/rss2" type="application/rss+xml" rel="self" />
    <item>
      <title>Cybervio Earns Bronze Award in Defence Employer Recognition Scheme for Armed Forces Support</title>
      <link>https://www.cybervio.co.uk/cybervio-earns-bronze-award-in-defence-employer-recognition-scheme-for-armed-forces-support</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/88f0988d/dms3rep/multi/AFC_RECOG_BRONZE_POS_RGB-737ffa19.PNG"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cybervio is proud to announce that it has been awarded the prestigious Bronze Award in the Defence Employer Recognition Scheme (ERS). This accolade underscores our ongoing commitment to supporting the Armed Forces community and upholding the values of the Armed Forces Covenant.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           What is the Defence Employer Recognition Scheme (ERS)?
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The Defence ERS is a UK Ministry of Defence initiative that recognises employers who demonstrate exceptional support for the Armed Forces community. The scheme has three tiers—Bronze, Silver, and Gold—each reflecting increasing levels of commitment. The Bronze Award is granted to organisations that have pledged their support to the Armed Forces Covenant, making a tangible commitment to being Armed Forces-friendly employers.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Cybervio’s Commitment to the Armed Forces Covenant
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           At Cybervio, we recognise the invaluable skills and dedication that members of the Armed Forces bring to the civilian workforce. Our commitment to the Armed Forces Covenant is a testament to our support for:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Promoting the Armed Forces
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Supporting Veterans
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Supporting National events &amp;amp; Armed Forces Charities
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
            Providing commercial support to members of the Armed Forces and Veterans who utilise our Services
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Why This Matters
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Earning the Bronze Award is more than just a recognition; it’s a reflection of our values as an organisation. At Cybervio, we believe in fostering a culture of respect, support, and opportunity for all, particularly those who serve or have served in the Armed Forces. By integrating these principles into our recruitment practices, workplace policies, and community engagement, we aim to set a standard for other employers to follow.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Final Thoughts
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We are incredibly honoured to receive the Bronze Award and remain steadfast in our dedication to the Armed Forces community. Cybervio will continue to work hard to ensure that our workplace is inclusive, supportive, and empowering for those who have served our country.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To learn more about our initiatives and how we support the Armed Forces community, visit our website or reach out to our team.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Together, we can make a difference.
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/88f0988d/dms3rep/multi/pexels-photo-19704274.jpeg" length="173317" type="image/jpeg" />
      <pubDate>Fri, 17 Jan 2025 13:55:44 GMT</pubDate>
      <guid>https://www.cybervio.co.uk/cybervio-earns-bronze-award-in-defence-employer-recognition-scheme-for-armed-forces-support</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/88f0988d/dms3rep/multi/AFC_RECOG_BRONZE_POS_RGB-737ffa19.PNG">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/88f0988d/dms3rep/multi/pexels-photo-19704274.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Cybervio Attends the 2024 Healing Military Minds Ball</title>
      <link>https://www.cybervio.co.uk/healing-military-minds-ball-2024</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Cybervio Attends the 2024 Healing Military Minds Ball
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/88f0988d/dms3rep/multi/IMG_6235.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Last month, Cybervio were honoured to attend the 2024 Healing Military Minds Ball, held in support of Combat Stress, a vital organisation dedicated to helping veterans overcome the mental health challenges of service. This annual event, hosted in November, serves as a powerful reminder of the ongoing need to support the Armed Forces and veteran community—a cause Cybervio is deeply committed to through our pledge to the Armed Forces Covenant.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The evening was a celebration of camaraderie, gratitude, and generosity. We were thrilled to join other supporters of this meaningful cause, demonstrating the enduring appreciation for the sacrifices made by service personnel and their families.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           One of the highlights of the night was the fundraising auction, where Cybervio proudly contributed by securing a prized item: a signed England Rugby match jersey from Ellis Genge. This remarkable piece of sports memorabilia not only represents a cherished moment for our team but also signifies our commitment to making a tangible difference. The funds raised from the auction, including our contribution, will directly support the invaluable work of Combat Stress.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           We would like to extend our heartfelt thanks to the event organisers for creating such an impactful evening and for their continued efforts in championing this cause. At Cybervio, we remain steadfast in our support of those who have served our country, honouring their resilience and commitment by working to ensure they receive the care and recognition they deserve.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Here’s to many more opportunities to stand together for our Armed Forces and veteran communities!
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1504805572947-34fad45aed93.jpg" length="164215" type="image/jpeg" />
      <pubDate>Thu, 12 Dec 2024 19:29:18 GMT</pubDate>
      <guid>https://www.cybervio.co.uk/healing-military-minds-ball-2024</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/88f0988d/dms3rep/multi/39enwurphg2ss.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/md/unsplash/dms3rep/multi/photo-1504805572947-34fad45aed93.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Implementing Secure by Design in UK HMG: A Comprehensive Approach with NIST and NCSC Guidance</title>
      <link>https://www.cybervio.co.uk/implementing-secure-by-design-in-uk-hmg-a-comprehensive-approach-with-nist-and-ncsc-guidance</link>
      <description />
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;h3&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Implementing Secure by Design in UK HMG: A Comprehensive Approach with NIST and NCSC Guidance
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h3&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/88f0988d/dms3rep/multi/71093489_padded_logo.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           In an increasingly digitised world, cyber threats have become a pressing concern for governments and organisations worldwide. The UK government has taken a proactive stance on cybersecurity by adopting the principles of Secure by Design (SbD). This approach prioritises embedding security measures at the earliest stages of system development, ensuring resilience against evolving cyber threats. Leveraging guidance from the National Institute of Standards and Technology (NIST) and the UK’s National Cyber Security Centre (NCSC), SbD has become a cornerstone of the UK government’s strategy. In this post, we will explore the successes, challenges, and risks overcome in implementing this approach across UK government systems.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Understanding Secure by Design
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           SbD focuses on integrating security features and practices into every stage of a product’s lifecycle—from initial concept and design to deployment and ongoing maintenance. This contrasts with traditional methods, where security was often retrofitted or considered only after a system’s development. By embedding security from the outset, organisations can significantly reduce vulnerabilities, minimise risks, and improve resilience against sophisticated attacks.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           For UK government systems, this approach is not optional—it is essential. With sensitive citizen data and critical national infrastructure at stake, SbD supports robust cybersecurity aligned with the Government Cyber Security Strategy 2022-2030. This strategy aims to ensure that all government organisations have strong cybersecurity measures and can respond effectively to threats.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           The Role of NIST and NCSC in Secure by Design
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Both NIST and NCSC provide critical frameworks and guidance to enable SbD.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            1.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           NIST’s Role
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           NIST’s Cybersecurity Framework (CSF) is a globally recognised standard. It provides a structured approach to managing cybersecurity risks, emphasising six core functions: Identify, Protect, Detect, Respond, Recover and Govern. For SbD, the NIST CSF offers actionable guidelines for integrating security at every stage of the system lifecycle. NIST’s SP 800-160 publication also focuses on systems security engineering, detailing principles for building secure and resilient systems.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            2.
           &#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           NCSC’s Contributions
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As the UK’s authority on cybersecurity, the NCSC provides tailored guidance to help government departments implement SbD. Its principles emphasise the importance of understanding risks, adopting secure development practices, and ensuring systems are resilient by design. Notable frameworks include the NCSC’s Cloud Security Principles and Cyber Assessment Framework (CAF), which align with SbD practices.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Together, these resources enable organisations to adopt a structured, internationally benchmarked approach to security while addressing UK-specific challenges.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Successes in Implementing Secure by Design
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The UK government has made significant strides in implementing SbD, with notable successes including:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Improved Baseline Security Standards
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The adoption of the NCSC’s CAF has helped standardise security requirements across government departments, ensuring a minimum baseline for protecting systems. This has been particularly effective in securing critical infrastructure and cloud services.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Increased Awareness and Training
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           SbD has driven greater awareness of cybersecurity among developers and system architects. Training programs emphasising secure coding practices and system engineering principles have reduced common vulnerabilities such as injection flaws and misconfigurations.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Resilience Against Attacks
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           By embedding threat modelling and security testing in the development cycle, government systems have become more resilient against cyberattacks. For instance, systems designed with robust identity and access management (IAM) features have successfully mitigated risks associated with unauthorised access.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        
            ﻿
           &#xD;
      &lt;/span&gt;&#xD;
      
           4. Alignment with International Standards
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The integration of NIST frameworks ensures that UK government systems align with international cybersecurity best practices. This fosters better collaboration with global partners and enhances trust in cross-border data exchanges.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Challenges in Adopting Secure by Design
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           While the benefits are clear, implementing SbD is not without its challenges. Key obstacles include:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Legacy Systems
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Many government departments rely on aging IT infrastructure, which was not designed with modern security principles in mind. Retrofitting these systems to align with SbD can be complex and costly, requiring significant resources.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Cultural Resistance
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Shifting the mindset from a reactive to a proactive approach to security has been challenging. SbD requires buy-in from all stakeholders, including developers, managers, and policymakers. Resistance to change can slow adoption.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Skills Shortages
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The demand for cybersecurity professionals with expertise in secure system design far exceeds supply. This shortage has been a barrier to fully implementing SbD across all government projects.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Balancing Security and Usability
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Designing systems that are both secure and user-friendly remains a challenge. Overly stringent security measures can hinder usability, potentially leading to workarounds that undermine the system’s security.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Overcoming Risks and Challenges
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To address these challenges, the UK government has adopted a range of strategies:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           1. Legacy System Modernisation
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           A phased approach to modernising legacy systems has proven effective. By prioritising the most critical systems and leveraging secure migration practices, departments have reduced risks while minimising disruptions.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           2. Cultural Transformation
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Continuous engagement and education campaigns have fostered a culture of security awareness. For example, the introduction of mandatory cybersecurity training for civil servants has increased understanding and support for SbD principles.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           3. Building a Skilled Workforce
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Investments in cybersecurity education and apprenticeship programs are helping to bridge the skills gap. Collaborations with academic institutions and private sector partners have also bolstered talent pipelines.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           4. Integrating User-Centered Design
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           To balance security and usability, the Government has adopted user-centered design principles. By involving end-users early in the design process, systems can be both secure and practical.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Key Lessons Learned
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           The UK government’s journey in implementing SbD offers several lessons:
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           • Early Investment Pays Dividends: The cost of addressing security issues during development is significantly lower than post-deployment remediation.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           • Collaboration is Critical: Effective implementation requires close collaboration between cybersecurity experts, developers, and end-users.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           • Adaptability is Key: Cyber threats evolve rapidly, so SbD must be an ongoing, iterative process rather than a one-time effort.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Future Directions
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As technology continues to evolve, so too must SbD. Emerging trends such as artificial intelligence (AI) and quantum computing will introduce new challenges and opportunities. The UK government is already exploring how these technologies can be harnessed securely, with frameworks like NIST’s Post-Quantum Cryptography Standardisation providing valuable guidance.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Additionally, the push towards a “zero trust” architecture—where no entity is inherently trusted and verification is required for all access—will further strengthen the SbD approach.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;strong&gt;&#xD;
      
           Conclusion
          &#xD;
    &lt;/strong&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Implementing SbD across UK government systems is a complex but essential undertaking. By leveraging guidance from NIST and NCSC, the Government has made significant progress in creating resilient systems capable of withstanding modern cyber threats. While challenges such as legacy systems, cultural resistance, and skills shortages persist, the successes achieved thus far demonstrate the value of embedding security at the core of system development.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
           As the cyber threat landscape continues to evolve, the UK Government’s commitment to SbD will remain a critical pillar of its cybersecurity strategy. Through collaboration, innovation, and adherence to international best practices, the UK can ensure that its systems remain secure, trustworthy, and fit for purpose in the digital age.
          &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/88f0988d/dms3rep/multi/HERO+-+SecurebyDesign+-+1600x600px.png" length="486081" type="image/png" />
      <pubDate>Fri, 29 Nov 2024 18:07:00 GMT</pubDate>
      <guid>https://www.cybervio.co.uk/implementing-secure-by-design-in-uk-hmg-a-comprehensive-approach-with-nist-and-ncsc-guidance</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/88f0988d/dms3rep/multi/SbD.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/88f0988d/dms3rep/multi/HERO+-+SecurebyDesign+-+1600x600px.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Monitor Your Child's WhatsApp</title>
      <link>https://www.cybervio.co.uk/monitor-your-child-s-whatsapp</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;span&gt;&#xD;
    
                    
          What is WhatsApp?
         
                  &#xD;
  &lt;/span&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp.cdn-website.com/88f0988d/dms3rep/multi/Information-590x357.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           WhatsApp is a messaging platform that has become extremely popular, more than 2 billion people in over 180 countries use WhatsApp.  WhatsApp is free and offers simple, secure, reliable messaging and calling, available on phones all over the world.  And yes, the name WhatsApp is a pun on the phrase What's Up.  Facebook purchased WhatApp for a staggering $19 billion in 2014.  So what, well due to it's popularity, ease of use and availability is has become the de-facto messaging platform for all ages.  Well what does WhatsApp provide?
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;div&gt;&#xD;
      &lt;ul&gt;&#xD;
        &lt;li&gt;&#xD;
          
                          
             Texts - Simple, Reliable Messaging
            
                        &#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
                          
             Group Chat - Groups to keep in touch
            
                        &#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
                          
             Voice and Video Calling
            
                        &#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
                          
             Voice Messaging
            
                        &#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
                          
             Photos and Videos
            
                        &#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
                          
             Document Sharing
            
                        &#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
                          
             Location Sharing
            
                        &#xD;
        &lt;/li&gt;&#xD;
        &lt;li&gt;&#xD;
          
                          
             End-to-end encryption
            
                        &#xD;
        &lt;/li&gt;&#xD;
      &lt;/ul&gt;&#xD;
      &lt;div&gt;&#xD;
        
                        
            That sounds great, so why should I worry about my child's WhatsApp?  Well it's  not a matter of IF your child will end up on WhatsApp, but WHEN will your child end up on WhatsApp and HOW they will use WhatsApp.
           
                      &#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;br/&gt;&#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        
                        
            Having a child that has recently received her own phone I have ensured parental controls are in place, screen time is limited and boundaries are set.  We'll now highlight how you can ensure your child(ren) can use WhatsApp safely, some tips on how to introduce it to your child it and how to monitor your child’s WhatsApp.
           
                      &#xD;
      &lt;/div&gt;&#xD;
      &lt;div&gt;&#xD;
        &lt;ul&gt;&#xD;
          &lt;li&gt;&#xD;
            &lt;span&gt;&#xD;
              
                              
               With your child, review the WhatsApp Profile setting and select a picture that your child likes and you approve of.  Following this go to Settings -&amp;gt; Account -&amp;gt; Privacy.   You should ensure that as a minimum you set your child’s privacy settings to 'My Contacts'.  The options here are 'Everyone', 'My Contacts' and 'Nobody', none of your child's Privacy settings should be "Everyone".  Furthermore, you should restrict the 'Live Location' settings to 'None'
              
                            &#xD;
            &lt;/span&gt;&#xD;
          &lt;/li&gt;&#xD;
        &lt;/ul&gt;&#xD;
      &lt;/div&gt;&#xD;
    &lt;/div&gt;&#xD;
  &lt;/span&gt;&#xD;
  &lt;div&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/88f0988d/dms3rep/multi/IMG_2059.PNG" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Next select 'Two-Step Verification' and enable it.  You will be required to provide a PIN and email address but in doing so you greatly increase the overall security of your child's account
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            If utilising an Apple product you can also enable 'Screen Lock', this then requires 'Touch ID' to re-open WhatsApp and provides an additional layer of security to your child's account
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;h4&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           How to monitor WhatsApp for Free:
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/h4&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
                          
             On your home laptop or PC, browse to
            
                        &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://web.whatsapp.com/" target="_blank"&gt;&#xD;
        
                        
            https://web.whatsapp.com/
           
                      &#xD;
      &lt;/a&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            On your child's phone
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
                          
             follow the instructions provided:
            
                        &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/88f0988d/dms3rep/multi/WhatsApp+Web.PNG" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Once synced you should be able to monitor chat history
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://irp.cdn-website.com/88f0988d/dms3rep/multi/WhatsApp+Web+Linked.PNG" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Many may see this as being overprotective however, we must be open and honest with our children.  There are online dangers such as bullying, sexting, pornography, stranger danger, etc.  Therefore, it is essential to discuss with your child such issues:
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Teach your child to protect their WhatsApp account.  Given that it doesn't require a password and unless you have set up 'Touch ID' your child may leave their phone unattended and unlocked.  Someone may think it funny to send messages purportedly from your child.  This may be harmless fun but may also have significant consequences if deemed inappropriate
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Has your child observed any foul language and if so could it be considered bullying?  This should be discussed with your child to ensure that inappropriate behaviour is curtaile
           
                      &#xD;
      &lt;/span&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            d
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          
                          
             Sexting:  Sexting is when you send a sexual message, photo or video to someone else.  It could be a picture of you, but sometimes people send pictures and videos of other people. 
            
                        &#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
      &lt;a href="https://www.childline.org.uk/info-advice/bullying-abuse-safety/online-mobile-safety/sexting/" target="_blank"&gt;&#xD;
        
                        
            Learn more about sexting
           
                      &#xD;
      &lt;/a&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Fake News &amp;amp; Hoaxes:  As adults we've become accustomed to 24/7 news and have a better grasp on what may be deemed 'fake news'.  Children however, are likely to struggle with this concept at first.  Have a conversation with your child about what is real news, what is fake
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Stranger Danger:  Whilst we have set the Privacy settings to 'My Contacts' your child may innocently add a stranger to their contacts list.  Therefore, it is still important to have a conversation with your child about stranger danger
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
            Finally, block WhatsApp before bedtime, set screen time.  Apple devices are extremely easy to set up and it ensures that your child can get a good nights sleep
           
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           Should you wish to discuss this blog or any child online safety concerns please contact us at:
          
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
           info@cybervio.co.uk
          
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp.cdn-website.com/88f0988d/dms3rep/multi/whatsapp+update+latest+2021.jpg" length="36686" type="image/jpeg" />
      <pubDate>Tue, 27 Apr 2021 21:35:42 GMT</pubDate>
      <author>damien_gillett@hotmail.com (Damien Gillett)</author>
      <guid>https://www.cybervio.co.uk/monitor-your-child-s-whatsapp</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp.cdn-website.com/88f0988d/dms3rep/multi/whatsapp+update+latest+2021.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp.cdn-website.com/88f0988d/dms3rep/multi/whatsapp+update+latest+2021.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>AWS Mindmap for Detection Capabilities</title>
      <link>https://www.cybervio.co.uk/aws-mindmap-for-detection-capabilities</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
         AWS Mindmap for Detection Capabilities
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/88f0988d/dms3rep/multi/AWS+Mindmap.JPG"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         Whilst working in Cloud environments it is essential to understand what data sources are available to aid detection capabilities.  In doing so, Blue Teams can align their monitoring in an attempt to identify potentially anomalous activity.  One of the most useful sources of information whilst monitoring an AWS environment is derived from
         
                  &#xD;
  &lt;a href="https://aws.amazon.com/cloudtrail/" target="_blank"&gt;&#xD;
    
                    
          CloudTrail
         
                  &#xD;
  &lt;/a&gt;&#xD;
  
                  
         , this provides detail of any API calls made.
         
                  &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          The mindmap provides a useful resource for Blue Teams to aid detection capabilities, for example, an analyst may identify 'CreateUser' followed by 'CreateKeyPair', then followed by 'PutUserPolicy' or 'AttachUserPolicy' in conjunction with 'AddUserToGroup'.  This identified activity would map to
          
                    &#xD;
    &lt;a href="https://attack.mitre.org/" target="_blank"&gt;&#xD;
      
                      
           Mitre's ATT&amp;amp;CK
          
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
          framework, specifically, the Tactics Persistence and Privilege Escalation.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Therefore, your Blue Team can utilise the mindmap in order to align detection capabilities to specific AWS API calls that map to ATT&amp;amp;CK Tactics and Techniques.  Our previous blog post Sigmac: A Sigma to SIEM converter describes how a Blue Team can utilise Sigma rules, whilst making use of Pacu (an AWS exploitation tool) to create Use Cases and detection alerts to aid SOC analysts.  Furthermore, the mindmap can be utilised to aid proactive threat hunting.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          There will likely be False Positives (FP's) in relation to the identified API calls as legitimate activity occurs within your environment.  By utilising items such as authorised user/admin lists, standard operating hours and the principle of least privilege you can greatly reduce the overall amount of FP's.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Overall, the mindmap can be utilised in a number a ways to enhance your security posture and reduce both the Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR).
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Cybervio can assist your Blue Team in utilising the ATT&amp;amp;CK framework for Cloud in order to build detection capabilities against Tactics, Techniques and Procedures (TTP's) in an AWS environment.
         
                  &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 29 Jan 2021 17:34:39 GMT</pubDate>
      <guid>https://www.cybervio.co.uk/aws-mindmap-for-detection-capabilities</guid>
      <g-custom:tags type="string" />
    </item>
    <item>
      <title>Sigmac: A Sigma to SIEM converter</title>
      <link>https://www.cybervio.co.uk/sigmac-a-sigma-to-siem-converter</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
         What is Sigma?
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://irp-cdn.multiscreensite.com/88f0988d/dms3rep/multi/0+%281%29.jpg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         As @cyb3rops describes it, Sigma is an open standard for rules that allow you to describe searches on log data in generic form. These rules can be converted and applied to many log management or SIEM systems and can even be used with grep on the command line.
         
                  &#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          Having been working through potential Splunk Use Cases and trying to take the viewpoint of an attacker I made use of the modules within Rhino Security Labs Pacu, an AWS exploitation framework. In doing so I came across Sigmac written by Florian Roth. In essence by utilising Sigmac you can take Sigma rules and convert them to a number of SIEM platforms, in this case Splunk.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          The setup, configuration and use is fully documented on Florian's GitHub page so I won't go into detail here. Essentially, by converting known, well documented Sigma rules into Splunk SPL you can aid detection of potentially anomalous activity within your environment.
         
                  &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
                    
          The resultant Splunk SPL search will likely require review for your environment, however, it will provide the basis to create useful content from. In doing so you can map Use Cases against exploitation frameworks, e.g. Pacu and detection frameworks such as ATT&amp;amp;CK.
         
                  &#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/88f0988d/dms3rep/multi/0.jpg" length="230670" type="image/jpeg" />
      <pubDate>Wed, 02 Sep 2020 16:00:37 GMT</pubDate>
      <author>damien_gillett@hotmail.com (Damien Gillett)</author>
      <guid>https://www.cybervio.co.uk/sigmac-a-sigma-to-siem-converter</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/88f0988d/dms3rep/multi/0.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/88f0988d/dms3rep/multi/0.jpg">
        <media:description>main image</media:description>
      </media:content>
    </item>
  </channel>
</rss>
