Insurance coverage

Cyber ​​Insurance Coverage Checklist: 5 Security Elements

Carriers that require EDR as a security check must accept XDR as a solution. And with the primary goal being to improve security maturity, organizations should look to improve detection and response capabilities beyond EDR with XDR.

XDR is simply an extension of EDR. While EDR only detects at the endpoint level, XDR can collect and correlate threat activity data on endpoints. mores servers, cloud, networks and email. Done well, XDR can help contextualize threat data, delivering only critical alerts instead of bogging down security teams with false positives.

With an attack-centric graphical timeline view, SOCs can better understand how the user was infected, the first point of entry, how the threat spread, and a host of other useful data to limit the scope of an attack.

As mentioned earlier, operators want to see if an organization has the necessary security tools in place to stop ransomware. When XDR is combined with ZTNAyou have a better chance of fighting off costly ransomware attacks.

How does this work? First, ZTNA strengthens the infrastructure against malicious attacks by establishing a source of truth to continuously authenticate, authorize, and monitor access. Additionally, network segmentation will slow down an attack by reducing lateral movement within the organization.

Next, XDR gathers information about possible attack elements such as Indicators of Compromise (IoC), network traffic logs, suspicious endpoint behavior, SaaS service requests, and server events for analysis. This forms the basis for an effective response, if risky behavior is detected from XDR analysis.

With this approach, your security posture is strengthened and you can effectively demonstrate how to stop ransomware attacks to cyber insurers.

In the event of a zero- or n-day event, the loss of revenue due to business downtime as well as associated repair, public relations, and legal costs are typically covered by cyber insurance. So, underwriters want to see if an organization has an effective patch management strategy in place before providing a quote.

The days of patching everything are over. Attack time decreases because exploits on vulnerable systems occur in minutes, not days. For example, it only took the Hafnium hacking group five minutes to start scanning for vulnerabilities after Microsoft announced a zero-day vulnerability found in Microsoft Exchange Server. And while cybercriminals are quick to strike, it can take days for the vendor to release a patch, leaving your system unprotected and your business operations at risk.

The key to good patch management is prioritization. To achieve this, organizations must focus on bugs that are relevant to their specific application systems. From there, security teams can identify which of these bugs have been actively exploited and whether they are part of critical business infrastructure.