Paul McCartney wrote “The Long and Winding Road” while the Beatles were in the throes of dissent and months away from breaking up. Listening now to the song’s yearning lyrics and plaintive melody, is it possible that Sir Paul actually anticipated the NIST Cybersecurity Framework’s Recover function, and was imagining the category titled Recovery Planning?
Cybersecurity has become a top-tier risk for U.S. and multinational organizations. It is only a matter of time before a determined hacker will penetrate your organization’s system and successfully exfiltrate some data. (Indeed, this has most likely already happened, even if you are told it has not.)
This system’s workflow automation and tracking features enable adaptive response, while including all stakeholders and facilitating information-sharing with other organizations through participating with Information Sharing and Analysis Centers (ISACs).
Removing the power from a computer not only results in lost volatile memory, much of which can be critical to a forensic investigation (and should be imaged), but also may lead the intruder to establish other points of entry.