31.07.2023 Views

The Cyber Defense eMagazine August Edition for 2023

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine August Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

sectors. Cryptography's ubiquitous presence makes it difficult to track assets that organizations may not<br />

even be aware of.<br />

Although not subject to the May deadline, Enterprises must also identify and proactively manage their<br />

cryptographic assets. It is crucial <strong>for</strong> all organizations to follow a structured approach <strong>for</strong> transitioning to<br />

a post-quantum world. Consider the following steps:<br />

Step 1: Inventory<br />

<strong>The</strong> first step is to inventory all cryptographic systems, including certificates and algorithms, and prioritize<br />

them based on their level of criticality. This process entails understanding the crypto assets within an<br />

organization's environment, including the algorithms certificates used, their issuers, expiration dates, the<br />

domains they protect, and even the software signed with specific keys. Additionally, organizations must<br />

investigate whether their software packages or devices automatically download updates, connect to<br />

backend servers, or operate on websites or portals managed by third parties or cloud providers.<br />

Establishing these details requires extensive communication with various providers and backend entities.<br />

While identifying an organization’s digital footprint may seem daunting, it is essential in today’s<br />

interconnected world. Understanding crypto assets is the key to protecting them effectively.<br />

Step 2: Prioritize<br />

<strong>The</strong> next step involves prioritizing the replacement of encryption algorithms that generate signatures<br />

requiring long-term trust. This includes securing the roots of trust, firmware <strong>for</strong> long-lived devices, and<br />

other critical components. <strong>The</strong> urgency arises from the fact that encrypted data can be recorded now and<br />

decrypted later by operators of future quantum computers, a practice known as “harvest now, decrypt<br />

later.” <strong>The</strong>re<strong>for</strong>e, any encryption intended <strong>for</strong> long-term use should be the first priority <strong>for</strong> replacement.<br />

Step 3: Test<br />

Furthermore, organizations need to explore and test the incorporation of post-quantum cryptography<br />

algorithms. <strong>The</strong> National Institute of Standards and Technology (NIST) has already selected the final<br />

algorithms <strong>for</strong> PQC standardization, but the development of standards, documentation, and secure<br />

implementation methods is still underway. It may take up to two years be<strong>for</strong>e these algorithms become<br />

widespread. However, implementers of cryptographic libraries and security software should start<br />

integrating these algorithms into their products now. Organizations can also begin exploring how to<br />

incorporate the selected PQC algorithms, as there will be a certain level of ef<strong>for</strong>t required to<br />

accommodate them.<br />

While the deadline <strong>for</strong> federal agencies to submit their inventories of cryptographic systems has passed,<br />

the need <strong>for</strong> all organizations to identify and manage their crypto assets proactively remains. <strong>The</strong><br />

transition to quantum-resistant cryptography is a significant undertaking, but by understanding and<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>August</strong> <strong>2023</strong> <strong>Edition</strong> 118<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!