Preparing for denial-of-service attacks with Talos Incident Response

AVvXsEiCKjGU2SdSosmDSbum3RqhvE5bCMvwxA2mrY_mqI1I40uhMw26WzjpHTMmhAAYlscq7Gk7FKclG8Gl4Ebw6igogDAtxAp2ub1XRiHrFolPGCEd1jyR6myTf7dLZTSgtEct1c_y07gD5GEFsvYYYxKXLH8MTYn_eIB5RTxHiUthfxXJMDqArYqeVSuj=w1200-h630-p-k-no-nuPreparing for denial-of-service attacks with Talos Incident Response>
Talos Blog – Yuri Kramarz
There are three types of DDoS attacks, and each might require different procedures. These attacks are measured in bits per second.

Volumetric DDoS Protocol DDoS Application DDoS Planning for DDoS attacks is crucial to Business Continuity Planning (BCP). Organizations need to assess its continuity planning in a formal risk assessment procedure that reflects the true state of the businessâs infrastructure and services. The consequences of DDoS can be only understood and appreciated when the true attack surface of available services (i.e., network, connectivity, bandwidth, and devices) is known by the business.

Assess external attack surface by performing a formal asset discovery Assess the impact of the DoS attack on back-end systems such as databases, routers, and switches Identify any systems that are a single point of failure Review your incident response (IR) plan Ensure that ISP contact details are known High-performance DDoS devices should be deployed externally to auto-mitigate DDoS attacks. Harden external devices, including operating system and application stacks Reduce ânoiseâ in your environment through proper device configuration. Use Content Delivery Networks (CDNs) for static content. Ensure that the organization is ready for an incident
Link: https://blog.talosintelligence.com/2022/03/preparing-for-denial-of-service-attacks.html


Categories:

Tags: