This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Anti-Ransomware Guide Project"
(→Acknowledgements) |
|||
(34 intermediate revisions by the same user not shown) | |||
Line 7: | Line 7: | ||
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | ==The OWASP Anti-Ransomware Guide== | |
− | |||
− | |||
− | |||
− | |||
− | + | Open up any newspaper or news site and an increasingly common headline is becoming “hospital held for ransom”. While hospitals and other organizations often have downtime procedures that let them revert back to paper for dealing with power outages and other disasters, it is still a nightmare scenario to find your entire organization's IT infrastructure screeching to a halt all because someone clicked on a malicious link or opened a questionable email attachment. Moreover, many organizations have a significant number of legacy systems that make security a challenge and beyond very basic security provisions often do not have a corporate culture that is heavily focused on information security. This has left many organizations struggling with how to handle ransomware attacks. The below is meant to serve as a comprehensive defense in depth based checklist and guide to preventing ransomware from taking a foothold in your organization as well as ensuring the proper procedures are in place to deal with an actual ransomware outbreak in your environment. Given the prevalence of Windows systems as ransomware targets, the guide is geared towards a Windows environment but is designed to be product agnostic. Please note that the list is designed to be comprehensive and as such not all controls may be applicable to all environments. | |
− | + | ==Project Description== | |
− | |||
− | |||
− | + | A guide and checklist organizations can use as the basis for creating a defense in depth strategy for combating ransomware and other types of malware. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Licensing== | ==Licensing== | ||
− | + | '''The OWASP Anti-Ransomware guide is free to use. In fact it is encouraged!!! | |
− | + | '' Additionally, we also encourage you to contribute back to the project. | |
− | |||
− | |||
− | + | The OWASP Anti-Ransomware Guide is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. | |
− | |||
− | |||
− | |||
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | ||
| valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | ||
− | == | + | == Project Leaders == |
− | + | * [https://www.owasp.org/index.php/User:Cfrenz Christopher M Frenz] | |
− | + | * Christian Diaz | |
− | |||
− | |||
− | + | == Download == | |
+ | * [https://www.owasp.org/images/3/3f/Anti-RansomwareGuidev2.pdf Version 2.0] | ||
+ | * [https://www.owasp.org/images/6/64/Anti-RansomwareGuidev1-7.pdf Version 1.7] | ||
+ | * [https://www.owasp.org/images/c/ca/Anti-RansomwareGuidev1-6.pdf Version 1.6] | ||
+ | * [https://www.owasp.org/images/4/4a/Anti-RansomwareGuidev1-5.pdf Version 1.5] | ||
+ | * [https://www.owasp.org/images/9/98/Anti-RansomwareGuidev1-4.pdf Version 1.4] | ||
+ | * [https://www.owasp.org/images/5/5f/Anti-RansomwareGuidev1-3.pdf Version 1.3] | ||
+ | * [https://www.owasp.org/images/8/8b/Anti-RansomwareGuidev1-2.pdf Version 1.2] | ||
+ | * [https://www.owasp.org/images/d/d3/Anti-RansomwareGuidev1-1.pdf Version 1.1] | ||
+ | * [https://www.owasp.org/images/a/a8/Anti-RansomwareGuide.pdf Version 1.0] | ||
− | + | == Spanish Translation == | |
+ | * [https://www.owasp.org/images/3/39/Guia_Contra_Ransomware.pdf Spanish Version 1.4] | ||
== Presentation == | == Presentation == | ||
− | + | * [https://youtu.be/bPyNzP7Gqig VMworld 2017] | |
− | + | * [https://www.slideshare.net/cfrenz/mockincidentsnymjcsc2016 NYMJCSC Presentation] | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | * [https:// | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | * [https://www. | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
== News and Events == | == News and Events == | ||
− | + | * [http://nymjcsc.org/ 2016 NYMJCSC] | |
− | + | * [https://iapp.org/news/a/why-the-wannacry-outbreak-should-be-a-wake-up-call/ IAPP Privacy Tech] | |
− | + | * [http://vmware.cioreview.com/cxoinsight/mitigating-malware-attacks-with-a-nsx-enabled-zero-trust-network-nid-24589-cid-71.html CIO Review] | |
− | + | * [http://www.laprensagrafica.com/2017/06/27/ataques-ciberneticos-solo-iran-en-aumento-a-menos-que-se-tomen-estas-medidas La Prensa Grafica] | |
− | + | == Scripts == | |
− | * [ | + | * [https://www.owasp.org/images/b/b8/DomainSubs.zip Compute Phishing Domain Substitutions] |
− | == | + | ==Classifications== |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
{| width="200" cellpadding="2" | {| width="200" cellpadding="2" | ||
|- | |- | ||
− | | align="center" valign="top" width="50%" rowspan="2"| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects | + | | align="center" valign="top" width="50%" rowspan="2"| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]] |
− | |||
|- | |- | ||
| align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=]] | | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=]] | ||
Line 165: | Line 79: | ||
=FAQs= | =FAQs= | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==How can I participate in your project?== | ==How can I participate in your project?== | ||
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. | All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. | ||
− | ==If I am not a | + | ==If I am not a security expert can I participate in your project?== |
− | Yes, you can certainly participate in the project if you are not a | + | Yes, you can certainly participate in the project if you are not a security expert or technical. The project needs different skills and expertise and different times during its development. |
= Acknowledgements = | = Acknowledgements = | ||
Line 192: | Line 100: | ||
= Road Map and Getting Involved = | = Road Map and Getting Involved = | ||
− | + | Road Map | |
− | + | ||
− | + | Use the feedback received from version 1 of the document and use it to create an even more robust and comprehensive version 2 of the guide. | |
− | |||
− | + | Get Involved | |
− | |||
− | |||
− | + | Involvement in the development and promotion of OWASP Anti-Ransomware Guide Project is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help: | |
− | |||
− | |||
− | |||
− | |||
− | + | Suggest Additional Security Controls | |
− | + | Proof Reading | |
− | + | Graphic Design | |
− | + | Educate local communities | |
− | |||
− | |||
− | |||
=Project About= | =Project About= | ||
− | + | {{Template:Project About | |
− | + | | project_name =OWASP Anti-Ransomware Guide | |
− | + | | project_description =A guide and checklist organizations can use as the basis for creating a defense in depth strategy for combating ransomware and other types of malware. | |
− | + | | project_license =Creative Commons Attribution-ShareAlike 3.0 license: [http://creativecommons.org/licenses/by-sa/3.0/ | |
− | + | | leader_name1 = Christopher Frenz | |
− | + | | leader_username1 = cfrenz | |
− | + | }} | |
Latest revision as of 16:22, 17 December 2019
The OWASP Anti-Ransomware GuideOpen up any newspaper or news site and an increasingly common headline is becoming “hospital held for ransom”. While hospitals and other organizations often have downtime procedures that let them revert back to paper for dealing with power outages and other disasters, it is still a nightmare scenario to find your entire organization's IT infrastructure screeching to a halt all because someone clicked on a malicious link or opened a questionable email attachment. Moreover, many organizations have a significant number of legacy systems that make security a challenge and beyond very basic security provisions often do not have a corporate culture that is heavily focused on information security. This has left many organizations struggling with how to handle ransomware attacks. The below is meant to serve as a comprehensive defense in depth based checklist and guide to preventing ransomware from taking a foothold in your organization as well as ensuring the proper procedures are in place to deal with an actual ransomware outbreak in your environment. Given the prevalence of Windows systems as ransomware targets, the guide is geared towards a Windows environment but is designed to be product agnostic. Please note that the list is designed to be comprehensive and as such not all controls may be applicable to all environments. Project DescriptionA guide and checklist organizations can use as the basis for creating a defense in depth strategy for combating ransomware and other types of malware. LicensingThe OWASP Anti-Ransomware guide is free to use. In fact it is encouraged!!! Additionally, we also encourage you to contribute back to the project. The OWASP Anti-Ransomware Guide is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. |
Project Leaders
Download
Spanish TranslationPresentationNews and EventsScriptsClassifications
|
How can I participate in your project?
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key.
If I am not a security expert can I participate in your project?
Yes, you can certainly participate in the project if you are not a security expert or technical. The project needs different skills and expertise and different times during its development.
Contributors
The OWASP Anti-Ransomware Guide project is developed by a worldwide team of volunteers.
The first contributors to the project were:
- Christopher M Frenz
- Christian Diaz
Road Map
Use the feedback received from version 1 of the document and use it to create an even more robust and comprehensive version 2 of the guide.
Get Involved
Involvement in the development and promotion of OWASP Anti-Ransomware Guide Project is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
Suggest Additional Security Controls Proof Reading Graphic Design Educate local communities
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|