Nations across the globe are taking regulatory action to reduce the ransomware threat. In March, for example, new U.S. ransomware reporting requirements were signed into law. Covered entities that experience a cyber incident must report it to the Cybersecurity and Infrastructure Security Agency (CISA) within 72 hours after the covered entity believes that the incident occurred. Additional guidance is still being worked on but at a minimum the following requirements will be included:
- Identify and describe the function of the affected information systems, networks that were, or are reasonably believed to have been affected by such cyber incident.
- Describe the unauthorized access with substantial loss of confidentiality, integrity, or availability of the affected information systems or network or disruption of business or industrial operations.
- Estimate the date range of such incident.
- Assess the impact to the operations of the covered entity.
- Report ransomware payments within 24 hours after they have been made.
- Submit any new or different information that becomes available surrounding the ransomware attack to CISA.
- Preserve data relevant to the covered cyber incident or ransom payment.
Think of that list. Would you be able to report within 72 hours that you’d had a ransomware incident? Wouldn’t you still be in the middle of trying to recover from an incident? This is often the major difference between smaller businesses and larger businesses. Small businesses just want to get back in business. They often don’t want to deal with the reporting side or, worse, would not have the means to notify every impacted customer that their data is at risk.
While ransomware notification is not yet mandated, data breach notifications are for many firms. The application for a cyber insurance policy for my firm asked for the number of people whose personal identity information was in my network. Businesses often have information siloes and hidden databases that we are unaware of and are not protecting.
Managing compliance through Microsoft Purview
Microsoft has products to help the Microsoft 365 customer identify and know how to better protect such information, but this compliance category of software and services is not often talked about other than in large enterprises. Microsoft’s compliance products have had a recent name change. They are now called “Purview.”
You’ll want to test out various compliance options the Purview portal. The same information it provides for the European Union’s General Data Protection Regulation (GDPR), for example, might also be relevant to your firm’s other data breach notification requirements. Financial firms might want to review the guidance for the U.S. Gramm-Leach-Bliley Act (GLBA), which mandates consumer privacy. It’s an eye opener to think of all the world-wide governing regulations that may impact your firm that you aren’t aware of.
You can review in the Purview portal what potential adjustments and changes you need to make in your organization. Like other Microsoft consoles, the Purview console rates your organization and provides you with a compliance score that you can increase. With solutions ranging from data loss prevention, ediscovery, information protection, insider risk management, and records management, the ability to begin the process of better analyzing the information you have inside your firm will help you discover those hidden siloes of information and databases you didn’t realize you had.
Setting rules in Purview
Too often we focus on outside attackers and forget about the inadvertent internal “oopsie” that may release sensitive information. For example, in the Purview compliance console you can set up a communication compliance rule that monitors email, Teams and Yammer conversations for sensitive information. You can set up custom lists of items like the one below to be flagged should they be seen entering or leaving the firm. The Purview administrator will then be alerted when such information is not protected appropriately:
- ABA routing number
- Australia bank account number
- Australian company number
- Austria tax identification number
- Credit card number
- Croatia personal identification (OIB) number
- Czech personal identity number
- EU driver’s license number
- EU national identification number
- EU social security number (SSN) or equivalent ID
- EU tax identification number (TIN)
- Germany tax identification number
- Hungarian social security number (TAJ)
- India unique identification (Aadhaar) number
- International classification of diseases (ICD-9-CM)
- Japanese my number personal
- Luxembourg national identification number (non-natural persons)
- Malta tax ID number
- Netherlands tax identification number
- New Zealand Inland Revenue number
- New Zealand Ministry of Health number
- New Zealand Social Welfare number
- Polish REGON number
- Portugal tax identification number
- Slovakia personal number
- Slovenia tax identification number
- U.S. bank account number
- U.S. driver’s license number
- U.S. Social Security number (SSN)
The console even considers internal issues such as monitoring communications for offensive or threatening language. You can create a policy that uses pretrained classifier to detect content containing profanities or language that might be considered threatening or harassment.
Keep an eye Microsoft Purview and the additional guidance and resources the service brings to help you with your identification of compliance data. While the service tends to be geared at this time toward large enterprises and government entities, as more and more privacy and data loss notification legislation gets implemented, even smaller firms will be looking for such compliance resources.
Copyright © 2022 IDG Communications, Inc.