Framework Category

Technology Infrastructure Resilience

Technology Infrastructure Resilience ensures that networks, systems, and environments remain secure and operational under both normal and adverse conditions.

It includes protection against unauthorized access and environmental threats, as well as maintaining sufficient capacity and resilience mechanisms to ensure continuous availability.

Implementation Questions

PR.IR-01

Networks and environments are protected from unauthorized logical access and usage

Has your organization implemented network segmentation that separates different trust boundaries and platform types, with controlled communications between segments?

Network segmentation involves dividing your network infrastructure into distinct zones based on security requirements, data sensitivity, and functional purposes. This includes separating IT networks from operational technology (OT), IoT devices, guest networks, and other specialized environments, with firewall rules or access controls that permit only necessary traffic between segments. Proper segmentation limits the potential impact of security breaches by containing them within a single segment rather than allowing lateral movement throughout the entire network.

Has your organization implemented network segmentation to isolate internal networks from external networks, with controls that restrict inbound traffic to only necessary communications?

Network segmentation creates boundaries between different parts of your network, limiting the ability of attackers to move laterally if they gain access. By restricting inbound traffic from external networks to only what is necessary for business operations, you reduce the attack surface and potential entry points for threats. This includes implementing technologies like firewalls, access control lists, and DMZs to create security zones.

Has your organization implemented a zero trust architecture that restricts network access to each resource based on the principle of least privilege?

Zero trust architecture operates on the principle that no user or system should be inherently trusted, requiring continuous verification before granting access to resources. This approach involves microsegmentation of networks, strong identity verification, and just-in-time, just-enough access controls to minimize the attack surface. Implementing zero trust helps prevent lateral movement by attackers if a system is compromised, as each resource has its own access controls regardless of network location.

Does your organization perform endpoint health checks before allowing devices to access production resources?

Endpoint health checks verify that devices meet minimum security requirements (such as up-to-date antivirus, patched operating systems, and enabled security controls) before they can connect to production environments. This helps prevent compromised or vulnerable devices from accessing sensitive resources and potentially spreading malware or enabling unauthorized access throughout your network.

PR.IR-03

Mechanisms are implemented to achieve resilience requirements in normal and adverse situations

Has your organization implemented redundancy measures to eliminate single points of failure across all critical systems and infrastructure?

Single points of failure represent vulnerabilities where the failure of one component can cause an entire system or service to fail. Organizations should implement redundancy through techniques such as clustering, load balancing, failover systems, and geographic distribution of resources. This includes redundant network paths, power supplies, hardware components, and data storage solutions.

Has your organization implemented load balancing solutions to enhance system capacity and reliability?

Load balancing distributes workloads across multiple computing resources to prevent any single resource from becoming overwhelmed, which improves both system performance and availability. By implementing load balancing, organizations can maintain service continuity during traffic spikes, hardware failures, or maintenance activities, reducing the risk of service disruptions that could impact security or business operations.

Has your organization implemented high-availability components such as redundant storage and power supplies to ensure system reliability?

High-availability components help minimize system downtime by providing backup mechanisms that automatically take over when primary components fail. Examples include redundant storage arrays (RAID configurations), uninterruptible power supplies (UPS), redundant network paths, and clustered servers configured for automatic failover.

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron