INCIDENT ACTIVE
ASSESSMENT LIVE
POST-BREACH CYBER RESILIENCE ASSESSMENT
TechCorp SA — Ransomware Incident
A targeted ransomware attack encrypted TechCorp's core financial and customer systems. This dashboard presents the post-breach NIST CSF 2.0 gap assessment, 20 control findings, financial impact modelling and the 90-day remediation roadmap. Grounded in the real SA FinTech breach pattern — R53.1M average SA breach cost (IBM 2024).
20
FINDINGS
7
CRITICAL
R53M
EST. IMPACT
28%
CSF MATURITY
7
CRITICAL FINDINGS
Immediate action
8
HIGH FINDINGS
30-day remediation
28%
NIST CSF MATURITY
Pre-breach baseline
67%
TARGET MATURITY
Post-remediation
NIST CSF 2.0 — PRE vs TARGET MATURITY
GV — Govern
1.0
ID — Identify
2.0
PR — Protect
1.5
DE — Detect
1.0
RS — Respond
1.5
RC — Recover
1.0
Scale: 1.0 (Partial) → 2.0 (Risk Informed) → 3.0 (Repeatable) → 4.0 (Adaptive)
BREACH TIMELINE — WHAT HAPPENED
DAY 0 — 02:17
Initial compromise via phishing email
Finance department employee clicked a malicious link. Credentials harvested. VPN access gained.
DAY 0 — 06:45
Lateral movement across network
Attacker moved from finance workstation to core ERP system. No network segmentation to stop spread.
DAY 0 — 09:23
Ransomware deployed — 847 files encrypted
Financial data, customer PII, operational systems encrypted. Ransom note demands R2.1M in Bitcoin.
DAY 1
Incident declared — external forensics engaged
CISO activates IR plan. External forensic firm engaged. SAPS cybercrime unit notified.
DAY 3
POPIA Section 22 notification submitted
Information Regulator notified. Customer PII confirmed exposed — 14,200 records affected.
DAY 14
Systems substantially restored
Ransom NOT paid. Restored from clean backups. This assessment commissioned to prevent recurrence.
ROOT CAUSE ANALYSIS — WHY THE BREACH SUCCEEDED
NO MFA
VPN access had no multi-factor authentication. Once credentials were harvested via phishing, the attacker had direct network access with no additional barrier.
FLAT NETWORK
No network segmentation between finance workstations and core ERP systems. Lateral movement from one compromised endpoint to every critical system took under 3 hours.
NO EDR
No endpoint detection and response tool deployed. The ransomware executed for over 2 hours before any alert was triggered. By then 847 files were already encrypted.
MATURITY COMPARISON — ALL 6 FUNCTIONS
FUNCTION
BEFORE / TARGET
BEFORE
TARGET
GV — Govern
1.0
3.0
ID — Identify
1.5
2.5
PR — Protect
1.0
3.5
DE — Detect
0.5
3.0
RS — Respond
1.0
2.5
RC — Recover
0.5
2.5
Pre-breach (current)
Post-remediation target
GV — GOVERN
1.0 / 4.0
No formal information security policy. No risk management framework. No supplier security requirements. ISO 27001 implementation not started.
Key gaps: OV-POL-001, risk register, SoA, management commitment
PR — PROTECT
1.0 / 4.0
No MFA on VPN or critical systems. No network segmentation. No EDR deployed. Patch management ad hoc. No DLP tool. Security awareness training absent.
Critical: MFA, segmentation, EDR, patching, awareness
DE — DETECT
0.5 / 4.0
No SIEM. No centralised logging. No anomaly detection. Ransomware ran for 2+ hours before detection. Threat was only discovered when employees reported encrypted files.
Critical: SIEM, log aggregation, EDR alerts, SOC capability
IDCONTROL AREAFINDINGNIST CSFISO 27001SEVERITYSTATUS
F-001MFA / AuthenticationVPN and critical systems lack MFA — direct enabler of breachPR.ACA.8.5CRITICALIN PROGRESS
F-002Network SegmentationFlat network enabled lateral movement from one endpoint to ERPPR.PTA.8.22CRITICALOPEN
F-003Endpoint Detection (EDR)No EDR deployed — ransomware ran 2+ hours undetectedDE.CMA.8.7CRITICALIN PROGRESS
F-004SIEM / Log ManagementNo centralised logging — attack went undetected for hoursDE.AEA.8.15CRITICALOPEN
F-005Incident Response PlanNo tested IR plan — response was ad hoc and delayedRS.RPA.5.24CRITICALIN PROGRESS
F-006Security AwarenessNo phishing awareness training — finance employee clicked malicious linkPR.ATA.6.3CRITICALOPEN
F-007Backup & RecoveryBackups untested — recovery took 14 days instead of RTO target of 4hRC.RPA.8.13CRITICALIN PROGRESS
F-008Patch ManagementCritical patches 6+ months overdue on ERP server — exploited by attackerPR.IPA.8.8HIGHIN PROGRESS
F-009Access Control (PAM)Privileged accounts not managed — admin credentials reused across systemsPR.ACA.8.2HIGHOPEN
F-010Data Loss PreventionNo DLP — 14,200 customer PII records exfiltrated undetectedPR.DSA.5.12HIGHOPEN
F-011Vulnerability ScanningNo vulnerability scanning programme — unpatched CVEs present for monthsID.RAA.8.8HIGHOPEN
F-012Asset InventoryNo comprehensive asset register — shadow IT exposed unknown attack surfaceID.AMA.5.9HIGHIN PROGRESS
F-013Third-Party RiskNo vendor risk assessments — IT support contractor had excessive accessGV.SCA.5.19HIGHOPEN
F-014Email SecurityNo advanced email filtering — phishing email bypassed basic spam filterPR.ATA.8.7HIGHIN PROGRESS
F-015Encryption at RestCustomer PII database not encrypted — exfiltrated data immediately readablePR.DSA.8.24HIGHOPEN
F-016POPIA ComplianceNo POPIA breach response procedure — S.22 notification delayed 3 daysGV.POA.5.31MEDIUMDONE
F-017BCP / DR PlanBCP existed but untested — manual fallback procedures unknown to staffRC.IMA.5.29MEDIUMIN PROGRESS
F-018Password PolicyNo enforced password complexity or rotation — weak credentials on VPN accountsPR.ACA.5.17MEDIUMDONE
F-019Mobile Device ManagementNo MDM — personal devices accessing corporate systems without controlsPR.ACA.6.7MEDIUMOPEN
F-020Security PolicyInformation security policy outdated — last reviewed 3 years agoGV.POA.5.1MEDIUMDONE
INCIDENT PARAMETERS
Records Exposed 14,200
Downtime (days) 14
Revenue per day (R) R850,000
Staff affected 85
SA BENCHMARK DATA
Average SA breach cost (IBM 2024): R53.1M
Average SA downtime: 23 days
POPIA fine (maximum): R10M or 10%
Reputational loss multiplier: 1.4x–2.1x
ESTIMATED TOTAL IMPACT
R0
COMBINED FINANCIAL EXPOSURE
COST BREAKDOWN
Revenue loss (downtime)R0
Incident response & forensicsR0
Regulatory fines (POPIA)R0
Customer notification costsR0
Remediation & hardeningR0
Reputational damageR0
PHASE 1 — DAYS 1–30 · CRITICAL
STOP THE BLEEDING
Deploy MFA on all systems
VPN, email, ERP, admin consoles. Eliminates credential theft as attack vector. NIST PR.AC — ISO A.8.5
Deploy EDR across all endpoints
CrowdStrike, SentinelOne or Microsoft Defender. Real-time ransomware detection. NIST DE.CM
Emergency patch cycle
All critical CVEs (CVSS 9.0+) patched within 14 days. NIST PR.IP — ISO A.8.8
Segment finance & ERP network
VLAN isolation prevents lateral movement. NIST PR.PT — ISO A.8.22
PHASE 2 — DAYS 31–60 · HIGH
BUILD DETECTION
Deploy SIEM / log aggregation
Splunk or Microsoft Sentinel. Centralised logging with alerting rules. NIST DE.AE — ISO A.8.15
Implement PAM solution
Privileged access management — rotate all admin credentials. NIST PR.AC — ISO A.8.2
Test backup & recovery
Full DR test. Verify RTO of 4 hours is achievable. NIST RC.RP — ISO A.8.13
Security awareness training
Mandatory phishing training for all staff. Simulated phishing campaigns. ISO A.6.3
PHASE 3 — DAYS 61–90 · MEDIUM
SUSTAIN & GOVERN
Begin ISO 27001:2022 ISMS
Scope, risk assessment, SoA, policy suite. NIST GV — ISO Clause 4–6
Vendor risk assessments
Assess all IT suppliers and contractors. POPIA operator agreements. ISO A.5.19
Encrypt customer PII database
AES-256 at rest. POPIA Section 19 compliance. ISO A.8.24
Monthly vulnerability scanning
Nessus or Qualys. Continuous posture management. ISO A.8.8
NIST CSF 2.0 MATURITY TARGETS — 90-DAY GOAL
FUNCTIONCURRENT30-DAY60-DAY90-DAYKEY ACTIONS
GV — Govern1.01.52.03.0Policy, risk register, ISMS scope
ID — Identify1.52.02.52.5Asset inventory, vulnerability scanning
PR — Protect1.02.02.53.5MFA, EDR, segmentation, patching
DE — Detect0.51.52.53.0EDR, SIEM, log aggregation
RS — Respond1.02.02.52.5Tested IR plan, POPIA S.22 procedure
RC — Recover0.51.52.52.5Tested BCP, verified RTO