Cybersecurity frameworks like the NIST Cybersecurity Framework can be used to help guide security on WordPress websites with these tips.
Wordfence-Logo.png (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yPy3pdqSV1-WJV7CgLzHW1kBrRL4Xjxs-W7qF_y759534KVt1Mtr232jsNN4BD-cqyJBTsN5N9ylkZQK3GW55h4QB5wNB2-W8trzZC7mPRpYW5wYtVZ1YCPBRW3cR3715gvMp3VPdZYT5KHY9MW6mSz3b2YPDsmW1RJpH55m2YMVV4D3j4578V3JN45kq05jcwt2W8mgxLS8pYhn-W2krZWZ22hLtkW8xL_hw4K4vSRW5rbGXg5L21-rVQPX7Z9ft_vPW8WVTyn3G8zq232s31 )
NIST Featured Image (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yR13pdskV1-WJV7CgLmvW1kr8QJ7hqLYzW8WNTlJ8vjvqJW4MMVll7yBFJjW35yWgX1QlQ7gVxdQdp8y01sNW8VLzGv2ZZvrCW1vjS7s82d0nxN7kgfZvjndT5W87PBzn1Pnf5pW3c_2kh4MKbTmW34LYXY8dlwv1W5NZJgh4cgVV9W5G9ZtR3VFp6rVv5Czy1W8GPYW7GB2TS3qy8fFW1DBLBH1Q1M_LW9lTMLK4FBGc_W3Q3y8m8LttqwV_Hfpk6dlSvsW1yDkSh4Mp7MgW1sp6P12z1JZRW86fc3L5D03XfW7Ksvqs1VWWx5W4zv4yt41RSyCW7DPlsf8xqchPVSq_k99cQ54wV6NfKF4LDHbrV6ZfS7920pw5W1qPK1b7SxmKnW6kLtbP4zF5jF3jTy1 )
When setting up a WordPress website, it is easy to focus on the look and feel of the website, while overlooking the important aspect of security. This makes sense, because the security of a website is largely invisible until something goes wrong. Installing a cybersecurity plugin like Wordfence (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yPy3pdqSV1-WJV7CgLzHW1kBrRL4Xjxs-W7qF_y759534KVt1Mtr232jsNN4BD-cqyJBTsN5N9ylkZQK3GW55h4QB5wNB2-W8trzZC7mPRpYW5wYtVZ1YCPBRW3cR3715gvMp3VPdZYT5KHY9MW6mSz3b2YPDsmW1RJpH55m2YMVV4D3j4578V3JN45kq05jcwt2W8mgxLS8pYhn-W2krZWZ22hLtkW8xL_hw4K4vSRW5rbGXg5L21-rVQPX7Z9ft_vPW8WVTyn3G8zq232s31 ) significantly reduces the chances of a successful attack on a WordPress site. What no software can fully protect is the human element. This is where cybersecurity models and frameworks come in. We discussed one cybersecurity model, the CIA Triad (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yNZ5mNXrV3Zsc37CgTGhW8l4rVW2Cy488N6cZwdrxRVPrW1M-7xC1jMW4yW35NzLV43V-jcVLlw8m1Kc53WW8lbzxj701sWPVdgj3K8r0-QJV5p-KW5g2NwSVB88R98HZBQ5W6SYJlc7llmvpW8ZZwly1bLwyzW7MR78l7zqLzSW2WGtz_2DX7L-W5T4QBN2fBMlPW2S2nSK87X3d6W7w8B5M3Q0_9RVH6Z233SZwP_W5dWcx28l-m0FW1cGbXG5Rpd0VW4w7DR73h7_lgW1s_0S_8H03LYN89c2qQ3Y-RkW73VhjQ5JGPPLW116mfQ4bmxD0W8sm-Bk4Xqt8pN39rBsSPM7DfN3r48LbXcyftW5-ytT34pJK4cW7B_sBb3Tt0N0N7PZkrDnQzNZW1vqN9C1XTRtjVHPSbK47YZBl3nxc1 ) , a few months ago. There are other models and frameworks that each have their own strengths and weaknesses, depending on how they are implemented.
Cybersecurity frameworks are a common tool used by organizations to protect their networks, systems, and digital assets. One well-known framework is the National Institute of Standards and Technology (NIST) Framework Core, which consists of Five Functions. While the NIST Framework Core is often associated with securing government networks, the same principles apply to WordPress websites as well.
This email content has also been published on our blog and you're welcome to post a comment there if you'd like to join the conversation. (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yR13pdskV1-WJV7CgLmvW1kr8QJ7hqLYzW8WNTlJ8vjvqJW4MMVll7yBFJjW35yWgX1QlQ7gVxdQdp8y01sNW8VLzGv2ZZvrCW1vjS7s82d0nxN7kgfZvjndT5W87PBzn1Pnf5pW3c_2kh4MKbTmW34LYXY8dlwv1W5NZJgh4cgVV9W5G9ZtR3VFp6rVv5Czy1W8GPYW7GB2TS3qy8fFW1DBLBH1Q1M_LW9lTMLK4FBGc_W3Q3y8m8LttqwV_Hfpk6dlSvsW1yDkSh4Mp7MgW1sp6P12z1JZRW86fc3L5D03XfW7Ksvqs1VWWx5W4zv4yt41RSyCW7DPlsf8xqchPVSq_k99cQ54wV6NfKF4LDHbrV6ZfS7920pw5W1qPK1b7SxmKnW6kLtbP4zF5jF3jTy1 ) Or you can read the full post in this email.
The Five Functions in the NIST Cybersecurity Framework Core are identified as the Identify, Protect, Detect, Respond, and Recover phases. Each phase describes an important aspect of securing an organization’s physical and digital assets. Rather than a list of dos and don’ts, these were written to be guidelines that help in making decisions that affect organization’s risk management. The best way to view this is as a cycle that is repeated whenever there is a cybersecurity incident or change to the protected assets.
NIST Five Functions (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yNZ5mNXrV3Zsc37CgYngVnQlPd1tJ4TBW761Zrv5KzYK1Vt1y4Q4nJN_HW1WGQQz4tl0z8W4DwzvM1mT3RgV_L1h9543KVcVLtDpz91fmv3W8L25YG6xwg9FW3R0-hG4N9KYgW6sNZTT4RY2JqW4qDPb97BCv8QW2nG7hS2k7YQ1W7LF4pB7jTQRnW5j5B_Q77z55TW6RkGL635BBC8N2FL3X46r_TKW22ppWL2tGSmCN3mwqchHvJ09V76MxK9bwBynVxgx1H5SL1BGW9jnF5w9cD2jNW3T-TNL4H_wWvW43KRsr92kT53W7llxZB4GcYxJVKNT5695D4GmN4N_Ws0W6g_KW59tvFX7sdV9YW5CNNjL7BJgQgW7zJLlM8ylSw9V2D8dx71VCTjW2P-70Q1vrwK3W7N2Lnt1LHpLF3jr61 )
Identify
The Identify function helps to identify any assets that need some form of cybersecurity protection. This includes physical assets like servers, digital assets like software, and even people. In this phase, it is important to make a list of all assets and the maintenance or security that they require. Any time there is a cybersecurity incident, or a change to the physical or digital systems in place, this phase should be revisited to ensure that changes are accounted for. New cybersecurity measures are considered in this phase, taking into account both individual systems, and how those systems interact with each other.
WordPress websites have many parts, both physical and digital. Even if a site is not hosted on a server that is physically controlled by the site owner, the server itself must still be a consideration of the site owner. Choosing a host that is trusted and has a record of using proven cybersecurity practices helps to ensure that the chances of a compromise of the server itself is minimized. If a malicious actor is able to access a compromised server, they may be able to make changes that can lead to modification of website files and databases, as well as locking the site owner or administrator out of their hosting environment control panel. One method of maliciously controlling accounts through a compromised host was discussed in our breakdown of the Anonymous Fox F-Automatical script (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yNZ5mNXrV3Zsc37CgCLvVf4G3y3km9PvW49CqTP6hXzVrW10Ys0H6FbJkdW3mxXG78TyrgtW3WCbvg1299nZW84FFy38m-th9W3r8mPq7RGFYCW2CyfnZ1Rtr0FW3PQKyg7jybq2Vy1_xs795zY6W1QG7GF2Y-hPFW2gNw6M4qg7TLW6JZ3lS5Dk5DQW6Mw4cp8R-bQnW1z2G753MsS-5W801kvN4YCJGnW7kQSMK5_FMg9W65V3XR6RZ6n4VYBjG77zSCJbW16lH-v5tLzr_W6CslzX4V6yRmW2rR8-58WQV5wW4vg3sD1VtHYMW6mns_T8zMWxrW3p5-mr9l-1NgN4jVNSKPS138W143V6M82CpP2W2HtMMP7c-D_7N43b_Md70w5wW3yCM5m89CCkRW5rkMdF8JlSMVW97cZNb8MD-w6383L1 ) , where part of the script could be used by threat actors to change passwords on compromised WHM or cPanel accounts which can help a threat actor to maintain persistence.
In addition to physical assets, all software used needs to be accounted for as well. On a WordPress site, this means WordPress core, themes, and plugins. Any underlying technologies may also need to be cataloged. If not managed by the host, then the site owner will also need to ensure that appropriate updates processes and cybersecurity considerations are taken into account for the web server software (Apache, Nginx, etc.), the PHP version, and any other software the site relies on for proper operation. Once all physical and digital assets have been cataloged, appropriate cybersecurity measures will need to be determined.
Protect
The Protect function guides the implementation of resources that will reduce the impact of a cybersecurity incident and prevent it from spreading. It is one thing to catalog your assets and determine appropriate cybersecurity measures, but those measures also must be implemented in order to be effective. Physical security will be implemented in this phase as possible, and any site administrator will be implementing digital security security solutions, such as Wordfence Premium (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yQ73pdrrV1-WJV7CgGcCV53MZV3Y3bBGVVgG_J1qJbBYW8xpjzS6yKtHFW5YCsyY39QKV6N8SlbYvNMfdhVKVxdr647XWsW3KZmyP3Wzdj4W1fC5kp2XGsRWVND8185CSB7_W23Rqzz7HWNQPW7LXf0M5J3N2mW2N10zj7h68lcW276pcG1T15WcW6m6l-_4m-Sk7W6XQt-p6HH-mcW1CxwHT755VfLW1MX5j48JKJTWW7c-ZD08bgZZ6VsNgJV5jhBqHW8nsh2-9d3sSbW7xHm096jRXJVW1jmKg-6mxMDXW8pXWkV3Fpvv1W1j1SZN97rz1r3bHv1 ) , to protect against existing and new threats to the website. With these measures in place, threat actors can be stopped before their attacks have a chance at success, and malware can be quickly removed from an infected website.
Based on the most recent 12 months of data, the Wordfence firewall detects and blocks an average of 4,603,076,842 attack attempts across 4 million protected websites every month. In the year of data reported here, the Wordfence firewall blocked 30,488,640,718 attack attempts based on identified malicious activities, and 24,748,281,391 attempted password attacks. This means that on average more than 1,100 attack attempts are thwarted against each website every month, without any negative impact to the website. If websites with vulnerabilities or administrator accounts with weak or leaked passwords were left unprotected, they could be used in data theft schemes, as a platform to disseminate malware, or for a number of other malicious purposes.
NIST WAF (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yNZ5mNXrV3Zsc37CgBz7W39M6Tm3HZJnJW8zfBd173QBJ4W7-Yb1T7lKnfLN88Ngd-tTjywW37vSjd14NqhVW41r0jp8pxG55Vnvf2Y7THKNZW8yLWMS4nFjZ0W2j80y11Mm8NLW4lrLSW6FJmnZW2h0C4X42MwpkW1QBB4K7-NZtgW5HdNKK5xXWBZW47BBcN3LsxPVW5n3Y0l7-hdrgW2bjb4N7MQNLtW4NtyBF2JWGd8W1xbvtW1ZLKdKVkSFf_8qWFytW5MWhGw99n_lrW8ndSj11W1S0pVKRz-g6BVnfqVgHLgZ1KcSf5W1CS80338ccchW4j8PhB44l46rW7179B662rx6CW5GzXKF5Gy7LCVHyWBl2PFxm8W1S-VHW4g_S0yW55hGqw3Bj-qxW8ZdrzN5CysqXW6NwZql7PdRv23bbz1 )
Regular maintenance is a large part of the Protect phase as well. One of the best ways to keep WordPress websites secure is to keep WordPress, themes, and plugins updated with the latest security updates. Additionally, the software behind the website, like Apache and PHP, will need to be maintained as well. Whenever possible, best practice may be to enable automatic updates. If automatic updates are not possible, it is important to regularly check for available updates and manually update as soon as possible after a new version with security fixes is released.
Along with any physical and digital security measures, it is also important to keep in mind the people behind the website. Anyone who assists in managing the website will need to be considered an asset, and a potential cybersecurity risk. This means implementing access controls like user roles and two-factor authentication (2FA) (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yQ73pdrrV1-WJV7CgZyyW2G2n-y8DPP2_W84NsgN8tpjF7W3rkymf6WnCPZW7p0rLc5yFkF-V4t6wT1M9YpYW57BP-51gFfrjV3t2X2909WpSW53QKv02vfX_NW40Spnd1tkGhHW4T4zGD97w5xKN8MbWZkvsn2kW6h21Vl4tdhf5W55ZzL_5lK3l8W2XH19q61KvXWN8f08Mch3QNcW878nzk4yvNS5W68h7Hh8s_h90W7Vk4js6JMBhmW650_br8h60WnW9g8vGT7hKG1fW3wJtNV7FRQbVW7MmCL55m5MDHW7nd8421j-cthW6CRtPP8MWMq33bGs1 ) , utilizing the principle of least privilege by limiting access to roles, and training anyone who helps in the management of the website on cybersecurity best practices.
Detect
The Detect function outlines and implements methods, systems, and software that help to identify a cybersecurity incident rather than allowing it to continue unseen. Detection is one of the most important steps in keeping a website safe, as the unseen cannot be stopped. Regular scanning of files is critical, as is monitoring of website traffic. If malicious behaviors are detected prior to a malicious payload being delivered, then an attack can be rendered ineffective before it can truly begin.
It is important to run regular scans for malware on your website. Wordfence includes one of the industry’s largest WordPress-specific malware databases to scan websites and alert administrators of any malware found in their website files. The Wordfence Scanner detects malware from an average of 173,449,409 files each month. Armed with the scan results, administrators may be able to identify infected core, plugin, or theme files that need to be reinstalled.
NIST Malware (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yNZ5mNXrV3Zsc37CgVwyVBs3md8JsB_lW8zsFvH5sHF4FW1kYSqD4xQybXN70VR9NvF7WmV_QcpM5Gk7TRW7YQdG71F1yYVW23HgFW95dk1WW7dHTsF8hM4WnW1lwXJd8FgYnhV38CLM5WtFZCW8NrG592k6d3jW7QDnNx4X99pFW1XRMM33xLt-sW3W52hJ5cvzlBW8XxVjr43Hz61W7cVgq72F0NP8W6Jbk9Q3kkGwbW8gkXC54pdWMtW7yMs2R7_31xjW90Jg5786D8FJN7qXktRkN-dYW17S1cY8zh6J2W6mlT8Z765p_7W30Zhrq6J97CjW8XLTTG94vbBmW7d0r4q3Q8sG0Vs6Qd16vXzGNW9dnc-Z427N63W2nyw-04xLQ5mW4FCClR4TRMDMW2lGM7n3X9KN-W1mNj4q7_6w0Z38mc1 )
Monitoring website traffic can also help to detect threats. Wordfence Live Traffic (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yQ73pdrrV1-WJV7CgGzNW3_gb5B2c2WcGW4BmLmF6m_LhJVH-r3Y740Qt9W6HdF2-6KsvJ8MTw3G6ms9lvW7jBHYf6klL4XW706zfZ88KHqvW1NkXYG4VNcW9W22LjM-7Gy5zgW2S194D3jNkD-N38zy3dPzZctV48Nz73fgNXFW6QbmDb7XY5JjW3lJ2bg76SWnvW6Q1Csk7hGJDpW4fTG9t5tcqnHW1gkq6-1J3sXXW7Q1zyp467MWBW7xCzM84NG0jJW3WpPcd5c8Bv5W5lqML96VbxC0W85pJ_-4KwmB_W4qDmYt1g-LcrW5B90m-5686tD32dw1 ) monitors and tracks all activity on the website, logging the IP address, location, time, browser, and page being visited by any human or bot accessing the website. After reviewing traffic, the administrator has the option to dive deeper into the details of a specific visitor or even block the IP to prevent its access in the future.
live_traffic (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yNZ5mNXrV3Zsc37Cg-9fW527ftz3zm2MsW57LBnR6c8NQ6W7skRNz8bYYh9W5bw-CD1rKMnqW7Q_x7q71ZVT_VbtbGM8N3ygMW7N0Jtm7X_H-GW5GwjYm4Mxd53W83BdF64XM6C0W4tv0WQ5LXXwWW208L0P728-n1VQKzJ56l8XJ7W1NdtKB4rzD6SW76GDqB46hfZrW5lgnkh63FxZtW1sGmgB48fK3KW6S0cB_7cZJNfL7zNvlMYLmW3vkmJ58tds6NW8Nl5d71LCC5NW3H7J6y7KvnWqW4X8RKy8QyS3wW1kMP7_2D0FwHW4cC0K32kdpXrW3v5Rps2tRHDMW3dQVFG4L1nZ6W434mSk7zTM42N8l-5J-1qSgTW27cTFw3V7CgtW4TJ3dc4fFLX8W2KXsVV4kkmSjW6ptwSK2Vc2cd3j961 )
Respond
When a cybersecurity incident has been detected, the Respond function supports organizations in determining the appropriate actions needed to contain the incident. It is not enough to simply detect an incident, plans and measures need to be in place to contain an incident before it becomes an even bigger issue. If a threat actor can be stopped in the process of inserting a malicious admin user, then they won’t have the access to complete further attacks such as collecting website subscriber data or other sensitive information.
Responding to an incident may be something that can be handled by the website administrator, or they may need help from a team of cybersecurity experts. For more complex infections, or if the administrator is not familiar with how to respond to a malware threat, our team of analysts can use the scan data as a starting point to investigate and respond to malware that has been found on websites protected by Wordfence Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yQ73pdrrV1-WJV7CgNdrW5K-Vq97nYx1JVLKjk24GMfFlW952TnF98lLq9W5g46YB5rN_YLVQBkbP1tMKdKVcbqBr7bsYYlW4p3BmG8zMx0mW6ts11C19MHWCVPwxwr2LP7vTW55mShM1vBpZpW8KlPvn3GH9J2W3Fy1YX96k1jgW3nWcWH2JzB2lV5J0zs4J87rfVTMkfV7kQB1FW3cbYxD4QVsBSW2z6x2S47v2SwVKckRZ74hp6DW2TzbbY6X1q9FW75mh919cWLt1W4lNTt86RSb6TW91wscl6S6S2tN2LHkQ0xcX1VW7RnbBV6XFT7b355X1 ) or Wordfence Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yQ73pdrrV1-WJV7CgQ8rW1VgYjl1gXpt8W235c9F8MWRP-W8dDS-H3-LQMLW291mqk4scFxZW3vhDdw1sq3lLW2RhqZb5TdPmlW54x2w016D__0W2PmpnW6XB8QRW8S_pxw7C6j0_W5NJjlJ4QHMsHW6257zt5dZ1b0W5PNNzd5wr_GSN2PjgSx-8mJ4W7wQPkg4lSdprVb8Cc388tyGcW5HfJ_384NwpMW8p_JLJ41vhjPW3-8kh_2qZlM8N5SqWGdQZ8MbW5DfYHk4xNDPyW3Lg7DY16m0JwW6t4kMB79w_HpW1b7D6R1Vb8vZMZPLVZ3lSBX3f9B1 ) .
Recover
The final phase is the Recover function, which guides the recovery process after a cybersecurity incident, reducing the time required to return to normal operations. Cybersecurity incidents can modify the content or functionality of a website, requiring content to be restored from backup, themes or plugins to be reinstalled, or even running updates or installing new software to protect against the vulnerability that was exploited. Maintaining an awareness of available updates helps to ensure vulnerabilities are patched as quickly as possible, which is why Wordfence lists any available updates right on the Wordfence Scan Results page. Updating after an incident can prevent a recurring incident by applying any available security patches, but regularly updating software can prevent successful exploits of vulnerabilities before there can be a first incident.
updates (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yNZ5mNXrV3Zsc37CgJStW18r5385KtYcBF5QJg6tx0F5W6TwMWb22MgnGW20SBCq9dcbGrW7b3dFY2JxztmW6FlctR83LPpDW2hZJLH8YFbydW5JpmHK4Dqdc_W1ygr3_2VYbNJW5xwh3j10ZsVHW4DYDT97Zdqs4W342KDM77hv7zW14QGv071zJb2W5DTMK64-jTyXW6WLX356z2jwfW61PTHm14Prc1W1QFF2T6h3WH3W1FLzP-4D3Z_xW66GSzB2LRyDvW24HSw85hm3yFVxP4nk5k1_7NW8hjXJ33mqPQyW2-2B_N8NFcDcW8rrJX02-7dF1W70c6yC50v42SW6027MP3sQ1_rW4B-PcN45VtbVM38VnChssGhN5KlTNZhQSM4W6Gp6PR4YkJLmW4ykmZQ8ljlHcW3f9BM64Pp-pL3dnt1 )
NIST Cybersecurity Framework Core Implementation Tips
Implementing a cybersecurity framework might feel like a daunting task, however it is often easier than it might initially seem. We have some suggestions that can help with implementing the NIST Cybersecurity Framework Core on WordPress websites.
Start with the highest priority
When cataloging systems and software, keep in mind that not all assets are of equal priority for a cybersecurity solution. If the website exists on a shared or managed server solution, the host will often have cybersecurity measures in place to protect the physical systems and even some of the base software. This allows site owners to focus on the software they are installing, which means that WordPress specific cybersecurity solutions will be the first priority for many WordPress website administrators.
Be flexible
When writing policies and procedures, it is not always possible to account for every scenario that may be encountered. When a situation arises that does not fit into existing policies and procedures, the situation needs to be reviewed and existing policies and procedures will be updated to account for the new situation.
Ensure policies and processes are clearly defined
Policies and processes are an important part of any holistic cybersecurity solution. It is important to make sure that these are clearly defined, with as much detail as possible to avoid confusion if an incident occurs. Clearly defined policies and processes can also help prevent human error that could lead to a cybersecurity incident.
Follow up on policies
Effective policies are not “set it and forget it” solutions. It is important to regularly review policies, as well as regularly discuss them with any individuals who have a hand in managing the website or other systems. This helps to keep policies fresh in people’s minds, which increases the chances of policies being followed and cyber incidents being avoided.
Communicate
This tip cannot be stressed enough. Communication is the backbone of any good cybersecurity plan. Employees or anyone else who has a hand in developing and managing the website needs regular and clear communication about cybersecurity expectations and procedures. When an incident occurs, communication must be accurate and concise, and should include any stakeholder including customers and website visitors. Clear and honest communication can help to work through an incident faster, as well as build trust in how the situation is being handled.
Review and learn
Any time there is a cybersecurity incident, all five phases of the NIST Cybersecurity Framework Core need to be revisited, with policies, procedures, and solutions being reviewed for possible improvements. Any identified improvements need to be implemented as quickly as is safely possible. This is not the time for snap decisions, but taking several months to discuss options is also not going to be effective. After every incident or change, review what happened and how it happened, and learn from what went well and what could have been improved.
Use tools
Installing a cybersecurity solution like Wordfence to protect WordPress websites helps to stop incidents before they start, and recover quickly from incidents that have already occurred. Wordfence, including Wordfence Free (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yQ73pdrrV1-WJV7CgW4dW3Mqhx_7N4SKzW1sYms76fd5M5W5Sjvqn3g9910W8XR4Ll1Rn49dW2lpmpt2klPYWVXyF095vGzN2W7GXNTm9gLDLDN8q9Js76y9q9VnTn285GNRnGW6kkPl-1KMhWCW3LN6vP47f9bnW22zBm-8t6SrVW92Y-XV2srprxW1Y2-Sp2n-03QW4d25mz3XSF_7V_GSKp4fBK2fW90bqwR5zKNfwW8D_zm63Y1950W4W4hVD1yKdLSW22nfb-811QWhW4l5n711kQTHyW1YTRqF7h3Vx4VtmNXV3mFgMLW3psSWP8TLxjg3bk41 ) , provides a number of tools to help you implement the NIST Cybersecurity Framework Core, including two-factor authentication (2FA) to help secure user accounts and alerts for suspicious activity and outdated components. The Wordfence firewall detects and blocks malicious activities, while Wordfence Scan detects malware and other indicators that website data may have been compromised.
Wordfence Premium (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yQ73pdrrV1-WJV7CgGcCV53MZV3Y3bBGVVgG_J1qJbBYW8xpjzS6yKtHFW5YCsyY39QKV6N8SlbYvNMfdhVKVxdr647XWsW3KZmyP3Wzdj4W1fC5kp2XGsRWVND8185CSB7_W23Rqzz7HWNQPW7LXf0M5J3N2mW2N10zj7h68lcW276pcG1T15WcW6m6l-_4m-Sk7W6XQt-p6HH-mcW1CxwHT755VfLW1MX5j48JKJTWW7c-ZD08bgZZ6VsNgJV5jhBqHW8nsh2-9d3sSbW7xHm096jRXJVW1jmKg-6mxMDXW8pXWkV3Fpvv1W1j1SZN97rz1r3bHv1 ) includes the most up-to-date firewall rules and malware signatures, as well as our Real-Time IP Blocklist to block malicious actors based on IP addresses known to be performing malicious activities. Wordfence Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yQ73pdrrV1-WJV7CgNdrW5K-Vq97nYx1JVLKjk24GMfFlW952TnF98lLq9W5g46YB5rN_YLVQBkbP1tMKdKVcbqBr7bsYYlW4p3BmG8zMx0mW6ts11C19MHWCVPwxwr2LP7vTW55mShM1vBpZpW8KlPvn3GH9J2W3Fy1YX96k1jgW3nWcWH2JzB2lV5J0zs4J87rfVTMkfV7kQB1FW3cbYxD4QVsBSW2z6x2S47v2SwVKckRZ74hp6DW2TzbbY6X1q9FW75mh919cWLt1W4lNTt86RSb6TW91wscl6S6S2tN2LHkQ0xcX1VW7RnbBV6XFT7b355X1 ) and Wordfence Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yQ73pdrrV1-WJV7CgQ8rW1VgYjl1gXpt8W235c9F8MWRP-W8dDS-H3-LQMLW291mqk4scFxZW3vhDdw1sq3lLW2RhqZb5TdPmlW54x2w016D__0W2PmpnW6XB8QRW8S_pxw7C6j0_W5NJjlJ4QHMsHW6257zt5dZ1b0W5PNNzd5wr_GSN2PjgSx-8mJ4W7wQPkg4lSdprVb8Cc388tyGcW5HfJ_384NwpMW8p_JLJ41vhjPW3-8kh_2qZlM8N5SqWGdQZ8MbW5DfYHk4xNDPyW3Lg7DY16m0JwW6t4kMB79w_HpW1b7D6R1Vb8vZMZPLVZ3lSBX3f9B1 ) include a security audit to help identify opportunities to improve website security, and suggest best practices alongside incident response in the event a site has a security incident.
Conclusion
In this post we discussed how to apply the NIST Cybersecurity Framework Core to the protection of WordPress websites. Implementing the use of the NIST Cybersecurity Framework Core will help any website administrator to ensure that their website is secure, and that policies and procedures are in place to keep the website secure as software changes or vulnerabilities are discovered. When a cybersecurity incident occurs, they will be able to use the framework to help recover from the incident as quickly as possible to minimize the impact of the incident.
The Full Product Lineup:
wf-stacked-free-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yPS3pdr7V1-WJV7CgF8nVMsxWd5kpM4XW4dVlCt5RGzwQVpnPYG49KM5xW2H6DlT3MJ-9RW4HPnd05fG8ZNW2F2gF22Hjn6VW8VGkQL3LZQv6W4zLbfr83yS0fW2jRhZn43FgGZN8W8Wk7FGZzgW39qVx67lgx-KW5xxTQn22K2hyVxZBn_2pswcDW1rTPgq6jVjbWW4LFkYC5zGXG7W6nnN5S2ckbz4W8M0pWF6bLKkCW16b_pR8tX_j5V80yLj2jMtLjW7C7FTb2CNfQkW55kDmB8rP6dYW74-q0q6lbWzR3jTK1 )
wf-stacked-premium-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yQ73pdrrV1-WJV7CgTYJW4kpCBx23dRZxW1H96-C24MQ7HW6MnxRb7Z03fwW950L283HYQf6W3lhKDZ9lHNw7W8xLBnj7QL750N2XtS1wVH4zmW9kX1dY4MvNZJW57BBDl7rcykkVbZ9L-4Qxkk6W2lLS9j4sjFr-W6mz7m85Q2S7RW1MF4LX1sh1VPVHskDB5scqkGW18MDX48rzNqzVZ73Y46sqjmkVdjv8b3RkpV0W140fnK73kjdYW4vycDh88CmTzW6Hszb62SrX1tW4n1Y9p2kH6jNV2M1lC8TWZcbW3yWTBt3-kKHmV7T23P3v_Wnj3hkc1 )
wf-stacked-care-3 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yPS3pdr7V1-WJV7CgT5yW15xFgk5lqXT7W608FQF2sG96nV9VP9P4QTYBwW4GNdMB2dqTsVW1dZR5J2bcY5JW78rX_n4NS_QSW11vRcP2sWzZ_W8bXt7B4_TSc0W3scdwF90mf59VhzT2s7Sh8bbW5gBqb86wpk6SW44q3Nv3HLg5_N5yKRc4LgV_yW1XvPXW8KCttqW3dnyvb8Wk-c-W4ZKnp-6c0cJ2VDNtt06TKFQLN60h4HyqwyKGW9kFRD-3ngjZCW8zPLbg3L-xNKN50-qVKTBD0XW1ZzLzh6hSzkR38_z1 )
wf-stacked-response-2 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yQ73pdrrV1-WJV7CgZn2W6lPSn88Bq_Q1W8M1M8y6f08dZW5ZkkSG7Q4rQWVw2Fqz1s89CYW3V07pS4JQnTxW85znsR45X4VLW1HszQm83zKRWV1_vc92DdXdDW8lSdYJ2kTQ_1W8drYYN83PR3NW2B2YJn2cX72nW86VkTq2XMmV3W3v8CSW8TV-64W48vBJZ2GsJ0yW6-SNYP8rVbxxW2PN5Qk8jZmfnW8xKSx73Qg87vW1zblS_6L1R_3N4hXMKRgNgN7W6YMzP52KWjGcW93PcRq5d4QrkW8PwGg58C9fqQW6P3mVJ7YZpGwN6PhLQdbCFDk35kj1 )
wf-stacked-intelligence (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yQ73pdrrV1-WJV7CgM4kMGrb0hcXJBsVlmcDf5YpbcXW4kQjhS3fZ562W96m_6b8b9ZRNW7S-nMz2qPGVwW765TQs3q8T-ZW33qVD_4c40zYW7DPB4d8t1y7NW2gwFFQ3_n-v7VvL6Zq1kPJ0-W34_1vp1V_VWTVrRfwN6myXkLW4hfSb1941r9PW7R7HNQ7msN-RW7qxk_51VR5wgN65W3bvJJ95pW8_7HrQ7DDslhW4jL-Hj5fntQlW8QcVQq7x-8xLW6PX79L3_g34rW7hg6988G7zdVVjXZP42dl2HQW3X97st3m1P3SW6ZKrtY7YhVN13pVD1 )
logo-defiant (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVZry-9gJwgdW6K8xgG3zh-J6W7zr5cm4SpTC6N5d8yPy3pdqSV1-WJV7CgJhzVyhll15M9z6rW46nnw83lcDRdW4991Ms8zGjCTW2539dR2W_2TpW2wsxVR4f09b5W4qFz1j5CYbXgVYZnZ3306l41W7f5v5s1hnSkwW2JZgt66qV7fJW6XDVgy27rpjLW59wzVw1Y628yW1s2T-N5rV20sW1BTbNd6dxQHcW4vyBqs63-m1rW2jBdJ440T14LW3PW09Z8xKK74W3SW0P88nc4nFN4DrS0xs5JRhMHRVHbVDJWgW4YDDJ31mQQpL31fw1 )
Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States
Unsubscribe (
https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcNSW5Dkhyp8GkCndV25wcm5WTqxVW4M9fQv5ff7WzN7h0LyV1yf0NW3019vT1BzpNvW80T4tF84WndWf3Z1GCDZ3&v=3&_hsenc=p2ANqtz-9QEouW8GqJUu491EOMgXo7O4vZo4cTQdEKHUEmH8YdZSXfi5dEozRw5RgefedLDqPtFLsiFjGruhRBLjelUmBrJnahKQ&_hsmi=233438373 )
Manage preferences (
https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcNSW5Dkhyp8GkCndV25wcm5WTqxVW4M9fQv5ff7WzN7h0LyV1yf0NW3019vT1BzpNvW80T4tF84WndWf3Z1GCDZ3&v=3&_hsenc=p2ANqtz-9QEouW8GqJUu491EOMgXo7O4vZo4cTQdEKHUEmH8YdZSXfi5dEozRw5RgefedLDqPtFLsiFjGruhRBLjelUmBrJnahKQ&_hsmi=233438373 )
You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Tue Nov 15 2022 - 18:54:16 CET