{"id":2528,"date":"2024-07-12T18:39:23","date_gmt":"2024-07-12T18:39:23","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2528"},"modified":"2024-07-12T18:43:13","modified_gmt":"2024-07-12T18:43:13","slug":"canh-bao-cisa-ve-hoat-dong-red-team-nhan-manh-su-can-thiet-cua-phong-thu-sau","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/canh-bao-cisa-ve-hoat-dong-red-team-nhan-manh-su-can-thiet-cua-phong-thu-sau\/","title":{"rendered":"C\u1ea3nh b\u00e1o c\u1ee7a CISA v\u1ec1 ho\u1ea1t \u0111\u1ed9ng c\u1ee7a Red Team nh\u1ea5n m\u1ea1nh nhu c\u1ea7u ph\u00f2ng th\u1ee7 theo chi\u1ec1u s\u00e2u"},"content":{"rendered":"<p>C\u01a1 quan An ninh M\u1ea1ng v\u00e0 C\u01a1 s\u1edf H\u1ea1 t\u1ea7ng \u0111\u00e3 c\u00f4ng b\u1ed1 m\u1ed9t khuy\u1ebfn c\u00e1o r\u1ea5t chi ti\u1ebft c\u00f3 ti\u00eau \u0111\u1ec1 \u201cHo\u1ea1t \u0111\u1ed9ng c\u1ee7a \u0110\u1ed9i \u0110\u1ecf CISA \u0111\u1ed1i v\u1edbi m\u1ed9t T\u1ed5 ch\u1ee9c Chi nh\u00e1nh H\u00e0nh ph\u00e1p D\u00e2n s\u1ef1 Li\u00ean bang nh\u1ea5n m\u1ea1nh s\u1ef1 c\u1ea7n thi\u1ebft c\u1ee7a Ph\u00f2ng th\u1ee7 theo Chi\u1ec1u s\u00e2u.\u201d Khuy\u1ebfn c\u00e1o n\u00e0y d\u1ef1a tr\u00ean m\u1ed9t \u0111\u00e1nh gi\u00e1 chuy\u00ean s\u00e2u \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n v\u00e0o n\u0103m 2023, bao g\u1ed3m c\u00e1c TTP \u0111\u01b0\u1ee3c \u0111\u1ed9i \u0111\u1ecf s\u1eed d\u1ee5ng. Nh\u1eefng ph\u00e1t hi\u1ec7n v\u00e0 khuy\u1ebfn ngh\u1ecb n\u00e0y s\u1ebd gi\u00fap c\u00e1c gi\u00e1m \u0111\u1ed1c \u0111i\u1ec1u h\u00e0nh, l\u00e3nh \u0111\u1ea1o v\u00e0 ng\u01b0\u1eddi b\u1ea3o v\u1ec7 m\u1ea1ng n\u00e2ng cao an ninh m\u1ea1ng.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"key-findings-and-lessons-learned\"><strong>Nh\u1eefng ph\u00e1t hi\u1ec7n ch\u00ednh v\u00e0 b\u00e0i h\u1ecdc kinh nghi\u1ec7m<\/strong><\/h2>\n\n\n<p>Theo t\u01b0 v\u1ea5n, c\u00f3 nh\u1eefng hi\u1ec3u bi\u1ebft s\u00e2u s\u1eafc v\u00e0 b\u00e0i h\u1ecdc quan tr\u1ecdng t\u1eeb \u0111\u00e1nh gi\u00e1 \u0111\u01b0\u1ee3c r\u00fat ra trong qu\u00e1 tr\u00ecnh tri\u1ec3n khai c\u00e1c chi\u1ebfn l\u01b0\u1ee3c ph\u00f2ng th\u1ee7 chuy\u00ean s\u00e2u m\u1ea1nh m\u1ebd. C\u00e1c chi\u1ebfn thu\u1eadt v\u00e0 k\u1ef9 thu\u1eadt ch\u00ednh \u0111\u01b0\u1ee3c nh\u00f3m \u0111\u1ecf s\u1eed d\u1ee5ng bao g\u1ed3m:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>C\u00e1c vect\u01a1 \u0111e d\u1ecda dai d\u1eb3ng ti\u00ean ti\u1ebfn \u0111\u01b0\u1ee3c m\u00f4 ph\u1ecfng nh\u1eb1m m\u1ee5c \u0111\u00edch ki\u1ec3m tra kh\u1ea3 n\u0103ng ph\u1ee5c h\u1ed3i c\u1ee7a m\u1ea1ng,<\/li>\n\n\n\n<li>Khai th\u00e1c ph\u00e2n \u0111o\u1ea1n m\u1ea1ng y\u1ebfu v\u00e0<\/li>\n\n\n\n<li>T\u1ea5n c\u00f4ng l\u1eeba \u0111\u1ea3o tinh vi \u0111\u1ec3 truy c\u1eadp ban \u0111\u1ea7u.<\/li>\n<\/ul>\n\n\n\n<p>Nh\u1eefng k\u1ebft qu\u1ea3 n\u00e0y nh\u1ea5n m\u1ea1nh kh\u1ea3 n\u0103ng c\u1ee7a c\u00e1c t\u1ed5 ch\u1ee9c trong vi\u1ec7c \u00e1p d\u1ee5ng c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o m\u1eadt nhi\u1ec1u l\u1edbp \u0111\u1ec3 ch\u1ed1ng l\u1ea1i c\u00e1c m\u1ed1i \u0111e d\u1ecda nh\u01b0 v\u1eady m\u1ed9t c\u00e1ch hi\u1ec7u qu\u1ea3.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"recommendations-to-improve-cybersecurity\"><strong>Khuy\u1ebfn ngh\u1ecb \u0111\u1ec3 c\u1ea3i thi\u1ec7n an ninh m\u1ea1ng<\/strong><\/h2>\n\n\n<p>Th\u00f4ng qua ho\u1ea1t \u0111\u1ed9ng t\u01b0 v\u1ea5n c\u1ee7a m\u00ecnh, CISA \u0111\u01b0a ra nhi\u1ec1u khuy\u1ebfn ngh\u1ecb kh\u00e1c nhau nh\u1eb1m c\u1ea3i thi\u1ec7n kh\u1ea3 n\u0103ng an ninh m\u1ea1ng, ph\u00e1t hi\u1ec7n, \u1ee9ng ph\u00f3 v\u00e0 truy t\u00ecm, bao g\u1ed3m:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Th\u1ef1c hi\u1ec7n ph\u00f2ng th\u1ee7 theo chi\u1ec1u s\u00e2u: <\/b>M\u1ed9t kh\u00e1i ni\u1ec7m m\u00e0 trong \u0111\u00f3 nhi\u1ec1u l\u1edbp ki\u1ec3m so\u00e1t an ninh n\u00ean \u0111\u01b0\u1ee3c tri\u1ec3n khai tr\u00ean to\u00e0n b\u1ed9 m\u00f4i tr\u01b0\u1eddng CNTT \u0111\u1ec3 b\u1ea3o v\u1ec7 ch\u1ed1ng l\u1ea1i c\u00e1c m\u1ed1i \u0111e d\u1ecda v\u00e0 t\u1ea5n c\u00f4ng m\u1ea1ng ti\u1ec1m n\u0103ng.<\/li>\n\n\n\n<li><strong>S\u1eed d\u1ee5ng ph\u00e2n \u0111o\u1ea1n m\u1ea1ng m\u1ea1nh m\u1ebd:<\/strong> Ph\u00e2n \u0111o\u1ea1n m\u1ea1ng l\u00e0 vi\u1ec7c chia m\u1ea1ng th\u00e0nh c\u00e1c ph\u00e2n \u0111o\u1ea1n kh\u00e1c nhau \u0111\u1ec3 g\u00e2y kh\u00f3 kh\u0103n cho vi\u1ec7c l\u00e2y lan cu\u1ed9c t\u1ea5n c\u00f4ng v\u00e0 do \u0111\u00f3, d\u1ec5 d\u00e0ng ng\u0103n ch\u1eb7n trong tr\u01b0\u1eddng h\u1ee3p b\u1ecb vi ph\u1ea1m.<\/li>\n\n\n\n<li><strong>Thi\u1ebft l\u1eadp \u0111\u01b0\u1eddng c\u01a1 s\u1edf:<\/strong> Tri\u1ec3n khai c\u00e1c ti\u00eau chu\u1ea9n c\u01a1 b\u1ea3n v\u1ec1 l\u01b0u l\u01b0\u1ee3ng m\u1ea1ng, th\u1ef1c thi \u1ee9ng d\u1ee5ng v\u00e0 x\u00e1c th\u1ef1c t\u00e0i kho\u1ea3n \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh c\u00e1c b\u1ea5t th\u01b0\u1eddng ch\u1ec9 ra s\u1ef1 x\u00e2m nh\u1eadp.<\/li>\n<\/ul>\n\n\n\n<p>Nh\u1eefng \u0111i\u1ec1u n\u00e0y s\u1ebd gi\u00fap c\u00e1c t\u1ed5 ch\u1ee9c \u0111\u1ea9y l\u00f9i c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng tinh vi v\u00e0 c\u1ea3i thi\u1ec7n kh\u1ea3 n\u0103ng b\u1ea3o m\u1eadt t\u1ed5ng th\u1ec3 c\u1ee7a h\u1ecd.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"importance-of-the-cisas-crosssector-cybersecurity-performance-goals\"><strong>T\u1ea7m quan tr\u1ecdng c\u1ee7a c\u00e1c M\u1ee5c ti\u00eau Hi\u1ec7u su\u1ea5t An ninh m\u1ea1ng Li\u00ean ng\u00e0nh c\u1ee7a CISA<\/strong><\/h2>\n\n\n<p>Theo t\u00e0i li\u1ec7u, c\u00e1c ngu\u1ed3n l\u1ef1c \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh c\u00e1c m\u1ed1i \u0111e d\u1ecda, chi\u1ebfn thu\u1eadt, k\u1ef9 thu\u1eadt v\u00e0 quy tr\u00ecnh ph\u1ed5 bi\u1ebfn v\u00e0 c\u00f3 t\u00e1c \u0111\u1ed9ng c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c t\u00ecm th\u1ea5y trong M\u1ee5c ti\u00eau hi\u1ec7u su\u1ea5t an ninh m\u1ea1ng li\u00ean ng\u00e0nh c\u1ee7a CISA. C\u00e1c m\u1ee5c ti\u00eau n\u00e0y nh\u1eb1m th\u1ef1c hi\u1ec7n c\u00e1c m\u1ee5c ti\u00eau sau:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cung c\u1ea5p m\u1ed9t b\u1ed9 bi\u1ec7n ph\u00e1p an ninh m\u1ea1ng c\u01a1 b\u1ea3n c\u00f3 th\u1ec3 \u00e1p d\u1ee5ng tr\u00ean to\u00e0n b\u1ed9 c\u01a1 s\u1edf h\u1ea1 t\u1ea7ng quan tr\u1ecdng;<\/li>\n\n\n\n<li>Cung c\u1ea5p c\u00e1c ti\u00eau chu\u1ea9n \u0111\u1ec3 \u0111o l\u01b0\u1eddng v\u00e0 c\u1ea3i thi\u1ec7n m\u1ee9c \u0111\u1ed9 tr\u01b0\u1edfng th\u00e0nh v\u1ec1 an ninh m\u1ea1ng;<\/li>\n\n\n\n<li>K\u1ebft h\u1ee3p c\u00e1c bi\u1ec7n ph\u00e1p th\u1ef1c h\u00e0nh \u0111\u01b0\u1ee3c khuy\u1ebfn ngh\u1ecb cho c\u1ea3 ch\u1ee7 s\u1edf h\u1eefu c\u00f4ng ngh\u1ec7 th\u00f4ng tin v\u00e0 c\u00f4ng ngh\u1ec7 v\u1eadn h\u00e0nh;<\/li>\n\n\n\n<li>M\u1ed8T<em>gi\u1ea3i quy\u1ebft c\u00e1c r\u1ee7i ro an ninh qu\u1ed1c gia v\u01b0\u1ee3t ra ngo\u00e0i c\u00e1c r\u1ee7i ro c\u1ee7a t\u1eebng th\u1ef1c th\u1ec3<\/em><\/li>\n<\/ul>\n\n\n\n<p>C\u00e1c CPG, v\u1edbi s\u1ef1 tham v\u1ea5n chuy\u00ean s\u00e2u t\u1eeb c\u00e1c chuy\u00ean gia trong ng\u00e0nh v\u00e0 quan ch\u1ee9c ch\u00ednh ph\u1ee7, \u0111\u00e3 \u0111\u01b0\u1ee3c l\u1ef1a ch\u1ecdn \u0111\u1ec3 gi\u00fap c\u00e1c t\u1ed5 ch\u1ee9c v\u1eeba v\u00e0 nh\u1ecf \u0111\u1ea7u t\u01b0 v\u00e0o c\u00e1c h\u00e0nh \u0111\u1ed9ng an ninh m\u1ea1ng nh\u1eb1m mang l\u1ea1i k\u1ebft qu\u1ea3 an ninh c\u00f3 t\u00e1c \u0111\u1ed9ng cao.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"nists-cybersecurity-framework-alignment\"><strong>S\u1ef1 li\u00ean k\u1ebft c\u1ee7a Khung an ninh m\u1ea1ng c\u1ee7a NIST<\/strong><\/h2>\n\n\n<p>CPG CISA \u0111\u01b0\u1ee3c li\u00ean k\u1ebft v\u1edbi c\u00e1c ch\u1ee9c n\u0103ng CSF c\u1ee7a NIST. C\u00e1c ch\u1ee9c n\u0103ng n\u00e0y bao g\u1ed3m:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Qu\u1ea3n l\u00fd:<\/strong> Thi\u1ebft l\u1eadp, truy\u1ec1n \u0111\u1ea1t v\u00e0 gi\u00e1m s\u00e1t k\u1ef3 v\u1ecdng v\u00e0 chi\u1ebfn l\u01b0\u1ee3c qu\u1ea3n l\u00fd r\u1ee7i ro c\u1ee7a t\u1ed5 ch\u1ee9c.<\/li>\n\n\n\n<li><strong>Nh\u1eadn d\u1ea1ng:<\/strong> Hi\u1ec3u \u0111\u01b0\u1ee3c nh\u1eefng r\u1ee7i ro an ninh m\u1ea1ng hi\u1ec7n t\u1ea1i \u0111\u1ed1i v\u1edbi t\u1ed5 ch\u1ee9c.<\/li>\n\n\n\n<li><strong>B\u1ea3o v\u1ec7:<\/strong> Tri\u1ec3n khai c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o v\u1ec7 \u0111\u1ec3 qu\u1ea3n l\u00fd r\u1ee7i ro an ninh m\u1ea1ng cho t\u1ed5 ch\u1ee9c.<\/li>\n\n\n\n<li><strong>Ph\u00e1t hi\u1ec7n:<\/strong> T\u00ecm ki\u1ebfm v\u00e0 ph\u00e2n t\u00edch c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng v\u00e0 s\u1ef1 x\u00e2m ph\u1ea1m c\u00f3 th\u1ec3 x\u1ea3y ra.<\/li>\n\n\n\n<li><strong>Tr\u1ea3 l\u1eddi:<\/strong> H\u00e0nh \u0111\u1ed9ng khi ph\u00e1t hi\u1ec7n s\u1ef1 c\u1ed1 an ninh m\u1ea1ng.<\/li>\n\n\n\n<li><strong>H\u1ed3i ph\u1ee5c:<\/strong> Kh\u00f4i ph\u1ee5c h\u1ec7 th\u1ed1ng, t\u00e0i s\u1ea3n v\u00e0 ho\u1ea1t \u0111\u1ed9ng b\u1ecb \u1ea3nh h\u01b0\u1edfng b\u1edfi s\u1ef1 c\u1ed1 an ninh m\u1ea1ng.<\/li>\n<\/ul>\n\n\n\n<p>CISA \u0111ang l\u00e0m vi\u1ec7c \u0111\u1ec3 c\u1ea3i t\u1ed5 c\u00e1c CPG c\u1ee7a m\u00ecnh \u0111\u1ec3 ch\u00fang tu\u00e2n th\u1ee7 phi\u00ean b\u1ea3n 2.0 c\u1ee7a CSF c\u1ee7a NIST nh\u1eb1m duy tr\u00ec s\u1ef1 li\u00ean quan v\u00e0 h\u1eefu \u00edch trong vi\u1ec7c \u0111\u1ed1i ph\u00f3 v\u1edbi b\u1ed1i c\u1ea3nh An ninh M\u1ea1ng \u0111\u1ed9ng v\u00e0 kh\u00f4ng ng\u1eebng ph\u00e1t tri\u1ec3n.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>K\u1ebft lu\u1eadn<\/strong><\/h2>\n\n\n<p>B\u1ea3n t\u01b0 v\u1ea5n m\u1edbi nh\u1ea5t c\u1ee7a CISA s\u1ebd \u0111\u00f3ng vai tr\u00f2 nh\u01b0 m\u1ed9t l\u1eddi nh\u1eafc nh\u1edf v\u1ec1 vi\u1ec7c tri\u1ec3n khai c\u00e1c chi\u1ebfn l\u01b0\u1ee3c ph\u00f2ng th\u1ee7 chuy\u00ean s\u00e2u v\u00e0 \u00e1p d\u1ee5ng c\u00e1c bi\u1ec7n ph\u00e1p an ninh m\u1ea1ng t\u1ed1t. C\u00e1c khuy\u1ebfn ngh\u1ecb v\u00e0 CPG gi\u00fap c\u1ee7ng c\u1ed1 l\u1eadp tr\u01b0\u1eddng an ninh m\u1ea1ng c\u1ee7a m\u1ed9t ng\u01b0\u1eddi tr\u01b0\u1edbc c\u00e1c m\u1ed1i \u0111e d\u1ecda m\u1edbi n\u1ed5i.<\/p>\n\n\n\n<p>\u0110\u1ec3 bi\u1ebft th\u00eam th\u00f4ng tin, vui l\u00f2ng truy c\u1eadp trang web c\u1ee7a CISA: <strong><a href=\"https:\/\/www.cisa.gov\/securebydesign\" target=\"_blank\" rel=\"noreferrer noopener\">B\u1ea3o m\u1eadt theo thi\u1ebft k\u1ebf<\/a><\/strong> \u0111\u1ec3 c\u00f3 th\u00f4ng tin t\u01b0 v\u1ea5n \u0111\u1ea7y \u0111\u1ee7 v\u00e0 c\u00e1c ngu\u1ed3n t\u00e0i nguy\u00ean kh\u00e1c.<\/p>","protected":false},"excerpt":{"rendered":"<p>C\u01a1 quan An ninh m\u1ea1ng v\u00e0 C\u01a1 s\u1edf h\u1ea1 t\u1ea7ng \u0111\u00e3 c\u00f4ng b\u1ed1 m\u1ed9t b\u1ea3n t\u01b0 v\u1ea5n r\u1ea5t chi ti\u1ebft c\u00f3 ti\u00eau \u0111\u1ec1 \u201cC\u00e1c ho\u1ea1t \u0111\u1ed9ng c\u1ee7a \u0110\u1ed9i \u0111\u1ecf CISA ch\u1ed1ng l\u1ea1i m\u1ed9t t\u1ed5 ch\u1ee9c h\u00e0nh ph\u00e1p d\u00e2n s\u1ef1 li\u00ean bang n\u00eau b\u1eadt nhu c\u1ea7u ph\u00f2ng th\u1ee7 chuy\u00ean s\u00e2u\u201d. B\u1ea3n t\u01b0 v\u1ea5n\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/canh-bao-cisa-ve-hoat-dong-red-team-nhan-manh-su-can-thiet-cua-phong-thu-sau\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">C\u1ea3nh b\u00e1o c\u1ee7a CISA v\u1ec1 ho\u1ea1t \u0111\u1ed9ng c\u1ee7a Red Team nh\u1ea5n m\u1ea1nh nhu c\u1ea7u ph\u00f2ng th\u1ee7 theo chi\u1ec1u s\u00e2u<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":2531,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,27],"tags":[],"class_list":["post-2528","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-security","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/canh-bao-cisa-ve-hoat-dong-red-team-nhan-manh-su-can-thiet-cua-phong-thu-sau\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"The Cybersecurity and Infrastructure Security Agency published a very detailed advisory entitled &#8220;CISA Red Team&#8217;s Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth.&#8221; The advisory&hellip; Continue reading CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/canh-bao-cisa-ve-hoat-dong-red-team-nhan-manh-su-can-thiet-cua-phong-thu-sau\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-12T18:39:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T18:43:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\",\"datePublished\":\"2024-07-12T18:39:23+00:00\",\"dateModified\":\"2024-07-12T18:43:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"},\"wordCount\":535,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"articleSection\":[\"cybersecurity\",\"Security\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\",\"name\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"datePublished\":\"2024-07-12T18:39:23+00:00\",\"dateModified\":\"2024-07-12T18:43:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg\",\"width\":1265,\"height\":422,\"caption\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\u1ea3nh b\u00e1o c\u1ee7a CISA v\u1ec1 Ho\u1ea1t \u0111\u1ed9ng c\u1ee7a \u0110\u1ed9i \u0110\u1ecf nh\u1ea5n m\u1ea1nh s\u1ef1 c\u1ea7n thi\u1ebft c\u1ee7a Ph\u00f2ng th\u1ee7 theo Chi\u1ec1u s\u00e2u | T\u00f3m t\u1eaft An ninh","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/canh-bao-cisa-ve-hoat-dong-red-team-nhan-manh-su-can-thiet-cua-phong-thu-sau\/","og_locale":"vi_VN","og_type":"article","og_title":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth | Security Briefing","og_description":"The Cybersecurity and Infrastructure Security Agency published a very detailed advisory entitled &#8220;CISA Red Team&#8217;s Operations Against a Federal Civilian Executive Branch Organization Highlights the Need for Defense-in-Depth.&#8221; The advisory&hellip; Continue reading CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth","og_url":"https:\/\/securitybriefing.net\/vi\/an-ninh-mang\/canh-bao-cisa-ve-hoat-dong-red-team-nhan-manh-su-can-thiet-cua-phong-thu-sau\/","og_site_name":"Security Briefing","article_published_time":"2024-07-12T18:39:23+00:00","article_modified_time":"2024-07-12T18:43:13+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"3 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth","datePublished":"2024-07-12T18:39:23+00:00","dateModified":"2024-07-12T18:43:13+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"},"wordCount":535,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","articleSection":["cybersecurity","Security"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/","name":"C\u1ea3nh b\u00e1o c\u1ee7a CISA v\u1ec1 Ho\u1ea1t \u0111\u1ed9ng c\u1ee7a \u0110\u1ed9i \u0110\u1ecf nh\u1ea5n m\u1ea1nh s\u1ef1 c\u1ea7n thi\u1ebft c\u1ee7a Ph\u00f2ng th\u1ee7 theo Chi\u1ec1u s\u00e2u | T\u00f3m t\u1eaft An ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","datePublished":"2024-07-12T18:39:23+00:00","dateModified":"2024-07-12T18:43:13+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/CISA-Alert-on-Red-Team-Activity-Stresses-Need-for-Defense-in-Depth-2.jpg","width":1265,"height":422,"caption":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/cisa-alert-on-red-team-activity-stresses-need-for-defense-in-depth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"CISA Alert on Red Team Activity Stresses Need for Defense-in-Depth"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/2528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=2528"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/2528\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/2531"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=2528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=2528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=2528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}