The 1-10-60 Rule of Cybersecurity Explained (2024)

When it comes to cybersecurity breaches, timing is everything. The faster you can detect and solve a digital breach, the safer your brand – and the personal data of your customers – will be overall. Cyber attacks happen on a daily basis, and it’s impossible to prevent all threats or breaches.

But your organization can stay ahead of modern attacks by practicing the 1-10-60 rule of cybersecurity. This rule will help you develop a goal oriented framework around which you can devise a comprehensive, responsive security strategy.

What is the 1-10-60 Rule of Cybersecurity?

Put simply, the 1-10-60 rule of cybersecurity is a goal that your security team should try to achieve through practice, employing modern technologies, and other methods. The rule is meant as a metric to help your team reduce breakout time from all vulnerabilities, including those launched from local endpoints. Ransomware, malware, and other threats require a fast incident response, including threat hunting, remediation, and more.

The 1-10-60 rule of cybersecurity states that it should take your security team:

· 1 minute to detect a digital breach

· 10 minutes to investigate the breach

· 60 minutes to remediate or solve the breach

Let’s take a closer look at each of these elements one by one.

1 Minute to Detect a Breach

The faster you can catch a security incident or security breach, the faster you can take steps to solve it and improve resiliency. That’s why the first step to the 1-10-60 rule of cybersecurity is determining that your business has been compromised in the first place.

Your organization should strive to achieve a one minute average breach detection time from their respondents. In other words, it should take your security team one minute or less to determine that your firewall has fallen or that your brand has been breached by some other digital threat.

In comparison, it takes many hours or weeks for many organizations to detect that they have been attacked or breached in the first place. The longer this takes, the more vulnerable your business will be to long-lasting harm or severe digital theft.

10 Minutes to Investigate the Breach

The second element of the 1-10-60 rule of cybersecurity is taking 10 minutes to investigate the breach. As your security team gathers more information about a digital breach, it will have an easier time containing and/or neutralizing the problem.

Thus, your team needs to spend some time investigating the threat, its attack vector, and its likely goals or purpose (i.e., opening up a bigger breach, stealing customer data, etc.). That said, you should never spend too long on this step; the longer you spend investigating, the less time you have to solve the problem as the attacker continues their work.

In comparison to the average, the 10 minute timeframe is quite rapid. Most organizations take several hours, days, or even weeks to investigate a breach (after taking quite a long time to determine they were attacked at all).

60 Minutes to Fix the Breach

The last part of the 1-10-60 rule of cybersecurity is to spend 60 minutes or less fixing the breach. In other words, you want to patch whatever digital weakness your security stack has in less than an hour.

The reasons are obvious. The faster you fix a breach, the less damage a digital attacker can do to your enterprise. Most organizations take many hours or days to contain digital threats once they have been detected. But if your team can get this down to less than an hour, the odds of a cybersecurity attack being particularly devastating are significantly lowered. It takes even sophisticated hackers lots of time to complete data theft or other malicious objectives.

Combined, the 1-10-60 rule of cybersecurity sets a security response standard and framework that your team can appear to. If your brand can master the 1-10-60 rule of cybersecurity, it’ll be well-equipped to defend itself against all cyber attacks.

Cybercriminals are masters of avoiding endpoint detection and causing data breaches, especially for cloud security nets. Thus, following the 1-10-60 rule of cybersecurity paired with effective allowlisting technology to protect your endpoints is an absolute must.

Why is the 1-10-60 Rule of Cybersecurity Important?

The 1-10-60 rule of cybersecurity is important because it can be difficult for cybersecurity teams to know how to divide their time and energy or how to prioritize their efforts.

For example, upon discovering that a firewall has been breached, a cybersecurity team might initially spend much more time than is necessary investigating the threat. The 1-10-60 rule of cybersecurity solves this problem by telling the team that they only have 10 minutes to do their investigation before they need to move on to at least preliminary patching/security fixes.

Think of the 1-10-60 rule of cybersecurity as an effective guideline to help your team fix security flaws ASAP without compromising the quality of their solutions. Nation-states, the healthcare industry, and all threat intelligence agencies use the positives of the 1-10-60 rule to reduce cyber risk from threat actors and improve antivirus response quality, including with next generation automation strategies and tools.

In a broad sense, the 1-10-60 rule of cybersecurity highlights the importance of speed for security teams. When solving the issue quickly is everything, knowing how quickly the work needs to get done helps brands funnel more money in the cybersecurity and change their training approaches to ensure a more rapid-fire, yet still effective, response to digital intrusions.

How Long Does the Average Breach Response Take?

The 1-10-60 rule of cybersecurity is especially important in the modern digital era, as many organizations take weeks or months to discover that they have been attacked and to affect responses or solutions to those breaches. Based on our own analysis, the average breach response takes well over six months for a standard business to detect an attack, investigate it, and put up a security patch or otherwise prevent the same attack from occurring in the future.

How to Ensure Your Organization Follows the 1-10-60 Rule of Cybersecurity

To make sure that your organization follows the 1-10-60 rule of cybersecurity and achieves its quick standards, you should take several steps at the earliest opportunity.

Employ a Dedicated Security Team

First and foremost, your brand should employ a dedicated security team if it doesn’t already. The security team can be a squad of in-house cybersecurity specialists, such as people who work for your brand who know the ins and outs of your defense net and how best to employ countermeasures in response to the most common digital attacks in your industry.

However, you might be better served by hiring a third-party cybersecurity team, especially if most of your IT infrastructure is located on the cloud. Third-party cybersecurity agencies can provide 24/7 monitoring and responses to all digital intrusions, plus are oftentimes more cost-effective than hiring a dedicated cybersecurity roster with salaries, benefits, etc.

Train Regularly

Regardless of who provides your cybersecurity services, they need to train regularly. If you rely on an in-house cybersecurity team, make sure that they train themselves to improve their response times so they can meet the 1-10-60 rule of cybersecurity standards.

If, for instance, your team hosts a penetration test with an ethical hacker, and they find that it takes them over an hour to thoroughly investigate a breach, your team should then prioritize cutting down that time to 10 minutes or less.

Practice makes perfect, especially when it comes to timing-based methodologies like the 1-10-60 rule of cybersecurity. The more practice your team has under its belt, the better they’ll perform under pressure when a real cyber attack occurs.

Stay Up to Date with Modern Threats

Lastly, your cybersecurity team needs to stay up-to-date and knowledgeable about modern, evolving cyber threats. Cybersecurity is always changing, and the likelihood of one attack or another impacting your business can change by the day.

With that in mind, remember that your cybersecurity responses have to be agile and adaptive. If you spend too much time training for last year’s most common cyber attacks, your team might be unprepared for a new cyber threat that comes knocking at your digital door.

Implement an Effective Endpoint Protection Suite

Following the 1-10-60 rule of cybersecurity will set your organization up for minimal damages in the event of a cyberattack, but how can you prevent it outright? The best way to prevent a cyberattack from occurring in the first place is establishing an effective cybersecurity stack. Allowlisting is fundamental to absolute prevention and should be at the forefront of an cybersecurity stack that wants to prevent digital threats.

Wrap Up

The 1-10-60 rule of cybersecurity is a good security standard you should strive to meet. By achieving and maintaining a timed response of one minute, 10 minutes, and 60 minutes for each stage of cyber attack response, your organization will be much safer and much more responsive in the face of a digital attack.

The 1-10-60 Rule of Cybersecurity Explained (2024)

FAQs

The 1-10-60 Rule of Cybersecurity Explained? ›

When an attack is in progress, you have on average of one minute to detect it, 10 minutes to understand it and one hour to contain it.

What is the 1 10 60 rule in cyber security? ›

Top private-sector companies strive to adhere to what CrowdStrike refers to as the 1-10-60 rule — detecting an intrusion within 1 minute, investigating within 10 minutes and isolating or remediating the problem within 60 minutes.

What are the principles of cybersecurity explain your answers? ›

These cyber security principles are grouped into four key activities: govern, protect, detect and respond. Govern: Identifying and managing security risks. Protect: Implementing controls to reduce security risks. Detect: Detecting and understanding cyber security events to identify cyber security incidents.

What is the rule number 1 in cyber security? ›

1. Think before clicking. - Whether in your e-mail or Internet browser, never click on links or open attachments of dubious origin.

What is 90% of cyber attacks? ›

Phishing is by far the most common type of cyber crime in terms of prevalence (90% of businesses and 94% of charities who experienced at least one type of cyber crime).

What is the 80 20 rule in cyber security? ›

Recent studies have revealed that a staggering 80% of cyber incidents stem from a mere 20% lack of controls. Understanding this concept is essential for protecting your business from potential threats and ensuring the safety of your valuable data.

What is the 90 10 rule in computer security? ›

Good security standards follow the “90 / 10” rule. 90% of security safeguards rely on You to maintain good computing practices. 10% of security safeguards are Technical.

What are the three core principles of cyber security? ›

The basic tenets of information security are confidentiality, integrity and availability.

How is math used in cybersecurity? ›

Binary math powers everything a computer does, from creating and routing IP addresses to running a security client's operating system. It's a mathematical language that uses only the values “0” and “1” in combination. Computer networks “speak” in binary, so cybersecurity professionals need to understand how it works.

What are the 5 basic principles of security explain? ›

The U.S. Department of Defense has promulgated the Five Pillars of Information Assurance model that includes the protection of confidentiality, integrity, availability, authenticity, and non-repudiation of user data.

What is the 321 rule in cyber security? ›

As a widely embraced data backup strategy, the 3-2-1 Rule prescribes: Maintain three copies of your data: This includes the original data and at least two copies. Use two different types of media for storage: Store your data on two distinct forms of media to enhance redundancy.

What is the SEC rule 10 for cybersecurity? ›

Immediate Written Notice, Report, and Form SCIR

Proposed Rule 10 would require that covered entities provide immediate written notice to the SEC of any significant cybersecurity incident.

What is 42 in cyber security? ›

The Unit 42™ Ransomware Readiness Assessment focuses on preparing you to better prevent, detect, respond to and recover from ransomware. Cyber Risk Assessment - Define the current state and target state of your security maturity, identify risks and gaps.

Do cyber attacks happen every 11 seconds? ›

We predict there will be a ransomware attack on businesses every 11 seconds by 2021, up from every 40 seconds in 2016. The FBI is particularly concerned with ransomware hitting healthcare providers, hospitals, 911 and first responders.

What are the three pillars of cyber security? ›

Cyber security can be broken down into three main pillars: people, processes, and technology. If you understand these important components, you can use them as a road map to deliver quality IT service and cybersecurity protection. There are two ways you can think about these pillars.

What is the SEC Rule 10 for cybersecurity? ›

Immediate Written Notice, Report, and Form SCIR

Proposed Rule 10 would require that covered entities provide immediate written notice to the SEC of any significant cybersecurity incident.

What is the 90 10 rule in information technology? ›

Good Security Standards follow the "90 / 10" Rule: 90% of security safeguards rely on an individual ("YOU") to adhere to good computing practices. 10% of security safeguards are technical.

What is an example of the 60 30 10 rule? ›

60-30-10 Rule Example

Your room has all white walls and a white sectional sofa (60%), neutral flooring, side tables, and upholstered side chairs (30%), and accents of one color around the room using decorative pillows, artwork, and other small items (10%).

What is the first rule of cyber safety? ›

The first rule to remember when you are online is to never share personal information with people you don't know well in real life. This includes friends of friends, as well as complete strangers.

References

Top Articles
Latest Posts
Article information

Author: Zonia Mosciski DO

Last Updated:

Views: 6309

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Zonia Mosciski DO

Birthday: 1996-05-16

Address: Suite 228 919 Deana Ford, Lake Meridithberg, NE 60017-4257

Phone: +2613987384138

Job: Chief Retail Officer

Hobby: Tai chi, Dowsing, Poi, Letterboxing, Watching movies, Video gaming, Singing

Introduction: My name is Zonia Mosciski DO, I am a enchanting, joyous, lovely, successful, hilarious, tender, outstanding person who loves writing and wants to share my knowledge and understanding with you.