In conclusion, memory forensics is a valuable technique that IT auditors should embrace as a significant interest group to improve cybersecurity resilience and mitigate their clients' cyber risks. By leveraging memory forensics techniques, auditors can gain unparalleled insight into risks related to the configuration of essential security controls, IT hygiene, or cyber threats to the client's infrastructure. By maturing the cyber security of their clients through memory forensic audits, organizations will become more resilient against advanced cyber threat actors or ransomware attacks.
Ultimately, memory forensics empowers IT auditors to start to play a more proactive role in strengthening the organization's security posture and safeguarding against the ever-evolving threat landscape.
By using memory forensics, IT auditors, themselves will quickly adopt this capability in their own companies and of their auditees to implement robust memory forensics capabilities to improve their own and their customers’ resilience. Memory forensics has greatly evolved. It’s not that complex anymore but remains one of the most vital sources of evidence, especially for IT-auditors.
If auditors do not feel comfortable due to limited knowledge how to collect and analyze memory samples of critical systems, then at least audit for the presence of memory forensic capabilities in the cyber defence organization. This will limit endpoint visibility gaps and thus improve the organization's cybersecurity resilience and potential impact of cyber attacks as they are understood more through the usage of memory forensics . By proactively and regularly checking critical systems for relevant breach indicators, the impact on employees' privacy is limited, but memory samples often do contain relevant sensitive data that is loaded into computer systems' memory. Therefor it’s imported to have relevant proper security controls in place for storing and retaining of memory samples and the staff that can accessing those.
Many mature cyber organizations that understand the limitations of EDR detections and how threat actors will bypass that control have invested in memory forensics capabilities in their network. The financial investment to complement the detection function in organizations with memory forensics in organizations is limited but depends on the organization's size.
If you want to receive more information about memory forensics and how to apply it in your IT-audits to further mature the cyber resilience of the auditees, contact Robert Jan Mora,
rmora@volexity.com