Skip to content

Control: ism-1431; Revision: 5; Updated: Jun-23; Applicability: ALL; Essential Eight: N/A

Denial-of-service attack mitigation strategies are discussed with cloud service providers, specifically:

  • their capacity to withstand denial-of-service attacks
  • costs likely to be incurred as a result of denial-of-service attacks
  • availability monitoring and thresholds for notification of denial-of-service attacks
  • thresholds for turning off any online services or functionality during denial-of-service attacks
  • pre-approved actions that can be undertaken during denial-of-service attacks
  • any arrangements with upstream service providers to block malicious network traffic as far upstream as possible.