Operation Winter SHIELD: A Practical Guide to Stronger Cyber Resilience

FBI WinterShield cybersecurity

Winter SHIELD’s purpose is straightforward:
Help organizations understand what attackers target and provide a clear, realistic roadmap to reduce risk.

Cyber threats continue to evolve at a pace that challenges even the most mature organizations. In response, the FBI has launched Operation Winter SHIELD (Securing Homeland Infrastructure by Enhancing Layered Defense) a set of the 10 most impactful actions organizations can take right now to strengthen their security posture.

Developed with input from domestic and international partners, Winter SHIELD uses lessons learned from recent investigations, from both adversary behavior and common defensive gaps. These recommendations support the goals outlined in the National Cyber Strategy and the FBI Cyber Strategy, emphasizing that industry is not a passive victim of cybercrime but an essential ally in defending the nation’s digital infrastructure.

By strengthening everyday practices across both information technology (IT) and operational technology (OT), Winter SHIELD aims to harden infrastructure and reduce exposure across the public and private sectors.

Winter SHIELD: 10 Actions to Improve Cyber Resilience

Below is a breakdown of the FBI’s recommended steps and why each one matters.

  1. Adopt phish-resistant authentication

Why it matters:
Password theft continues to be one of the most common paths into a network. Phish-resistant authentication methods like FIDO2 keys make it much harder for attackers to gain access.

  1. Implement a risk-based vulnerability management program

Why it matters:
Many breaches occur because known vulnerabilities remain unpatched. Clear ownership, defined remediation timelines, and strong processes reduce this risk dramatically.

  1. Track and retire end‑of‑life technology on a defined schedule

Why it matters:
Unsupported systems no longer receive security updates and become predictable targets for attackers.

  1. Manage third‑party risk

Why it matters:
Your security perimeter is only as strong as the vendors and partners who have access to your environment. Attackers often look for the weakest link.

  1. Protect security logs and preserve them for an appropriate time period

Why it matters:
Logs are often the first thing adversaries try to delete. Preserved logs are crucial for detection, response, and investigation.

  1. Maintain offline, immutable backups and test restoration

Why it matters:
Attackers frequently target backups early in an intrusion. Offline, unalterable backups and regular testing ensure resilience.

  1. Identify, inventory, and protect internet‑facing systems and services

Why it matters:
Unnecessary exposure creates low‑effort entry points attackers can quickly exploit.

  1. Strengthen email authentication and malicious content protections

Why it matters:
Email remains the number‑one entry point for intrusions and fraud. Better controls sharply reduce the risk.

  1. Reduce administrator privileges

Why it matters:
Wide, persistent admin access makes it easier for attackers to escalate privileges and move quickly through a network.

  1. Exercise your incident response plan with all stakeholders

Why it matters:
Organizations that practice response perform better when it matters, reducing downtime, cost, and overall impact.

A Shared Mission

Operation Winter SHIELD underscores a critical message: cybersecurity is a team effort. By following this roadmap, organizations can make meaningful progress toward stronger defenses and play an active role in helping protect the nation’s digital infrastructure.

Start small, act now, and make your business harder to target. Winter SHIELD shows you how.