← Back to all briefings
Policy 5 min read Published Updated Credibility 90/100

Ransomware Task Force releases full framework

On 29 April 2021 the Institute for Security and Technology's Ransomware Task Force released a full report with 48 recommendations to combat ransomware through coordinated government and private sector action.

Fact-checked and reviewed — Kodi C.

Policy pillar illustration for Zeph Tech briefings
Policy, regulatory, and mandate timeline briefings

On , the Institute for Security and Technology's Ransomware Task Force (RTF) released "Combating Ransomware: A Full Framework for Action," presenting 48 recommendations across four strategic pillars. The report, developed by a coalition of 60+ experts from government, law enforcement, academia, and industry, provides a blueprint for coordinated action against ransomware through deterrence, disruption, victim support, and public-private collaboration.

Strategic framework

The RTF framework organizes recommendations into four pillars: (1) deter ransomware attacks through a nationally and internationally coordinated strategy; (2) disrupt the ransomware business model and reduce criminal profits; (3) help organizations prepare for and respond to attacks more effectively; and (4) respond to ransomware attacks more effectively through coordinated incident response.

Priority actions include establishing an interagency task force led by the National Security Council, mandatory reporting of ransomware payments, and international cooperation to pressure nations harboring ransomware operators. The report emphasizes that ransomware is not merely a technical problem but a criminal enterprise requiring law enforcement, diplomatic, and financial tools.

Key recommendations

On deterrence, the RTF recommends elevating ransomware as a national security priority and developing strategies to disrupt safe havens for ransomware actors. The report calls for coordinated diplomatic pressure on countries that tolerate ransomware operations, including potential sanctions.

On disruption, recommendations focus on cryptocurrency regulation, including requiring exchanges to implement stronger know-your-customer (KYC) requirements and enabling law enforcement to trace and seize criminal proceeds. The report also recommends creating a Ransomware Response Fund to help critical infrastructure organizations recover without paying ransoms.

On preparation, the RTF recommends requiring cyber hygiene standards for critical infrastructure, expanding cyber insurance requirements, and developing sector-specific guidance for ransomware resilience. If you are affected, implement baseline controls including MFA, network segmentation, and tested backup/recovery procedures.

Implementation progress

Several RTF recommendations have been adopted since publication. Executive Order 14028 incorporated supply chain security and incident reporting requirements. CISA launched the StopRansomware.gov resource hub. The Department of Justice established a Ransomware and Digital Extortion Task Force. Treasury issued updated guidance on sanctions implications of ransomware payments.

If you are affected, review the RTF recommendations alongside sector-specific guidance to identify gaps in their ransomware preparedness. The framework provides a useful benchmark for board-level discussions on ransomware risk management and investment priorities.

Policy Development and Analysis

Policy analysis should assess the implications of this development for organizational operations, compliance obligations, and strategic positioning. Impact assessments should consider both direct requirements and indirect effects through industry practices, customer expectations, and competitive dynamics.

Policy development processes should engage relevant teams to ensure full consideration of diverse perspectives and practical setup constraints. Feedback mechanisms should capture lessons learned and drive policy refinements based on operational experience.

Policy Implementation Monitoring

Policy teams should track setup progress and monitor for developments that may affect requirements or interpretation. Stakeholder engagement should ensure relevant parties understand policy implications and their responsibilities for compliance. Documentation should support audit and examination processes by demonstrating timely awareness and appropriate response to policy developments.

Regular reviews should assess ongoing compliance status and identify any gaps requiring additional attention or resource allocation.

Continue in the Policy pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

Coverage intelligence

Published
Coverage pillar
Policy
Source credibility
90/100 — high confidence
Topics
ransomware · policy framework · public-private partnership · incident response
Sources cited
3 sources (securityandtechnology.org, cvedetails.com, iso.org)
Reading time
5 min

Source material

  1. Combating Ransomware: A Full Framework for Action — Institute for Security and Technology
  2. CVE Details - Vulnerability Database — CVE Details
  3. ISO 31000:2018 — Risk Management Guidelines — International Organization for Standardization
  • ransomware
  • policy framework
  • public-private partnership
  • incident response
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.