10 Routine Security Gaffes the Feds Are Begging You to Fix

10 Routine Security Gaffes the Feds Are Begging You to Fix

10 Routine Security Gaffes the Feds Are Begging You to Fix PlatoBlockchain Data Intelligence. Vertical Search. Ai.

The National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) have issued a plea to network defenders to fix easy misconfiguration errors that allow threat actors to launch successful cyberattacks against their organizations.

Red and blue teams, as well as incident response teams from both agencies, identified these as the top 10 most common network configurations:

  1. Default configurations of software and applications
  2. Improper separation of user/administrator privilege
  3. Insufficient internal network monitoring
  4. Lack of network segmentation
  5. Poor patch management
  6. Bypass of system access controls
  7. Weak or misconfigured multifactor authentication (MFA) methods
  8. Insufficient access control lists (ACLs) on network shares and services
  9. Poor credential hygiene
  10. Unrestricted code execution

The agencies added that software providers need to immediately adopt principles of secure-by-design to prevent these and other misconfigurations.

As America’s Cyber Defense Agency, CISA is charged with safeguarding our nation against ever-evolving cyber threats and to understand, manage, and reduce risk to the cyber and physical infrastructure that Americans rely on every hour of every day,” the advisory said. “Ensuring software is secure by design will help keep every organization and every American more secure.”

Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

Time Stamp:

More from Dark reading