Reduce, restrict, audit, and monitor administrative accounts and privileges.Update regularly and automate patching, prioritizing patching of known exploited vulnerabilities.Disable unused services and implement access controls.Remove default credentials and harden configurations.NSA and CISA encourage network defenders to implement the recommendations found within the Mitigations section of this advisory-including the following-to reduce the risk of malicious actors exploiting the identified misconfigurations. Software manufacturers must reduce the prevalence of these misconfigurations-thus strengthening the security posture for customers-by incorporating secure-by-design and -default principles and tactics into their software development practices.Properly trained, staffed, and funded network security teams can implement the known mitigations for these weaknesses. These misconfigurations illustrate (1) a trend of systemic weaknesses in many large organizations, including those with mature cyber postures, and (2) the importance of software manufacturers embracing secure-by-design principles to reduce the burden on network defenders:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |