
Top Ten Cyber Security Misconfigurations
The NSA and CISA Red and Blue teams recently shared the top ten cyber security misconfigurations. The schools we have worked with that have suffered a cyber attack often find that there are configurations, upgrades or user access controls that were missed. This advisory highlights all of those and more - these are not in-depth configurations, but often ones that are set up incorrectly and then not checked or updated as time goes by. Although the advisory is aimed at larger organisations, we think it applied to all and will help towards becoming more cyber resilient.
The top ten most common network misconfigurations are:
The full advisory can be viewed here: NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations.
Through our Knowledge Bank platform we provide Information and Cyber Security Checklists which provide an overall view of a cyber security checklist. We can also provide enhanced Cyber Assessments. Information and Cyber Security Checklist (viewable with a valid Data Protection Education subscription):
The top ten most common network misconfigurations are:
- Default configurations of software and applications
- Improper separation of user/administrator privilege
- Insufficient internal network monitoring
- Lack of network segmentation
- Poor patch management
- Bypass of system access controls
- Weak or misconfigured multifactor authentication (MFA) methods
- Insufficient access control lists (ACLs) on network shares and services
- Poor credential hygiene
- Unrestricted code execution
- Remove default credentials and harden configurations.
- Disable unused services and implement access controls.
- Update regularly and automate patching, prioritizing patching of known exploited vulnerabilities.
- Reduce, restrict, audit, and monitor administrative accounts and privileges.
The full advisory can be viewed here: NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations.
Through our Knowledge Bank platform we provide Information and Cyber Security Checklists which provide an overall view of a cyber security checklist. We can also provide enhanced Cyber Assessments. Information and Cyber Security Checklist (viewable with a valid Data Protection Education subscription):