NSA and CISA Reveal 10 Most Common Cybersecurity Mistakes

CarderPlanet

Professional
Messages
2,549
Reaction score
724
Points
113
Why do large companies become vulnerable? The experts have an answer.

The US National Security Agency (NSA) and the US Cybersecurity and Infrastructure Protection Agency (CISA) today revealed the ten most common cybersecurity configuration errors found by their teams in the networks of various large organizations.

The joint report of the agencies details the methods by which attackers successfully exploit these errors for various purposes, including access to sensitive information or systems.

Information for the report was collected by the NSA and CISA teams during incident assessments and response. "These assessments have shown how common mistakes, such as standard credentials, improper separation of rights, poor patch management, and insufficient internal network monitoring, put every American at risk," said Eric Goldstein, executive assistant director for cybersecurity at CISA.

The top ten most common NSA and CISA errors include:
  1. standard software configurations;
  2. incorrect separation of user/administrator privileges;
  3. insufficient internal network monitoring;
  4. lack of network segmentation;
  5. poor update management;
  6. bypassing access control systems;
  7. weak methods of multi-factor authentication;
  8. insufficient access control lists for network resources;
  9. poor login hygiene;
  10. unlimited code execution.

Goldstein encouraged software vendors to adopt a number of proactive practices to effectively address these challenges. These practices include integrating security tools at the initial stages of development and throughout the software lifecycle.

Goldstein also stressed the importance of mandatory multi-factor authentication for privileged users, whose accounts are a particularly vulnerable target for cybercriminals.

The NSA and CISA also recommend that network defenders implement recommended measures to reduce the risk of exploiting these common bugs, including regular updates and automating the patch installation process.

In conclusion, federal agencies recommend that you "exercise, test, and validate your organization's security program in accordance with the MITRE ATT&CK enterprise framework."
 
Top