REGISTER

email 14 48

Article Index

Project 4: Minimize Attack Surfaces

After completing a vulnerability assessment you probably have a very large list of mitigations to complete. Want an easy way to reduce the number of vulnerabilities in your environment?

By removing nonessential attack surfaces you're reducing the number of attack surfaces (and vulnerabilities) for an attacker to exploit. Some basic steps include:

• Ensure that all exposed forms of remote access are as secure as possible

• Removal of default or test accounts that exist on systems, devices, and applications

• Ensure that administrator accounts don't have the same credentials for multiple systems

• Introduce multi-factor authentication, if appropriate

• Close non-essential ports on Internet-facing and internal systems

• Review and update Access Control Lists (ACLs)

• Remove non-essential software

Some of these activities may introduce new hardware into your environment. Be sure to continue ongoing assessments to identify new vulnerabilities. Use the results of the ongoing assessments to make configuration adjustments as needed.

CyberBanner

Log in Register

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

Go to top