{"id":1118759,"date":"2023-10-20T06:15:09","date_gmt":"2023-10-20T10:15:09","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/top-10-misconfigurations-an-nsa-checklist-for-cisos-the-stack\/"},"modified":"2023-10-20T06:15:09","modified_gmt":"2023-10-20T10:15:09","slug":"top-10-misconfigurations-an-nsa-checklist-for-cisos-the-stack","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/top-10-misconfigurations-an-nsa-checklist-for-cisos-the-stack\/","title":{"rendered":"Top 10 misconfigurations: An NSA checklist for CISOs &#8211; The Stack"},"content":{"rendered":"<p><p>    A new advisory from signals intelligence and cybersecurity    experts at the National Security Agency (NSA) highlights the    top 10 most common cybersecurity misconfigurations in large    organisations  including regular exposure of insecure Active    Directory Certificate Services.  <\/p>\n<p>    It comes as the NSAs Cybersecurity Director Rob Joyce warned    that if your infrastructure cant survive a user clicking a    link, you are doomed.  <\/p>\n<p>    \"Im the director of cybersecurity at NSA and you can    definitely craft an email link I will click he added on X     writing as generative AI models make it far easier for    non-native speakers to craft convincing phishing emails and as    such campaigns remain highly effective for threat actors.  <\/p>\n<p>    The list is a useful guidebook to those seeking to secure IT    estates and is no doubt based in part on the NSAs extensive    experience of breaching services, as well as support defending    CNI. To The    Stack, it is also a crisp reminder that strict    organisational discipline is critical for cyber hygiene.  <\/p>\n<p>    Too many network devices with user access via apps or web    portals still hide default credentials for built-in    administrative accounts. (Cisco, were     looking at you,     you,     you. (Others are     also regularly     guilty.) The problem extends to printers and scanners with    hard coded default credentials on them  but are set up with    privileged domain accounts loaded so that users can scan and    send documents to a shared drive).  <\/p>\n<p>        NSA says: Modify the default configuration of        applications and appliances before deployment in a        production environment . Refer to hardening guidelines        provided by the vendor and related cybersecurity guidance        (e.g., DISA's Security Technical Implementation        Guides (STIGs) and configuration        guides)      <\/p>\n<p>    More specifically on default permissions risks, NSA says it    regularly says issues with configuration of Active Directory    Certificate Services (ADCS); a Microsoft feature used to manage    Public Key Infrastructure (PKI) certificates, keys, and    encryption inside of AD environments.  <\/p>\n<p>     Malicious actors can exploit ADCS and\/or ADCS template    misconfigurations to manipulate the certificate infrastructure    into issuing fraudulent certificates and\/or escalate user    privileges to domain administrator privileges it warns,    pointing to ADCS servers running with web-enrollment enabled;    ADCS templates where low-privileged users have enrollment    rights and other associated issues  with external guidance on    a handful of known escalation paths     here,     here and     here.  <\/p>\n<p>        Ensure the secure configuration of ADCS        implementations. Regularly update and patch the controlling        infrastructure (e.g., for CVE-2021-36942), employ        monitoring and auditing mechanisms, and implement strong        access controls to protect the infrastructure.        Disable NTLM on all        ADCS servers. Disable SAN for UPN        Mapping. If not required, disable LLMNR and NetBIOS in        local computer security settings or by group policy.      <\/p>\n<p>        Already have an account? Sign in      <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.thestack.technology\/from-top-10-misconfigurations-nsas-checklist-for-cisos-flags-active-directory-certificate-services-other-weaknesses\/\" title=\"Top 10 misconfigurations: An NSA checklist for CISOs - The Stack\" rel=\"noopener\">Top 10 misconfigurations: An NSA checklist for CISOs - The Stack<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A new advisory from signals intelligence and cybersecurity experts at the National Security Agency (NSA) highlights the top 10 most common cybersecurity misconfigurations in large organisations including regular exposure of insecure Active Directory Certificate Services.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/top-10-misconfigurations-an-nsa-checklist-for-cisos-the-stack\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-1118759","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1118759"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1118759"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1118759\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1118759"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1118759"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1118759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}