AA22-137A: Weak Security Controls and Practices Routinely Exploited for Initial Access

Applying the following practices can help organizations strengthen their network defenses against common exploited weak security controls and practices. Control Access Adopt a zero-trust security model that eliminates implicit trust in any one element, node, or service, and instead requires continuous verification of the operational picture via real-time information from multiple sources to determine access and other system responses.[9],[10] Zero-trust architecture enables granular privilege access management and can allow users to be assigned only the rights required to perform their assigned tasks.

Read full article on US-CERT

 


Date:

Categorie(s):