{"id":22036,"date":"2023-11-08T22:48:55","date_gmt":"2023-11-08T18:48:55","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/10-key-cybersecurity-mistakes\/22036\/"},"modified":"2023-11-08T22:48:55","modified_gmt":"2023-11-08T18:48:55","slug":"10-key-cybersecurity-mistakes","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/10-key-cybersecurity-mistakes\/22036\/","title":{"rendered":"The top-10 mistakes made when configuring enterprise IT systems"},"content":{"rendered":"<p>Errors in configuring IT infrastructure are a regular occurrence at large organizations \u2014 even given the most mature and competent IT and cybersecurity departments. This is evident from the weekly news of hacks on major, well-established companies, as well as the results of security audits \u2014 although these are rarely made public. The problem has also been acknowledged by U.S. regulators such as CISA and the NSA. In their new paper with recommendations prepared by both their \u201cred\u201d and \u201cblue\u201d teams after numerous audits and incident responses, they note that configuration errors highlight systemic weaknesses in large organizations \u2014 including companies with mature information security. However, the document asserts that network security teams can neutralize or mitigate these weaknesses with sufficient funding, training, and staffing. Let\u2019s take a look at the mistakes that experts consider the most dangerous.<\/p>\n<h2>1 Default application configuration<\/h2>\n<p>Any device or application \u2014 be it a printer, mail or file server, or video conferencing system \u2014 typically has a login mechanism with default access credentials that people can forget to disable. The default settings of these devices may be very simple (e.g., admin1234, or just 1234) and thus not very secure, but often no one changes them. A typical example is a printer that has privileged network access for easy printing, along with a web-based control panel with default login credentials. Another common occurrence is Windows servers with enabled older versions of SMB or other retro protocols. Default settings and templates of Active Directory Certificate Services are also very dangerous, allowing unprivileged users to get a server certificate, elevate privileges to administrative levels, or authenticate themselves by <a href=\"https:\/\/securelist.com\/anomaly-detection-in-certificate-based-tgt-requests\/110242\/\" target=\"_blank\" rel=\"noopener\">obtaining a Kerberos TGT<\/a>.<\/p>\n<p><strong>Recommended security measures:<\/strong><\/p>\n<ul>\n<li>Implement a mandatory procedure before starting to operate any IT system: disable default accounts (such as \u201cadmin\u201d or \u201cguest\u201d) or at least change their passwords.<\/li>\n<li>Enforce the use of <a href=\"https:\/\/www.kaspersky.com\/blog\/strong-password-day\/25519\/\" target=\"_blank\" rel=\"noopener nofollow\">strong passwords<\/a> of 15 or more random characters.<\/li>\n<li>Apply secure settings on devices or services, following the manufacturer\u2019s instructions for hardening and\/or relevant general guidelines \u2014 such as <a href=\"https:\/\/public.cyber.mil\/stigs\/\" target=\"_blank\" rel=\"nofollow noopener\">DISA STIG<\/a>.<\/li>\n<li>Implement secure ADCS configuration: disable web enrollment if possible, disable NTLM on ADCS servers, and disable <a href=\"https:\/\/learn.microsoft.com\/en-us\/troubleshoot\/windows-server\/windows-security\/disable-subject-alternative-name-upn-mapping\" target=\"_blank\" rel=\"nofollow noopener\">subject alternative name (SAN) for UPN mapping<\/a>.<\/li>\n<li>Review default permissions in ADCS templates, remove the CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag from templates, and remove FullControl, WriteDacl, and Write properties from low-privilege users.<\/li>\n<li>Enable supervisor validation of any requested certificates.<\/li>\n<\/ul>\n<h2>2 Incorrect management of user and admin privileges<\/h2>\n<p>In any large network, you\u2019ll often find excessive privileges granted to regular users (originally assigned for some temporary purpose and then never revoked), extended privileges for service accounts (applications and services), and highest privileges for administrators (who often work in this privileged mode all the time). Attackers deliberately seek out and exploit these accounts, for they make it faster and easier to take over the network.<\/p>\n<p><strong>Recommended security measures:<\/strong><\/p>\n<ul>\n<li>Enforce the <a href=\"https:\/\/www.kaspersky.com\/blog\/zero-trust-security\/36423\/\" target=\"_blank\" rel=\"noopener nofollow\">principle of least privilege<\/a>.<\/li>\n<li>Implement an <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-benefit-from-identity-security\/48399\/\" target=\"_blank\" rel=\"noopener nofollow\">identity management system<\/a> that includes logging the issuance and use of permissions. This makes it easier to detect unauthorized use of access rights.<\/li>\n<li>Use this system to minimize the number of administrative accounts, and reduce the overall number of accounts (by merging them properly).<\/li>\n<li>Regularly audit accounts, disable inactive ones, and remove excessive privileges.<\/li>\n<li>Restrict privileged accounts from performing mundane activities such as browsing the web and accessing email.<\/li>\n<li>Grant elevated privileges only for the duration of required tasks \u2014 even to administrators.<\/li>\n<li>Whenever possible, run services and daemons with limited privileges and access rights.<\/li>\n<\/ul>\n<h2>3 Insufficient internal network monitoring<\/h2>\n<p>Many organizations only monitor traffic coming from external hosts and selected servers, while internal network monitoring is limited to endpoint events. This makes it difficult to detect attacks and investigate incidents in a timely manner.<\/p>\n<p><strong>Recommended security measures:<\/strong><\/p>\n<ul>\n<li>Analyze the normal daily activity of applications and services to be able to identify anomalies in access and usage. For example, administrators should regularly review access and permission lists for key services and remove suspicious or outdated accounts.<\/li>\n<li>Analyze the organization\u2019s daily network traffic to be able to identify anomalies within it.<\/li>\n<li>Implement a SIEM system to collect and analyze telemetry from various sources, including <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/endpoint-detection-response-edr?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">EDR<\/a> and IDS systems, network logs, and others.<\/li>\n<\/ul>\n<h2>4 Lack of network segmentation<\/h2>\n<p>Networks with different purposes and levels of importance often lack isolation from one another. Common issues include complete interconnection of networks containing classified and unclassified information, as well as IT and OT networks. In most cases, either segmentation is completely non-existent, or it\u2019s implemented but some engineers decide it\u2019s too inconvenient and create tunnels between networks at will (or even connect isolated networks to the internet). As a result, IT and information security department heads think that the networks are segmented when in fact they\u2019re not.<\/p>\n<p><strong>Recommended security measures:<\/strong><\/p>\n<ul>\n<li>Implement network segmentation if not already in place. This can involve both physical and logical (VLAN) segmentation. It\u2019s important to ensure that infrastructure network devices have up-to-date and properly configured access control lists (ACLs) to prevent unauthorized devices from connecting to administrative, industrial, and confidential networks. We also recommend using demilitarized zones (DMZs) to reduce the accessibility of internal IT systems from the internet.<\/li>\n<li>Implement next-generation firewalls (NGFW) capable of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Stateful_firewall\" target=\"_blank\" rel=\"nofollow noopener\">stateful<\/a> inspection and deep packet inspection, taking into account the originating application. The firewall should reject traffic differing from the standard traffic allowed within the network. Application-based traffic filtering isn\u2019t solely based on network ports, and significantly reduces attackers\u2019 opportunities to maliciously exploit network protocols.<\/li>\n<\/ul>\n<h2>5 Poor patch management culture<\/h2>\n<p>A systematic problem is the slow and incomplete application of patches and updates to hardware and software systems. The situation is exacerbated by the fact that many organizations, for various reasons, continue to <a href=\"https:\/\/www.kaspersky.com\/blog\/legacy-it-update-troubles-and-mitigations\/48692\/\" target=\"_blank\" rel=\"noopener nofollow\">operate hopelessly outdated systems<\/a> (such as Windows XP, SAP R\/3, and so on) that haven\u2019t received any updates in a long time.<\/p>\n<p><strong>Recommended security measures:<\/strong><\/p>\n<ul>\n<li>Systematize the patch management process, prioritizing remediation of known exploitable vulnerabilities and critical vulnerabilities.<\/li>\n<li>Automate updates as much as possible using software vendors\u2019 auto-update systems, or \u2014 even better \u2014 by having a centralized <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">patch management system<\/a>.<\/li>\n<li>Update not only software but also hardware firmware and computer BIOS\/UEFI.<\/li>\n<li>Analyze <a href=\"https:\/\/www.kaspersky.com\/blog\/legacy-it-update-troubles-and-mitigations\/48692\/\" target=\"_blank\" rel=\"noopener nofollow\">outdated systems used in the business<\/a> and, if possible, plan for their retirement. If this isn\u2019t possible, implement compensatory measures such as network isolation for legacy systems.<\/li>\n<\/ul>\n<h2>6 Possibility of bypassing access control<\/h2>\n<p>Environment and application settings often allow attacks like \u201cpass-the-hash\u201d and \u201ckerberoasting\u201d to access target resources without knowing the password.<\/p>\n<p><strong>Recommended security measures:<\/strong><\/p>\n<ul>\n<li>Minimize the use of identical credentials across different systems to prevent attackers spreading through the network. Monitor non-standard and unsuccessful login attempts.<\/li>\n<li>Implement patch management (see point 5).<\/li>\n<li>Implement measures against PtH attacks: apply the <a href=\"https:\/\/learn.microsoft.com\/en-us\/security-updates\/SecurityAdvisories\/2016\/2871997\" target=\"_blank\" rel=\"noopener nofollow\">KB2871997<\/a> updates, impose UAC restrictions on local accounts after network login, and prohibit domain users from joining the local administrators\u2019 group on computers.<\/li>\n<li>Restrict direct communication among regular computers. They need to interact through servers.<\/li>\n<li>Use privileged accounts only on systems that require these privileges. Consider using dedicated computers for privileged administrator access.<\/li>\n<\/ul>\n<h2>7 Weak or misconfigured multi-factor authentication methods<\/h2>\n<p>A common mistake is configuring access where authentication is performed only by a smart card, but hashes for long-unused passwords are still considered valid. If hash expiration policies are not configured, attackers can operate from old accounts using the techniques mentioned in point 6.<\/p>\n<p>Another common issue is MFA methods vulnerable to phishing, such as SMS codes. Attackers can obtain codes through various means \u2014 from social engineering and MFA bombing to <a href=\"https:\/\/www.kaspersky.com\/blog\/ss7-attack-intercepts-sms\/16877\/\" target=\"_blank\" rel=\"noopener nofollow\">SS7 telecom network attacks<\/a> or illegitimate SIM card duplication.<\/p>\n<p><strong>Recommended security measures:<\/strong><\/p>\n<ul>\n<li>Disable outdated authentication methods like NTLM.<\/li>\n<li>Use group policies or Windows Hello for Business settings to regularly randomize hashes for accounts accessed through smart cards.<\/li>\n<li>Consider transitioning to open authentication standards based on cloud infrastructures.<\/li>\n<li>Switch to <a href=\"https:\/\/www.kaspersky.com\/blog\/2fa-practical-guide\/24219\/\" target=\"_blank\" rel=\"noopener nofollow\">MFA systems that are resistant to phishing<\/a>.<\/li>\n<\/ul>\n<h2>8 Insufficient restriction of access to network folders and services<\/h2>\n<p>In corporate networks, it\u2019s common to find network folders that can be accessed without authentication, or administrative repositories accessible to regular users. These often contain files with admin passwords or other sensitive information in plaintext.<\/p>\n<p><strong>Recommended security measures:<\/strong><\/p>\n<ul>\n<li>All repositories and services should only allow access to authenticated and authorized users.<\/li>\n<li>Critical resources should be configured according to the principle of least privilege.<\/li>\n<li>Files and folders should have strict settings limiting unauthorized manipulations \u2014 especially folders containing confidential information such as keys.<\/li>\n<li>Ensure that attackers can\u2019t modify access control lists (ACLs) at will, which would essentially override all the above measures.<\/li>\n<li>In Windows group policies, disable \u201canonymous enumeration of SAM accounts and share\u201d.<\/li>\n<\/ul>\n<h2>9 Poor quality passwords and password policies<\/h2>\n<p>Many organizations allow users to have short and simple passwords. As a result, up to 80% of employee passwords can be quickly cracked using tools like Hashcat.<\/p>\n<p><strong>Recommended security measures:<\/strong><\/p>\n<ul>\n<li>Set <a href=\"https:\/\/www.kaspersky.com\/blog\/strong-password-day\/25519\/\" target=\"_blank\" rel=\"noopener nofollow\">recommended complexity criteria<\/a> for all passwords.<\/li>\n<li>Evaluate whether users can <a href=\"https:\/\/www.kaspersky.com\/blog\/how-secure-is-your-password-manager\/47034\/\" target=\"_blank\" rel=\"noopener nofollow\">use password managers<\/a>, and which ones.<\/li>\n<li>Prohibit the use of identical local administrator passwords on different computers.<\/li>\n<li>Implement high-complexity criteria for administrative passwords and passphrases on certificates\/private keys.<\/li>\n<li>Implement a process and automated system to search for passwords stored in plaintext or an easily extractable format (saved passwords in browsers).<\/li>\n<\/ul>\n<h2>10 Lack of restrictions on code execution<\/h2>\n<p>Few organizations enable the \u201clist of allowed applications\u201d mode \u2014 where only approved applications can be run on company computers. Allowing the execution of untrusted files enables attackers to deploy various malware, escalate privileges using vulnerable drivers, and so on.<\/p>\n<p><strong>Recommended security measures:<\/strong><\/p>\n<ul>\n<li>Enable settings that prevent the execution of applications from untrusted sources.<\/li>\n<li>Better yet, <a href=\"https:\/\/www.kaspersky.com\/blog\/wonders-of-whitelisting\/6367\/\" target=\"_blank\" rel=\"noopener nofollow\">use allowlisting (also known as default deny)<\/a>, permitting the running of applications only from a fixed list of approved ones. Ensure that the tool implementing this policy checks digital signatures and other key file attributes rather than just focusing on names.<\/li>\n<li>Block known vulnerable applications (especially drivers) from running.<\/li>\n<li>Limit the ability to run scripting languages (such as PowerShell), check logs for the execution of approved scripts, and disallow the execution of scripting languages not used in the company\u2019s IT systems.<\/li>\n<li>Regularly review host and perimeter security systems to ensure they\u2019re effectively filtering spam and blocking malware from being run.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\"><input type=\"hidden\" class=\"placeholder_for_banner\" data-cat_id=\"mdr\" value=\"18953\">\n","protected":false},"excerpt":{"rendered":"<p>Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?<\/p>\n","protected":false},"author":2722,"featured_media":22037,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[2088,78,2462,187,398,2708,805,2097,2494,121,268,113],"class_list":{"0":"post-22036","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-tips","10":"tag-hackers","11":"tag-mfa","12":"tag-passwords","13":"tag-patches","14":"tag-privileges","15":"tag-settings","16":"tag-siem","17":"tag-strategy","18":"tag-updates","19":"tag-vulnerabilities","20":"tag-windows"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/10-key-cybersecurity-mistakes\/22036\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/10-key-cybersecurity-mistakes\/26610\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/10-key-cybersecurity-mistakes\/29341\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/10-key-cybersecurity-mistakes\/26893\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/10-key-cybersecurity-mistakes\/36520\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/10-key-cybersecurity-mistakes\/49574\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/10-key-cybersecurity-mistakes\/27164\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/10-key-cybersecurity-mistakes\/32888\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/10-key-cybersecurity-mistakes\/32536\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/strategy\/","name":"strategy"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22036"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22036\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22037"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}