Analysis: Perimeter exploit exposure

Powered by SC Magazine
 

Vulnerability and patch management is key.

What is it?

Perimeter Exploit Exposure occurs when organisations aren't properly filtering enterprise network services at the network egress points. This allows attackers to remotely exploit services that should not be exposed. Although basic security practice, it is easy to forget what's exposed on an internet perimeter.

How does it work?

An attacker can easily use network mapping and vulnerability scanners to discover exposed services available at the perimeter.

Should I be worried?

Yes. We tend to lose focus when a new attack vector is introduced and forget to consider basic principles. However, it is covering the basics that can lower an attack surface.

How can I prevent it?

Vulnerability and patch management is the cornerstone. Organisations can restrict services available at the perimeter, while scanning for exposures and, when necessary, securing and patching those services. Open ports should also be removed when they are no longer needed.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Analysis: Perimeter exploit exposure
 
 
 
Top Stories
Abbott brings back Science minister in cabinet reshuffle
Science tacked onto to Industry title.
 
Beyond ACORN: Cracking the infosec skills nut
[Blog post] Could the Government's cybercrime focus be a catalyst for change?
 
The iTnews Benchmark Awards
Meet the best of the best.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Who do you trust most to protect your private data?







   |   View results
Your bank
  38%
 
Your insurance company
  4%
 
A technology company (Google, Facebook et al)
  8%
 
Your telco, ISP or utility
  8%
 
A retailer (Coles, Woolworths et al)
  3%
 
A Federal Government agency (ATO, Centrelink etc)
  19%
 
An Australian law enforcement agency (AFP, ASIO et al)
  14%
 
A State Government agency (Health dept, etc)
  6%
TOTAL VOTES: 1903

Vote
Do you support the abolition of the Office of the Information Commissioner?