Analysis: Perimeter exploit exposure

By

Vulnerability and patch management is key.

What is it?

Analysis: Perimeter exploit exposure

Perimeter Exploit Exposure occurs when organisations aren't properly filtering enterprise network services at the network egress points. This allows attackers to remotely exploit services that should not be exposed. Although basic security practice, it is easy to forget what's exposed on an internet perimeter.

How does it work?

An attacker can easily use network mapping and vulnerability scanners to discover exposed services available at the perimeter.

Should I be worried?

Yes. We tend to lose focus when a new attack vector is introduced and forget to consider basic principles. However, it is covering the basics that can lower an attack surface.

How can I prevent it?

Vulnerability and patch management is the cornerstone. Organisations can restrict services available at the perimeter, while scanning for exposures and, when necessary, securing and patching those services. Open ports should also be removed when they are no longer needed.

This article originally appeared at scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

CBA looks to GenAI to assist 1200 'security champions'

CBA looks to GenAI to assist 1200 'security champions'

NSW Police to embark on $126m IT overhaul

NSW Police to embark on $126m IT overhaul

Australia's super funds told to assess authentication controls

Australia's super funds told to assess authentication controls

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Log In

  |  Forgot your password?