Common Security Misconfigurations and Their Consequences

Security Misconfigurations

Everyone makes mistakes. That one sentence was drummed into me in my very first job in tech, and it has held true since then. In the cybersecurity world, misconfigurations can create exploitable issues that can haunt us later – so let’s look at a few common security misconfigurations.

The first one is development permissions that don’t get changed when something goes live. For example, AWS S3 buckets are often assigned permissive access while development is going on. The issues arise when security reviews aren’t carefully performed prior to pushing the code live, no matter if that push is for the initial launch of a platform or for updates.

The result is straight-forward; a bucket goes live with the ability for anyone to read and write to and from it. This particular misconfiguration is dangerous; since the application is working and the site is loading for users, there’s no visible indication that something is wrong until a threat actor hunting for open buckets stumbles upon it.

Careful security reviews of all applications and sites before they get pushed to the live environment – both for initial launch and for update cycles – are critical in catching this type of…

http://feedproxy.google.com/~r/TheHackersNews/~3/qbzngh8AV6c/common-security-misconfigurations-and.html

Common Security Misconfigurations and Their Consequences 1
Common Security Misconfigurations and Their Consequences 2
Common Security Misconfigurations and Their Consequences 3
Common Security Misconfigurations and Their Consequences 4

Have a comment? Type it below!