Skip to main content

17 mei 2022: de Amerikaanse Cybersecurity & Infrastructure Security Agency publiceert bevindingen rond de sterkte van toegangsbeveiliging. De samenvatting van de aanbevelingen:

Best Practices to Protect Your Systems:
• Control access.
• Harden Credentials.
• Establish centralized log management.
• Use antivirus solutions.
• Employ detection tools.
• Operate services exposed on internet-accessible hosts with secure configurations.
• Keep software updated.
Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices and includes best practices to mitigate the issues. This advisory was coauthored by the cybersecurity authorities of the United States,[1],[2],[3] Canada,[4] New Zealand,[5],[6] the Netherlands,[7] and the United Kingdom.[8]

Download the PDF version of this report (pdf, 430kb) HIER

.

.

Close Menu

Over Safe IT Factory

Walstraat 135
7411 GL. Deventer

T: +31 570 530 392

E: info@safeitfactory.com