How Misconfigurations Outweigh CVEs in Cybersecurity Risks
Research conducted by XM Cyber has uncovered that a whopping 80% of security exposures are due to misconfigurations, while a comparatively minuscule 1% are from Common Vulnerabilities and Exposures (CVEs). Their research, which has studied over 40 million exposures, underlines that more efforts should be directed toward properly configuring systems to reduce cyber risk.
Focusing solely on CVEs results is a flawed security posture, as misconfigured systems can pose a more substantial risk to critical assets than previously understood. They can create more challenging vulnerabilities, especially since they do not appear on typical vulnerability scans that target software versions rather than configurations. Furthermore, with traditional security measures typically being CVE-focused, the odds of misconfigurations slipping under the radar increase further.
This research highlights the need to shift the focus, resources, and money from obsessively hunting for CVEs to addressing the elephant in the room through a strategy centered on identifying and correcting misconfigurations. As XM Cyber suggests, organizations can significantly improve their security posture and adopt a more proactive and prudent risk management approach by prioritizing remediation efforts on high-impact exposures and choke points.
For cybersecurity professionals, this means devoting more time and resources to developing the strategies and tools necessary to drive this shift away from CVE-focused threat hunting. Furthermore, it also necessitates the development of a culture of continuous education and training to ensure that configuration management procedures are instituted and followed on an enterprise level. Ultimately, by addressing misconfigurations, organizations can more efficiently address cyber risk while creating a more robust and resilient cyberspace in which resources are not wasted by excessive targeting of CVEs.
For a more in-depth overview of the topic, feel free to check out the full report on The Hacker News.
Comments
Post a Comment