Vulnerabilities and Security Concerns Vulnerabilities can occur on any level of the OSI model, each with a distinct set of associated security concerns. Cloud-Based vs. On-Premise Vulnerabilities Vulnerabilities to a network can exist at both the cloud and on-premise levels. In a cloud-based network, the physical security of the cloud is managed by the cloud provider. The cloud user, however, is responsible for the security of their network in the cloud. For example, the cloud user is responsible for proper authentication protocols, configurations, and patch management of resources that it houses in the cloud. With on-premise security, the host is responsible for all security measures, both physical and technical. This includes security against unauthorized access to the physical components of the network as well as firewalls, patch management, protocols, and configurations. Zero-Day A zero-day threat is a threat that has not yet been identified or has been identified but not yet remediated through patches or updates. Weak Configurations Weak configurations are the most common security vulnerability in a system through applications, devices, or settings. open permissions—Open permissions are permissions that allow a user to access data beyond their correct permission level. They defy the principle of least privilege. insecure root accounts—An insecure root account is the primary account that has access to all functions and configurations in a system or device that is not secured. Insecure root accounts can be used to access any part of the network. errors—Error messages are generated when a function does not run as expected. The information regarding the error message can be viewed through debugging programs and can give the threat actor valuable information into the inner workings of the network. weak encryption—Weak encryption can occur one of two ways, either by implementing encryption that is easy to crack with known vulnerabilities or through improper key management. Improper key management can allow access by the threat actor to the key that decrypts the applied encryption method. insecure protocols—Insecure protocols can be exploited by threat actors to gain access to a network. For example, the File Transfer Protocol (FTP) is a widely used yet highly insecure protocol that can be easily accessed by threat actors. Protocols should employ secure encryption to ensure security both in transit and at rest. default settings—Default settings are a common vulnerability. When a product such as a router is initially installed, it may be set with a generic default password. This default password is often widely available via the manufacturer. Default settings should always be changed and never left in their default state. open ports and services—Open ports and services allow for easy access to a network. Only ports and services essential to the network should be open, with all unnecessary ports closed. Third-Party Risks Third-party risks are risks associated with allowing outside contractors, vendors, products, and services access to the network. They can be easily exploited without proper management. Vendor Management Vendor management is the process of integrating a vendor-specific product into the network. Vendor management security concerns arise when the system integration is not compatible with the host system, leading to the necessity for workarounds. Also, a lack of vendor support may lead to security vulnerabilities. Vendor support is the responsiveness of the vendor to concerns by the host. This can particularly be an issue with older software and operating systems. For example, Microsoft no longer provides support for Windows 7, so if you are using that OS on the network,t any vulnerabilities or threats against the program will not be addressed or patched. Supply Chain Supply chain risks occur when the supply chain is insecure, as, for example, when a host receives switches from a third party. While in transit to the host location, the ordered switches can be intercepted and injected with malware prior to delivery. This is a supply chain vulnerability. Outsourced Code Development Outsourcing code development is the practice of using third parties to generate code or using open-source code in code development. The concern with this practice is that the code itself can be injected with malicious code. Data Storage Data storage vulnerabilities include weak encryption of data at rest, weak authentication protocols for data access, improper data deletion, and weak input validation for data requests. Improper or Weak Patch Management Patch management is the process of keeping track of and regularly installing software and hardware patches. Patches are released by developers to address known vulnerabilities within the software. However, with weak or improper patch management, the released patch may not be installed, leaving the network open to attack. Firmware Firmware is a software program that provides low-level control of hardware devices. Firmware that is not properly patched can leave the hardware open to attack. Operating System (OS) The OS is the center of the computer system and manages all software, memory, and hardware components. The OS can access every aspect of the software and hardware it is attached to. Developers of OSs like Windows and Mac release patches and updates regularly to address known vulnerabilities and operational concerns. An unpatched OS will leave the entire system open to attack. Applications Applications are the installed programs on a network. Applications run on their own programming files that can be vulnerable to attack if not properly patched. Improperly patched applications can be an entry point into the entire network. Legacy Platforms Legacy platforms are platforms that are no longer supported by the developer. This means that no new patches or updates will be available for download. Legacy platforms are often incompatible with more secure protocols, which means that to run a legacy platform, the protocols it employs will have to be downgraded to a less secure protocol. Legacy platforms, if necessary, should be run in an environment isolated from the main network. Impacts The impact of an attack can vary from minor to highly detrimental to the affected network or company. Impacts can also be highly costly both in monetary and reputational value. data loss—Data loss refers to when data is lost and no longer available to the network. This occurs when data has been deleted, physically destroyed, encrypted by a threat actor, or frozen due to a system failure or an attack, such as a ransomware attack. Data loss can be minimized by maintaining a regular backup schedule. data breaches—A data breach is the exposure of information to an unauthorized party. A data breach can have a far-reaching impact on a company’s finances, reputation, operations, and/or compliance. data exfiltration—Data exfiltration is the act of copying or removing data from a network to a secondary location by an unauthorized user. identity theft—When data is exfiltrated or breached, the garnered information can be used to engage in identity theft by the attacker. financial—Financial impacts are the monetary repercussions that are accrued by an attack. Financial impacts can be minor or significant depending on the size of the breach. reputational—Reputational impacts are the damage that is incurred by a company after an attack or data breach. For example, data breaches are regulated, and companies are required to disclose a data breach to victims involved in the data breach within a certain time frame. This can have a massive impact on the perceived security of the company, resulting in a loss of revenue due to consumer backlash. availability loss—Availability loss occurs when a network is unavailable for use. For example, when a large company such as Facebook or Google suffers an availability loss, millions of dollars in revenue can be lost while the website is down.