Need specific cyber security advice? Get in touch and we'll help you out.
Contact Us

Securing Your IT Network

Failing to adequately secure your IT network will make your business vulnerable to attack. You should develop a strategy to remove or disable unnecessary functionality from systems, and to quickly fix known vulnerabilities, usually via patching.

If you don’t implement good configuration and patch management you leave your business open to the following risks:

  1. Unauthorised changes to systems: Changes to your protection systems by unauthorised individuals, either internal or external, leaving information at risk.
  2. Exploitation of software bugs: Attackers will attempt to exploit unpatched systems to provide them with unauthorised access to system resources and information. Many successful attacks exploit vulnerabilities for which patches have been issued but not applied.
  3. Exploitation of insecure system configuration: An attacker could exploit a system that has been poorly configured by:
  • Gaining access to information they are not authorised to see.
  • Taking advantage of unnecessary user rights or system privilege.
  • Exploiting unnecessary functionality that has not been removed or disabled.
  • Connecting unauthorised equipment that is then able to compromise information or introduce malware.
  • Creating a back door to use in the future for malicious purposes.

How can the risk be managed?

The risk of poor system configuration can be managed by the following security controls:

  1. Use supported software: Use versions of operating systems, web browsers and applications that are vendor (or community) supported.
  2. Develop and implement policies to update and patch systems: Implement policies to ensure that security patches are applied in an appropriate time frame, such a 14 days for critical patches. Automated patch management and software update tools might be helpful. In cases where it is not possible to patch a vulnerability steps should be taken to make it very difficult to exploit. This might include making it difficult for an attacker to communicate with the system.
  3. Create and maintain hardware and software inventories: Create inventories of all authorised hardware and software used across the organisation. Ideally the inventory should capture the physical location, business owner and purpose of hardware together with the version and patch status of all software. Tools can be used to help identify unauthorised hardware or software.
  4. Manage your operating systems and software: Implement a secure baseline build for all systems and components, including hardware and software. Any functionality or application that does not support a user or business need should be removed or disabled. The secure build profile should be managed by a configuration control process and any deviation from the standard build should be documented and approved.
  5. Conduct regular vulnerability scans: Regularly run automated vulnerability scanning tools against all networked devices and remedy or manage any identified vulnerabilities within an agreed time frame.
  6. Establish configuration control and management: Implement policies that set out a configuration control and change management process for all systems.
  7. Disable unnecessary peripheral devices and removable media access: Assess the need for access to peripheral devices and removable media. Disable ports and system functionality that does not support a user or business need.
  8. Implement white-listing and execution control: Create and maintain a whitelist of authorised applications and software that can be executed. In addition, systems should be capable of preventing the installation and execution of unauthorised software by employing process execution controls.
  9. Limit user ability to change configuration: Provide users with the permissions that they need to fulfil their business role. Users with ‘normal’ privileges should be prevented from installing or disabling any software or services running on the system.
  10. Limit privileged user functionality: Ensure that users with privileged system rights (administrators) have constrained internet and email access from their privileged account. This limits exposure to spear phishing and reduces the ability of an attacker to achieve wide system access through exploiting a single vulnerability.

Source of Information

Information taken from the National Cyber Security Centre website “10 steps to secure configuration”.

Reproduced under the Open Government Licence.