The Security Table

NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations

Chris Romeo Season 1 Episode 33

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 20:09

Matt, Chris, and Izar discuss the recently published "NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations." They review each point and critically analyze the document's content, pointing out areas where the terminology might be misleading or where the emphasis should be shifted. As they work through the top ten list, several trends and larger conversations appear out of the individual points.

The trio delves into the nuances of system configurations, emphasizing the risks associated with default settings that expose insecure protocols. Systems should not provide options that are inherently insecure! They also touch upon the challenges of network segmentation in the era of software-defined networking and the implications of poor patch management. They highlight the importance of understanding the difference between configuration problems and design flaws, particularly in password management and storage.

The discussion provides insights into the complexities of cybersecurity and the challenges of ensuring that systems are both user-friendly and secure. The dynamic exchange underscores the importance of continuous learning and adaptation in the ever-evolving field of cybersecurity.

Helpful Links:

NSA and CISA Red and Blue Teams Share Top Ten Cybersecurity Misconfigurations
     https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-278a


FOLLOW OUR SOCIAL MEDIA:

➜Twitter: @SecTablePodcast
➜LinkedIn: The Security Table Podcast
➜YouTube: The Security Table YouTube Channel

Thanks for Listening!

Chris Romeo

Hey folks, welcome to another episode of the security table. This is an abridged episode because we're going to talk really fast about something and have kind of a shorter episode here. Joined by Izar and Matt and myself, Chris Romeo, we're always around the security table and we're going to jump right in. So I am looking at this NSA and CISA red and blue team share top 10 cybersecurity misconfigurations. Let's pick up with number one and get into it. So default configurations of software and applications. Do we, are we in favor of these or are we against?

Matt Coles

Well, so,

Izar Tarandach

If you don't configure it right, then it's a misconfiguration, then, uh, yeah, I guess it's pretty much on the top ten.

Matt Coles

Well, but I mean, this is, if we have, if we talk about a default configuration, this is making an assumption that the default is bad and therefore, but, but you could say the same thing about everything on this list. If this is your default,

Izar Tarandach

Oh, no, no, no, no, wait, wait, they go to default credentials, meaning basically the misconfiguration here is that you are not changing the default passwords, which we know that absolutely nobody ever does, everybody immediately goes and puts a safe, good password instead of the default.

Chris Romeo

I mean, that's why with default credentials, you don't let people, you don't give them the choice. There is no default credential. You don't have one. You have them set a password when they're configuring the device or whatever. I wasn't going to name any names. It was supposed to be without

Izar Tarandach

I didn't, I just had a thing

Chris Romeo

yeah, you have a little sneeze

Matt Coles

so on this list, there is no default. I mean, unless you're talking about, about credential hygiene or not, there is no default credentials explicitly on this list.

Izar Tarandach

yeah,

Matt Coles

But number one is a summary line. It doesn't really need to be its own number, because they have put 11 on this list. If your default configuration is insecure, of course it's going to be number one.

Chris Romeo

Yeah.

Matt Coles

but all of these other things are also,

Chris Romeo

missing. They're, they're mixing default credentials here with poor credential hygiene at number nine. So it doesn't make sense. Why are these not combined? Why would you have two separate things here?

Matt Coles

well, so poor credential hygiene could be two things. misconfiguration of your password policies. Or it could be lack of your runtime behaviors around looking at compromised credentials. So in one case it's a configuration, in the other case it's not a configuration. So it's kind of a misleading item on this list.

Chris Romeo

Okay.

Izar Tarandach

one, one is what one is having the, the, the fact that you shouldn't be able to keep the default past setup. And the second one is you really should choose a good password and you should store it right.

Chris Romeo

how about

Izar Tarandach

the thing that, just before we go there, the thing that I have a problem with here is that we start with default configurations, which is a big thing, and then we funnel into credentials and permissions, which is a very, very, a much smaller subset than default configurations.

Chris Romeo

yeah. Yeah, they talk about service level permissions as well. But look at two. I think we're gonna love two. It's basically the E in STRIDE.

Izar Tarandach

I do, I do, but uh, I don't think it's a misconfiguration. I think it's usually more of a design thing

Chris Romeo

Ooh, good point. Let's unpack that a little bit. So why, why is this a design problem and not a misconfiguration?

Izar Tarandach

because it, it Putting, putting it, I, I think that lumping it together as a misconfiguration under this title basically means you are, you are using accounts that have way too much, too, way too much privileges than they should. Right. Which is not exactly a problem of a problem of separation. It's a problem of the way that you design your system and you are giving one, one account the ability of being everything, rather than saying we have this set of accounts that's admin accounts and we have this set of accounts that's user accounts.

Chris Romeo

I think we have a context problem. We're looking at this through the lens of AppSec and software and ProdSec people. I just took a closer look. This says top 10 cybersecurity misconfigurations. So they're not specifically talking about design, like designing a web app. They're talking about excessive account privileges and elevated service account permissions that would be part of an operating Windows network in an enterprise.

Matt Coles

Yeah, so let's talk about that

Izar Tarandach

Aren't those applications?

Matt Coles

Well, so think about number one, think about number one in that context then. Leaving the default configuration is the problem, right? by not changing the configuration to a secure state. If it requires elevating security, and I will just, and this is a lightning round here, but, you know, just think about the, the CISA Secure by Design, Secure by Default guidelines that came out recently in updated form. Secure by Default means come secure. And you have to weaken security. We talk about loosening guides, but most of the time come products and application applications and software are shipped in a default configuration is insecure and leaving it in that insecure configuration state puts it the number one on this list. Number two is likewise. Those things often ship with an administrative account. That administrative account may be the only account that's that's installed by default. And people will use it for operations when they shouldn't. They should create, they should create an additional account, non privileged, to be used for, for general purpose or something that's view only for, for metrics and reporting purposes or, or whatever. And you should be separation of the, the application should enforce separation of duties and users of those applications should reinforce that.

Chris Romeo

All right. So let's look at three. I don't get this one. Insufficient

Izar Tarandach

four, actually,

Matt Coles

What, you don't get this at all? How do you, how do you, you can't measure what you don't know, right? You can't defend what you don't have

Chris Romeo

yeah, but isn't everything encrypted in the world we live in now? How is, how can you monitor anything on a network that's not

Izar Tarandach

Oh, no, no, no, no, no, no,

Chris Romeo

just a bunch of TLS going back

Matt Coles

packet inspection,

Izar Tarandach

no, no, no, you can,

Matt Coles

TLS offloading.

Izar Tarandach

you can monitor for, for, uh, streams are not predicted in your threat model. So I know that these two things are expected to talk, but if I see A talking to Z, all of a sudden, oh wait, that's not supposed to happen.

Matt Coles

Right. But also with TLS offloading and deep packet inspection, I mean, once you're, yes, we're supposed to be in a world of zero trust, right, where systems are going to be on island unto themselves. But traditionally, you know, there's a network boundary where you may terminate TLS at the network boundary and then everything within it can be deep packet inspected and monitored for the traffic. And if you don't do that, then you're potentially leaving yourself at risk.

Chris Romeo

I mean, can you do that at the speed of an enterprise network though? Can you, I mean, we're talking

Izar Tarandach

if you use mirror traffic,

Chris Romeo

in a 10 gig connection, you can decrypt all of that TLS traffic

Matt Coles

With hardware, with hardware decryption. Yeah, yeah. With hardware decryption. Absolutely.

Izar Tarandach

you can.

Chris Romeo

Okay. Wow.

Izar Tarandach

But the thing

Chris Romeo

The world of computing has gotten further.

Izar Tarandach

that, the thing that's sort of bothering me here is that we jumped from configuration of actual stuff and how you use stuff to all of a sudden on three and four we are looking at networks.

Chris Romeo

And This is designed too. It

Izar Tarandach

And many times it's not the same people who do both things. So who's the public for this thing here?

Matt Coles

I guess it's misleading. It's misleading because it's not a configuration. It's, it's,

Chris Romeo

It is. It is a configuration. Be when, because you could, I mean, whenever, whenever you de, whenever you de you designed, when you go to implement it, it is, you are configuring your network monitoring tools in an insufficient way.

Izar Tarandach

Well, you configure it because it has to be configured to be, to be of use, but it's not a configuration problem of the environment or the system or the whatever. Fair.

Matt Coles

We're nit-picking on words at this point.

Chris Romeo

Yeah, let's, let's keep, but to your earlier point about design, there is a design element to, if you properly design your network monitoring, you don't have insufficient network monitoring. And so

Matt Coles

And by the way, and by the way, for four, with software defined networking, this is absolutely a configuration issue,

Chris Romeo

and four, just for the record, is lack of network segmentation.

Matt Coles

right? So having

Izar Tarandach

could be architecture.

Matt Coles

it is, it is an architecture and it may

Izar Tarandach

architecture now is configuration.

Matt Coles

oh, we could have an episode alone on that one.

Izar Tarandach

I dare you. I dare you to go to an architect and say What you do is configuration. I dare you,

Chris Romeo

Yeah, you're, you're change management now, friend. That's what you do. It's

Matt Coles

Wait, isn't that, isn't that Dev, isn't that DevOps? Isn't that what DevOps and DevSecOps is all about?

Chris Romeo

What?

Izar Tarandach

And he just said the quiet part loud.

Chris Romeo

Well, there's another dollar in the swear jar from. from Matt Coles,

Matt Coles

at least I didn't say pane of glass.

Chris Romeo

or ShiftLeft, or any of my other,

Matt Coles

Single pane

Chris Romeo

of the other words that cause pain.

Matt Coles

right. So poor patch management. Number five, not a configuration per se, unless it's automatic updates we're talking about.

Chris Romeo

Oh, I see what you're saying.

Izar Tarandach

oh, oh, speaking of the word jar, so, is this one talking about SBOMs? Is it SBOM time?

Chris Romeo

Please no. Please stop.

Matt Coles

Please

Izar Tarandach

already? Wait, do we have insufficient DAST anywhere?

Chris Romeo

Oh man, this is... Okay, so poor patch management, lack of regular patching, use of unsupported operating systems. To your point, this isn't a configuration unless it's an automated thing. This is just a point, this isn't the top 10 misconfigurations, it's the top 10 problems

Izar Tarandach

Yeah, true,

Chris Romeo

It's a la so the, the, the misconfiguration would be a lack of automated patch management. Cause that's something you could change. You could turn it on or turn it off. Alright, good. Six, bypass of system access controls. Wait a minute.

Matt Coles

I'm not entirely sure this is a configuration issue. This is a, this is an active attack kind of thing,

Izar Tarandach

yeah, I would say that having system access controls is the configuration or misconfiguration,

Chris Romeo

look at the first sentence there. That's a threat. The first sentence is a threat. A malicious actor can bypass system access controls by compromising alternate authentication methods in an environment. I

Matt Coles

okay, so there's the config, there's the configuration problem, right? If you, if, and it goes back to number one, if you have a default, if the system's default configuration exposes insecure protocols and you leave them open, you're at risk to this threat. Right? Number two, the second sentence here, if a malicious actor can collect hashes. Well, how do they collect hashes? You've left Lanman in your, in your system, right? Or NTLM or whatever.

Chris Romeo

And that you're saying that's the lack, that's the configuration problem or the

Matt Coles

a configuration problem, right? So you've missed configuration. You've left insecure protocols in place.

Izar Tarandach

the whole item is just listing ways of bypassing authentication.

Matt Coles

Yeah, but they, they should, they should have taken the, the statements and turned'em around in, in terms of, as a systems, as a system designer and a system deployer don't leave insecure configurations because they'll allow malicious actors to do X, Y, Z. That's how it probably should have been stated. That's, I think, what they intended to say. But, but what they did was they, they took the attack first and not the, not the cause.

Chris Romeo

Yeah. So then seven, weaker misconfigured MFA methods.

Matt Coles

Oh.

Chris Romeo

But listen where they start here. Misconfigured smart cards or tokens. Generally government or DoD networks. So not really that applicable to the average enterprise. Like we don't use smart cards anywhere. At least I don't know anyone who uses smart cards.

Matt Coles

Uh, some companies, well yeah, okay, maybe primarily in government or DoD, but I, you know, have high security environments that do use this, use smart cards. It's not unheard of, and people use YubiKeys and other FIDO tokens all the time.

Chris Romeo

I mean, that's not a smart card though, right? A YubiKeys,

Matt Coles

It's a token.

Chris Romeo

they're talking

Izar Tarandach

a token, it's a...

Chris Romeo

They're talking about CAC cards here from,

Matt Coles

They are. CAC and PIV, right,

Izar Tarandach

are talking about tokens as well, so you could think about FIDO and all that

Matt Coles

So if you have a, if you have a, a Google Titan, or if you have a, uh, uh, a YubiKeys, right? Those are, those are access tokens. Those are tokens that are in scope here. What's interesting though, is they don't start with not having MFA in the first place. They start with the assumption that you have MFA and it's insecurely configured, not, you don't have MFA.

Chris Romeo

Well, that

Matt Coles

one.

Chris Romeo

Not having MFA, to our earlier discussion would not be a misconfiguration.

Izar Tarandach

Exactly, yeah,

Chris Romeo

be a design problem. So they, they kind of followed the

Matt Coles

unless it was a configuration option that you could enable MFA that you didn't.

Chris Romeo

I see.

Izar Tarandach

are assuming that you have it, but it's misconfigured.

Matt Coles

That's

Chris Romeo

All right. Now eight, we go back to network.

Izar Tarandach

No, no, wait, wait, wait, but before we go there, then they jump to lack of phishing resistant MFA.

Matt Coles

Which is a configuration problem again.

Izar Tarandach

is the configuration or is design of the MFA, perhaps the MFA solution is not good enough.

Matt Coles

That's true if you have one to choose from, but if you have multiples to choose from, and you don't enable, again, the strongest one available,

Izar Tarandach

Oh, oh, no, sorry. On, on upon reading. They seem to be addressing, uh, MFA over SMS because they say that exploitation of Signaling System 7 protocol vulnerabilities and SIM swap techniques is the problem.

Matt Coles

right,

Chris Romeo

So we agree with that. I mean, we agree

Matt Coles

if you have the option, if you have an option of using one that

Izar Tarandach

not a misconfiguration,

Matt Coles

unless it's an option,

Chris Romeo

Which a lot of times it is an option. A lot of times it is an option these days between push

Izar Tarandach

But again, wait.

Chris Romeo

and text based,

Izar Tarandach

If you have a choice between A or B, is that a misconfiguration if you choose the weaker of them? Or is it a bad design choice?

Chris Romeo

SMS based, or secure by default. So

Matt Coles

it's a bad default. It's a bad default, which means it's a design. It's a configuration choice and it's a bad design in that you're giving a poor choice.

Chris Romeo

Yeah,

Matt Coles

It's.

Izar Tarandach

OK, you convinced me.

Chris Romeo

all right, 8. Insufficient ACLs on network shares and services. So now we're back to the network again.

Matt Coles

Yeah, this is a configuration problem that most definitely you've set the wrong ACLs.

Chris Romeo

we're just we're just we're saying this is a misconfig and we're moving on.

Matt Coles

Yep.

Chris Romeo

All right, 9 says poor credential hygiene.

Izar Tarandach

that's basically bad configuration of human persons because,

Matt Coles

Well, this is, this is password. If you're using passwords and you're not using MFA or if you're using MFA with passwords and you have crackable passwords, that means you've set a weak password policy. Right? You haven't used 20 characters with symbols, alphanumeric and spaces.

Izar Tarandach

Wait, wait, wait, we know that those policies are not all that they are hyped up to be, right?

Chris Romeo

Yeah, I'm, I

Matt Coles

But if you enforce a strong password policy...

Chris Romeo

Mean, what is the new, it's NIST 800-63, right? 800-63 redefines password policies as, as what they should be in a proper

Matt Coles

Long, easy to remember, but hard to guess passphrases that don't change frequently.

Chris Romeo

Not changeable, unless there's been a breach, you don't have to change them.

Izar Tarandach

And here they say that it's, if it's shorter than 15 characters, then it's bad.

Matt Coles

And clear text password disclosure. We talked about this earlier with use of insecure protocols that expose credentials on the wire. Right? But what, what's, I guess that's, that's the, that's the choosing of a bad credential that can be easily guessed or reusing credentials and exposing it through insecure configurations. That's ultimately what it's getting to.

Izar Tarandach

But again, is this a configuration thing? I mean, the only configuration that I can think of in here is the size of the password, or the choice of hashing

Chris Romeo

yeah,

Izar Tarandach

method

Chris Romeo

there's, there's so much more they could have done. Like even just referencing 800-63 is. The current standard of what I think of as the best practice. Um, I don't, I don't think, I mean, if somebody is in this day and age, if they're allowing short passwords and non complex passwords, then, shame on them...

Matt Coles

And then, and then they're, and then they talk about password stealth held in clear text. So this is not a configuration issue, right? This is not

Izar Tarandach

configuration.

Chris Romeo

That's a design problem. They,

Izar Tarandach

I don't know any system that says would you like to store your passwords in clear text. Oh, okay, I'm going to configure it this way. Yay! Let's hope for the good things.

Chris Romeo

All right, we got to pick up 10 here. Unrestricted code execution. So there's a, there's a condition at the top though. If unverified programs are allowed to execute on hosts, a threat actor, Oh, it sounds like a threat, can run arbitrary malicious payloads within a network.

Matt Coles

Yeah. In my opinion, I don't know how you can say that this is a configuration issue unless you're running EDR,

Chris Romeo

Well, can you, can you somehow force, like on Windows, can you, is there a configuration setting to only run things that are trusted binaries?

Izar Tarandach

you, you need stuff on top of it.

Matt Coles

No, but you can't, you can have Windows fail to run without prompting for UAC. You could, right, or whatever it's called now.

Chris Romeo

Yeah, they had a what, because it was their safe list. Didn't they build a safe list feature years ago for

Matt Coles

If it's not digitally signed, if it's not digitally signed, you can,

Izar Tarandach

and the certificate is good,

Matt Coles

can do, you can do group policies to prevent this.

Izar Tarandach

but unless it is a very, and I could be wrong here because I'm not a Windows person, but unless it's a very limited account. You can just click on run it anyway.

Matt Coles

Oh yeah, if you're, if you're running as admin, so you're running with elevated privileges, that goes back to the running with elevated privileges discussion,

Chris Romeo

Enterprise application environment, not everybody has admin, right? And so, and I think that's where they're going. Now, I don't know why you would turn off those protections in a Windows environment. Why would you turn off all of these things about safe listing applications based on signatures of binaries and things like

Izar Tarandach

Because Joe from accounting absolutely needs to be able to run that flash thing that he has from 95. So they have to lower the barriers and give him more

Chris Romeo

I guess. Not in my world. Not in my network. I won't allow it. So, all right. Well, that was a fun little quick pass through the NSA, CISA, Red and Blue teams share top 10 cybersecurity misconfigurations. I think we kind of had some fun going through there and pointing out some things. Izar's got the

Izar Tarandach

it has to be said, it has to be said that we value the effort. We like that it came out and, uh, we just think that it could be a bit more, I don't know, focused, defined,

Chris Romeo

Could be tuned up a little bit to truly make it so that it's clear how everything is a misconfiguration.

Izar Tarandach

right. And the mitigations have good stuff. There's a lot to learn in there as well and they have good references. So I think that all in all, 3 out of 5 for the effort.

Chris Romeo

yeah, yeah. And it's, you know, they're, they're moving, they're moving the industry forward. It may not be perfect. Nobody's ever going to be perfect and that's okay. Cause there is no perfect security. Um, there is only reasonable security and some of this is reasonable and we'll leave it with that. Thanks folks.

Podcasts we love

Check out these other fine podcasts recommended by us, not an algorithm.

The Application Security Podcast Artwork

The Application Security Podcast

Chris Romeo and Robert Hurlbut