CERT NZ sets out top 10 security measures

Controls will prevent or contain the majority of attacks, CERT NZ says

CERT NZ has published a list of 10 critical controls that it says, if implemented by organisations, would prevent, or better contain, the majority of attacks seen in the past year.

The list is CERT NZ's second of its kind and the organisation says it will publish, every few weeks, more information about a critical control.

"For each control a page will summarise the intent and success measures for business owners and a separate page will provide implementation advice for practitioners," a CERT NZ statement said.

Most of the controls listed should be standard practice. For example the list includes: Enforce multi-factor authentication, Patch your software; Change default credentials; Implement and test backups.

Others however require a level of expertise that might be lacking in small organisations. For example: Disable unused services and protocols.

"Older services and protocols often have their own vulnerabilities," CERT NZ says. "Leaving them on your network gives attackers more opportunity to breach your network. To mitigate this, scan your network for services and protocols that are: no longer used, or known to be vulnerable. If you identify any, carry out remediation based on your findings."

CERT NZ identified application white listing as one of the most important controls. "Most malware incidents reported to CERT NZ are likely to have originated from opening malicious email attachments, or drive-by downloads. Whitelisting the approved applications will help protect the system from these attacks."

It also stressed the importance of logging, saying logs had been not available for many of the incidents reported to it, making a complete post-incident investigation impossible.

The full list is

1. Enforce multi-factor authentication (MFA)

2. Patch your software

3. Disable unused services and protocols

4. Change default credentials

5. Implement and test backups

6. Implement application whitelisting

7. Enforce the principle of least privilege

8. Configure centralised logging and analysis

9. Implement network segmentation

10. Manage cloud authentication

Details can be found here.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags cyber security

More about

Show Comments
<img height="1" width="1" style="border-style:none;" alt="" src="//insight.adsrvr.org/track/evnt/?adv=bitgblf&ct=0:jkis3bum&fmt=3"/>