A security professional can BEST mitigate the risk of using a Commercial Off-The-Shelf (COTS) solution by deploying the application with which of the following controls in place?
The risk of what? The application being dangerous to the corporate network or the application being vulnerable to external exploits? Either way segmentation makes more sense imo.
Exactly - ensuring no unnecessary ports or services are running, access to the internet is configured properly (if at all needed), proper acl is setup, etc.
Even if you harden the configuration It will not help If there is vulnerability in the software code which is exploited by attacker. Attacker may access your network through legitimate way to exploits your network If network segmentation is not in the place.
This is easy to me and the answer is D. Anyone who has configured MS O365 or Entra, etc., knows how unsecure by default these can be. Review best practices and recommendations to harden the COTS products. A.I. - Hardening a COTS application involves configuring it to minimize its attack surface by disabling unnecessary features, removing default accounts, and applying security patches. This approach ensures that the application is set up to operate securely, reducing the likelihood of exploitation by attackers.
A vs D
A - it prevent attacker to lateral move to the internal network if the application is compromised
D - It reduce the chance for the application to be compromised
I think it is better to enhance the first line of defense, so D.
I think most confusion comes from the perception of what COTS can be. COTS products can include: motherboards, Windows OS, Microsoft 365, Office, Pfsense, VMware, routers, switches, IoT, etc.
So network and endpoint devices, you can segment, but how about productivity suites and application platforms? network segmentation is a common security practice anyway, regardless of COTS.
I think the best thing is to research CVE and vendor reputation, and then make sure all DEFAULT configuration, credentials, features, etc. are hardened during implementation.
I remembered OSG recommended D, harderning config. for COTS.
Again, very important, please confine my solution within the context here. A? network segmentation could be an option, but is not the first step I shall do and is out of question context.
I choose D.
Answer is D. A COTS application is not necessarily hardened by default. For example, the government uses STIGs to tell admins how to harden some applications.
I'm saying D. As far as risk from attackers goes, I would lean towards network segmentation, however, general risk includes a lot of other factors like user accessibility, interoperability issues, etc. Segmenting it could introduce a much larger and complex workload and ultimately make it risky in that sense.
Answer D) Hardened configuration
This means you remove/change configurations you don't need/want as well as change default usernames/passwords/ports/etc...
Segmenting a network won't help as it would still leave the COTS exposed with defaults readily available to be exploited.
A. Network Segmentation - when introducing a new pet into your house, you have to learn the behavior and interaction with other pets before you let him loose.
same here, as a security personnel you must know exactly what you introducing before hand and must be on segmented part of the network that shutting an interface can terminate all possible risks on the rest of the network.
trust but verify
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Nickolos
Highly Voted 2 years, 5 months agodev46
2 years, 5 months agostickerbush1970
2 years, 5 months agoNickolos
2 years, 5 months agoDeepCyber
1 year, 8 months agocysec_4_lyfe
Most Recent 6 days, 11 hours agocwjchoi
6 days, 16 hours agohumor927
1 month agodeeden
6 months, 3 weeks agoRamye
8 months agojieaws
10 months, 2 weeks agoajike
11 months, 2 weeks agoKyanka
11 months, 3 weeks agoHongjun
11 months, 3 weeks agoHackermayne
1 year, 1 month agoYesPlease
1 year, 2 months agoMoose01
1 year, 3 months agohomeysl
1 year, 4 months agoMoose01
1 year, 4 months agoWz21
1 year, 4 months agosebseba
1 year, 5 months ago