The adversaries aren’t trying to score style points to break in; they’re just going to find a way in. - Jeremiah Grossman.This blog is a summary of Jeremiah Grossman ’s keynote address at Paubox SECURE @ Home . Information and data referenced in this post can be found here . To watch Grossman's presentation, click here.
With a lot of organizations, they’re getting hacked on things that are entirely preventable only if they knew those systems existed. - Jeremiah Grossman.An asset inventory is a collection of all Internet-connected assets within an organization. These assets include websites, mail servers, FTP servers, IoT devices, VPNs, etc., whether they live in the cloud or an on-premise system, and what assets have expired or soon-to-be expired TLS certificates. This inventory type helps many departments across the organization, including IT, information security, finance, compliance, audit, and more. SEE ALSO: How Does an IT Asset Inventory Aid HIPAA Compliance? A comprehensive asset inventory management system tells an organization what assets it has and where they are. This knowledge aids with security ratings, incident response, third-party risk management, and finding vulnerabilities and patching them. Without an up-to-date asset inventory, organizations will unknowingly leave vulnerabilities exposed, allowing bad actors to exploit them.
It stands to reason that you’ll lose track of certain certificates as they expire. - Jeremiah Grossman.The number of certificate authorities (CA) an organization has doesn’t mean it is more or less secure, but the more certifications it has, the more it will need to manage. A certificate authority certifies the ownership of a public key with a public key certificate . The CA acts as a third-party trusted by the public key owner and the parties that rely upon the certificate. Vulnerabilities lie within the number of expired TLS certificates related to the total number of Internet-accessible assets. As noted in Grossman’s presentation, HCA Healthcare has 97 TLS certifications that are expired or have something wrong with them. McKesson has over 600. With over 100,000 assets and only 97 expired TLS certifications (0.09%), HCA has a manageable number of certification vulnerabilities. However, McKesson has 614 total expired certifications, with only 22,000 Internet-accessible assets (2.69%), which Grossman says may indicate an “IT hygiene problem.” Expired certifications provide an opening for a bad actor and create security vulnerabilities.
WordPress sites tend to be really secure and really well managed or not well managed. There really is no in-between. - Jeremiah Grossman.WordPress is a popular open-source content management system used for millions of sites and is relatively secure if plugins are kept up-to-date. SEE ALSO: Is WordPress HIPAA Compliant? The best way for an organization to scan WordPress for plugin vulnerabilities is to utilize WordPress Scan . This website keeps a running list of all plugins and their versions. It will flag older versions of plugins and report those vulnerabilities to an organization. Remember, bad actors only need one vulnerability within one site to break into an organization’s entire system.
Everyone gets compromised; everyone gets breached; it’s only a matter of time. Security can never be perfect. You want to be able to detect these things fast, and you want to be able to recover as quickly and easily as possible. - Jeremiah Grossman.