Network misconfigurations take on many types and forms, and come about for many different reasons. Many of them stem from blind adherence to poorly-informed common practices or even just from simply not being aware that operating system configuration defaults inherently contain security misconfigurations.
Let’s review 2 common misconfigurations to serve as our examples:
Why closed ports are like landmines
Most organizations rely on their organizational domain firewall and tend to turn off the firewall at the level of the local machine. As a result, they often neglect to closely maintain it. One way this neglect may be revealed is through ports. As you may know, services and applications require different ports. These ports are usually opened per request on the organizational firewall by IT or the networking team, Over time, many of these services or applications are removed or deleted from the endpoint. However, the local firewall rule to allow connections on these ports is often overlooked and will remain on the ‘closed’ status as the application is no longer waiting for connections. Why would leaving a port in the closed state count as a misconfiguration? Well, first review the differences between the three most common port statuses:- Open port – The application or service is running and accepting connections over the port.
- Filtered port – A firewall or filter (or another network issue) is blocking the port. A port may be filtered by a server firewall, network firewall, router, or another security device.
- Closed port – Indicates that an application or service is not actively listening for connections on that port. However, a closed port can be open at any time if an application or service is started.