25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Top Ten Cybersecurity Misconfigurations and Recommended Mitigations

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have shared the top ten cybersecurity misconfigurations and the tactics, techniques, and procedures used by malicious actors to exploit these misconfigurations.

Cyber threat actors search for and exploit unpatched vulnerabilities in software and operating systems to gain initial access to internal networks, but there are often much easier ways to breach defenses. Organizations of all sizes make mistakes that leave holes in their defenses that are easy to exploit, and poor cybersecurity practices can be exploited once initial access has been gained to move freely inside networks undetected.

The NSA and CISA identified the top ten cybersecurity misconfigurations through their red and blue team assessments and incident response activities. These misconfigurations were found in organizations of all sizes, even large enterprises with mature cybersecurity postures.

  1. Default configurations of software and applications
  2. Improper separation of user/administrator privilege
  3. Insufficient internal network monitoring
  4. Lack of network segmentation
  5. Poor patch management
  6. Bypass of system access controls
  7. Weak or misconfigured multifactor authentication (MFA) methods
  8. Insufficient access control lists (ACLs) on network shares and services
  9. Poor credential hygiene
  10. Unrestricted code execution

Network defenders are encouraged to address these commonly exploited misconfigurations and software manufacturers have been urged to take ownership of improving security outcomes of their customers by embracing secure-by-design and-default tactics. The NSA/CISA cybersecurity advisory includes mitigations for network defenders against these common misconfigurations and recommendations for software manufacturers to reduce the prevalence of these misconfigurations and ease the burden on their customers.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist