WIP: Preliminary Top 10 Items
Note
This page will be removed in the final version
Insufficient Access Control
- Access Control: User Identification, Authentication, Authorization
- unmanaged admin access
- external
- physical (JTAG)
- Lax access controls (account /user based)
- least privilege
- privilege creep
- non-repudiation
- potentially: way too large area, might need split-up; maybe use this user-management
- alternative: (identity + authentication + roles) + (access control)
Supply Chain Management
- use of insecure 3rd party items - HW / SW assets with critical vulnerabilities
Devices out in the field with known Vulnerabilities/Issues
- "everything where I as an attacker see a version number (hardware/software) and use an exploit for that version"
- problems with mitigation on-device-itself/vulnerability
- missing vulnerability management
- problems without mitigation on-device-itself/vulnerability
- legacy devices (hardware does not have capabilities)
- missing vendor support
- TODO: differentiation to configuration errors?
Faulty Trust Boundaries
- goal: least functionality vs. over-exposure of services
- errors in network segregration
- potentially can also contain 'external admin access'?
- potentially 'forgotten hardware debug interfaces'?
- available JTAG/SWD interface left enabled on production devices
Missing Incident Detection/Reaction Capabilities
- Missing Monitoring/Logging for Incident Detection (shadow infrastructure?)
- Alert fatigue with “dirty” environment
- Undefined processes for alert reporting/handling
- Discussion? Missing configuration backups for OT-Devices
Selection of components/protocols with insufficient security capabilities
- weak built-in security features like basic Bluetooth
- attention: this should not be a product placement
- legacy-to-be
- legacy products for new deployments
- protocols missing confidenciality/integrity (depends upon trust-zone)
- differentiation to 'missing awareness'
- here: security feature is not available
- 'missing awareness': feature is availabe, but not configured
Unknown Assets
- eventuell auch als subpunkt von incident response?
- discussion 'different split': missing visibility (includes incident detection, unknown assets) + missing incident reponse
Unmanaged external access (from above purdue model level 3 / IEC62443 zones/conduits )
- maintenance access
Availability
- (D)DoS attacks
- real-time communication safety
- availability vs. integrity -- flooding with fake data
Missing Awareness
- trying to wiggle out of security features via deflection to obscurity
- cyber-security hygiene
- everything configuration related
- missing encryption even if available
- available JTAG/SWD interface left enabled on production devices
- Intentional misconfiguration for ease of use, e.g., leaving rtu’s in upload mode
- lack of hardening
- why are security best-practises not applied? missing knowledge?
- culture
Existing Lists/Top-10 Items
We might move these to the related standards
section later on, but keep them
here as food for thought for now:
Issuer | Title | Description |
---|---|---|
BSI | ICS Security Top 10 threats and countermeasures 2022 | Focus on impact and vectors (malware, phishing, DDoS, sabotage) |
CISA | Top Ten Cybersecurity Misconfigurations | |
ENISA | Power Sector Dependency on Time Service | rather specific |
ENISA | Transport Threat Landscape | |
ENISA | Cyber security and resilience for Smart Hospitals | |
ENISA | ENISA Threat Landscape 2024 | Figure 8 (Page 16), gives a per-sector attack overview |