CISA Security Insights

Analytics/ Analysis

By: Gary Audin

Everyone is concerend, threatened, and frightened about their IT and network resources being comprised. Every day we learn about new threats to SMBs, enteprises, MSPs, VARs, governments, and other organizations. The Cyber & Infrastruture Security Agency (CISA), which is part of the Department of Homeland Security, publishes guidance and recommendations relating to security issues.

CISA is the national risk advisor, working with partners to defend against  threats and collaborating to create more secure and resilient infrastructure. The threats—digital and physical, man- Cybermade, technological, and natural—are more complex, and the threat actors have become diverse. The CISA seeks to help organizations manage risk and increase resilience using all available resources.

The CISA has published “CISA Insights: Guidance for MSPs and Small- and Mid-sized Businesses” which  provides mitigation and hardening guidance to help organizations strengthen their defenses against cyberattacks. Because many small- and mid-sized businesses use MSPs to manage IT systems, store data, or support sensitive processes, makes MSPs attractive for malicious cyber actors. Compromises of MSPs can have worldwide effects which introduce significant risk to MSP customers.

This publication covers “Mitigations and Hardening Guidance for MSPs” providing the following guidance:

  • Apply the principle of least privilege to customer environments.
  • Ensure that log information is preserved, aggregated, and correlated to maximize detection capabilities.
  • Implement robust network- and host-based monitoring solutions.
  • Work with customers to ensure hosted infrastructure is monitored and maintained.
  • Manage customer data backups.

This is followed by “Mitigations and Hardening Guidance for Small- and Mid-Sized Businesses” which offers the following guidance:

  • Manage supply chain risks
  • Implement strong operational controls
  • Manage architecture risks
  • Manage authentication, authorization, and accounting procedure risks
  • Review contractual relationships with all service providers
  • Implement CISA’s Cyber Essentials to reduce your organization’s cyber risk

The final part provides a series of resources valuable for the MSP. The  technical resources include more detailed information about  hardening MSP and customer infrastructure in response to general and specific cyber threats including websites and technical alerts.

For general incident response guidance, download the Joint Cybersecurity Advisory AA20-245A: Technical Approaches to Uncovering and Remediating Malicious Activity. The CISA also offers a range of no-cost cyber hygiene services to help MSPs assess, identify, and reduce their threat exposure. Organizations of any size will find ways to reduce their risk and mitigate attack vectors.

A second CISA publication is “Top Routinely Exploited Vulnerabilities”. The CISA, the Australian Cyber Security Centre (ACSC), the United Kingdom’s National Cyber Security Centre (NCSC), and the U.S. Federal Bureau of Investigation (FBI) have released the Joint Cybersecurity Advisory on vulnerabilities  It details the major vulnerabilities routinely exploited by malicious actors in 2020 and those being widely exploited thus far in 2021.   

In 2020, cyber attacker exploited recently disclosed vulnerabilities to compromise unpatched systems. A majority of the top vulnerabilities targeted in 2020 were disclosed during the past two years. Cyber actor exploitation of recently disclosed 2020 software flaws probably stem from the expansion of remote work options because of the COVID-19 pandemic.

The most frequently targeted 2020 vulnerabilities affected remote work, VPNs, or cloud-based technologies. Many VPN gateway devices remained unpatched during 2020. The growth of remote work options challenged the ability of MSPs to conduct rigorous patch management.

There is a chart summarizing the CVEs encountered with the vendor identified, Common Vulnerabilities and Exposures (CVE) identifier, and the type of CVE. In 2021, cyber actors continue to target vulnerabilities in perimeter-type devices. This publication recommends that MSPs should prioritize patching for the following CVEs known to be exploited. 

  • Microsoft Exchange: CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 
  • Pulse Secure: CVE-2021-22893, CVE-2021-22894, CVE-2021-22899, and CVE-2021-22900
  • Accellion: CVE-2021-27101, CVE-2021-27102, CVE-2021-27103, CVE-2021-27104
  • VMware: CVE-2021-21985. 
  • Fortinet: CVE-2018-13379, CVE-2020-12812, and CVE-2019-5591

This publication provides detailed information about many of the CVEs mentioned. As of the publication of this blog, there are 157742 CVEs listed.