Whencreating a threat model to identify vulnerabilities in an organization's infrastructure, prioritizing external-facing infrastructure with known exploited vulnerabilities is critical. Here’s why:
Exposure to Attack: External-facinginfrastructure is directly exposed to the internet, making it a primary target for attackers. Any vulnerabilities in this layer pose an immediate risk to the organization's security.
Known Exploited Vulnerabilities: Vulnerabilities that are already known and exploited in the wild are of higher concern because they are actively being used by attackers. Addressing these vulnerabilities reduces the risk of exploitation significantly.
Risk Mitigation: By prioritizing external-facing infrastructure with known exploited vulnerabilities, the organization can mitigate the most immediate and impactful threats, thereby improving overall security posture.
[References:, CompTIA Security+ SY0-601 Study Guide by Mike Chapple and David Seidl, NIST Special Publication 800-30: Guide for Conducting Risk Assessments, OWASP Threat Modeling Cheat Sheet, , , , , ]
Submit