Skip to content
_CORE
AI & Agentic Systems Core Information Systems Cloud & Platform Engineering Data Platform & Integration Security & Compliance QA, Testing & Observability IoT, Automation & Robotics Mobile & Digital Banking & Finance Insurance Public Administration Defense & Security Healthcare Energy & Utilities Telco & Media Manufacturing Logistics & E-commerce Retail & Loyalty
References Technologies Blog Know-how Tools
About Collaboration Careers
CS EN DE
Let's talk

OWASP Top 10: Security Misconfiguration

15. 05. 2024 1 min read intermediate

90 % úspěšných útoků využívá misconfiguraci, ne zero-day exploity. Výchozí hesla, otevřené porty, verbose errors — reálné vektory útoku.

Common Mistakes

  • Výchozí přihlašovací údaje (admin/admin)
  • Detailní chybové zprávy v produkci
  • Nezabezpečený S3 bucket
  • Neaktualizovaný software
  • Directory listing zapnutý

Hardening — Nginx

server_tokens off; add_header X-Frame-Options “SAMEORIGIN” always; add_header X-Content-Type-Options “nosniff” always; add_header Strict-Transport-Security “max-age=31536000; includeSubDomains” always; add_header Content-Security-Policy “default-src ‘self’” always; client_max_body_size 10m;

Cloud — AWS S3

OWASP Top 10: Security Misconfiguration

resource “aws_s3_bucket_public_access_block” “private” { bucket = aws_s3_bucket.main.id block_public_acls = true block_public_policy = true ignore_public_acls = true restrict_public_buckets = true }

Automation

  • IaC: Terraform, Pulumi — verzovaná konfigurace
  • CIS Benchmarks: automatizované audity
  • CSPM: Prowler, ScoutSuite
  • Ansible: automatizovaný hardening

Key Takeaway

Automate configuration via IaC, scan regularly, remove defaults. Misconfiguration is the easiest attack vector — and the easiest to fix.

owaspsecuritykonfigurace
Share:

CORE SYSTEMS team

We build core systems and AI agents that keep operations running. 15 years of experience with enterprise IT.