MSP Security Insights from CISA

MSP Security Insights from CISA

By Gary Audin

Everyone is concerend, threatened, and frightened about their IT and network resources being compromised. Every day, we learn about new threats to SMBs, enterprises, MSPs, VARs, governments, and other organizations. The Cyber & Infrastruture Security Agency (CISA), which is part of the Department of Homeland Security, publishes guidance and recommendations relating to security issues.

CISA is the national risk advisor, working with partners to defend against threats and collaborating to create more secure and resilient infrastructure. The threats—digital and physical, man-made, technological, and natural—are becoming increasingly complex, and the threat actors have become more diverse. The CISA seeks to help organizations manage risk and increase resilience using all available resources.

The CISA has published “CISA Insights: Guidance for MSPs and Small and Mid-sized Businesses,” which provides mitigation and hardening guidance to help organizations strengthen their defenses against cyberattacks. Because many small and mid-sized businesses use MSPs to manage IT systems, store data, or support sensitive processes, MSPs are an attractive target for malicious cyber actors. Compromises of MSPs can have worldwide effects and introduce significant risk to MSP customers.

This publication includes, “Mitigations and Hardening Guidance for MSPs,” providing the following guidance:

  • Apply the principle of least privilege to customer environments.
  • Ensure that log information is preserved, aggregated, and correlated to maximize detection capabilities.
  • Implement robust network- and host-based monitoring solutions.
  • Work with customers to ensure hosted infrastructure is monitored and maintained.
  • Manage customer data backups.

This is followed by “Mitigations and Hardening Guidance for Small and Mid-Sized Businesses,” which offers the following guidance:

  • Manage supply chain risks
  • Implement strong operational controls
  • Manage architecture risks
  • Manage authentication, authorization, and accounting procedure risks
  • Review contractual relationships with all service providers
  • Implement CISA’s Cyber Essentials to reduce your organization’s cyber risk

The final part provides a series of resources valuable for the MSP. The technical resources include more detailed information about hardening MSP and customer infrastructure in response to general and specific cyber threats, including websites and technical alerts.

For general incident response guidance, download the Joint Cybersecurity Advisory AA20-245A: Technical Approaches to Uncovering and Remediating Malicious Activity. The CISA also offers a range of no-cost cyber hygiene services to help MSPs assess, identify, and reduce their threat exposure. Organizations of any size will find ways to reduce their risk and mitigate attack vectors.

A second CISA publication is “Top Routinely Exploited Vulnerabilities”. The CISA, the Australian Cyber Security Centre (ACSC), the United Kingdom’s National Cyber Security Centre (NCSC), and the U.S. Federal Bureau of Investigation (FBI) have released the Joint Cybersecurity Advisory on vulnerabilities  It details the major vulnerabilities routinely exploited by malicious actors in 2020 and those being widely exploited thus far in 2021.   

In 2020, cyber attacker exploited recently disclosed vulnerabilities to compromise unpatched systems. A majority of the top vulnerabilities targeted in 2020 were disclosed during the past two years. Cyber actor exploitation of recently disclosed 2020 software flaws probably stem from the expansion of remote work options because of the COVID-19 pandemic.

The most frequently targeted 2020 vulnerabilities affected remote work, VPNs, or cloud-based technologies. Many VPN gateway devices remained unpatched during 2020. The growth of remote work options challenged the ability of MSPs to conduct rigorous patch management.

There is a chart summarizing the CVEs encountered with the vendor identified, Common Vulnerabilities and Exposures (CVE) identifier, and the type of CVE. In 2021, cyber actors continue to target vulnerabilities in perimeter-type devices. This publication recommends that MSPs should prioritize patching for the following CVEs known to be exploited. 

  • Microsoft Exchange: CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065 
  • Pulse Secure: CVE-2021-22893, CVE-2021-22894, CVE-2021-22899, and CVE-2021-22900
  • Accellion: CVE-2021-27101, CVE-2021-27102, CVE-2021-27103, CVE-2021-27104
  • VMware: CVE-2021-21985. 
  • Fortinet: CVE-2018-13379, CVE-2020-12812, and CVE-2019-5591

This publication provides detailed information about many of the CVEs mentioned. As of the publication of this blog, there are 157,742 CVEs listed.

For the latest information about the MSP cyber landscape, join MSP Expo 2022, delivering four days of education and networking specifically focused on the MSP community, including one full track dedicated to security.  MSP Expo 2022 takes place June 21-24, 2022 in Ft. Lauderdale, Florida and is collocated alongside the other #TECHSUPERSHOW events, including ITEXPO, Future of Work Expo, IoT Evolution Expo, The Blockchain Event, and more.




Edited by Erik Linask
Get stories like this delivered straight to your inbox. [Free eNews Subscription]
SHARE THIS ARTICLE
Related Articles

Say Goodbye to Passwords: 1Password Unveils Two Passkey Innovations

By: Greg Tavarez    6/9/2023

1Password now offers customers the ability to save and sign into online accounts with passkeys as well as unlocking 1Password accounts with a passkey.

Read More

Industrial Cybersecurity Transformed: Secureworks Launches Integrated MDR Solution for OT and IT

By: Greg Tavarez    6/8/2023

Secureworks announced two new offerings to unify the way industrial organizations prevent, detect and respond to threats across the OT and IT landscap…

Read More

K8 Notifier: A New Twist on Cloud Cybersecurity

By: Matthew Vulpis    6/8/2023

K8 Notifer can create a suite of alerts for MSP to detect suspicious activity in the configuration and patterns of their and their customers cloud ser…

Read More

Impossible Cloud Paves Way with New Program in the Web3 Era

By: Greg Tavarez    6/8/2023

Impossible Cloud's Partner Program allows partners and resellers to seamlessly implement, demo and integrate its efficient, performance-driven solutio…

Read More

CrowdStrike Empowers Next-Gen Cybersecurity with Generative AI

By: Stefania Viscusi    6/8/2023

Security company CrowdStrike unveiled Charlotte AI, a new generative AI cybersecurity that will help to democratize security and empower users of the …

Read More