Search Results

123 results • Page 2 of 13

ICS Supports the NSA/CISA Kubernetes Hardening Guide | Rapid7 Blog

... , any of whom may have special access to the organization’s Kubernetes infrastructure. ... disabling all authorization and limiting the ability to enforce least privilege for access.


Patch Tuesday - January 2025 | Rapid7 Blog

... published any browser vulnerabilities this month. Access: triple zero-day RCE Today sees the publication ... -16885 does describe an elevation of privilege vulnerability in the Windows storage ...


Cloud Security and Compliance Best Practices: Highlights From The CSA Cloud Controls Matrix | Rapid7 Blog

... is assigned a unique identity and a set of access permissions and privileges. ... Further, the framework suggests employing the Least Privilege Access (LPA) principle to ensure users only have ...


How to Securely Handle a Lost or Stolen Device: A Practical Workflow | Rapid7 Blog

... steal one device, they cannot get in unless they have access to a second device owned by the same ... always popular with non-security folks, least privilege ensures that users only have as ...


Patch Tuesday - July 2023 | Rapid7 Blog

... an attacker must already have existing local access to an asset, so this vulnerability ... be authenticated as a user with at least Site Member privileges, this isn’t necessarily much of a ...


Patch Tuesday - September 2024 | Rapid7 Blog

... Installer to be over-generous with the privileged access it requires to install software and configure the OS ... Windows Remote Access Connection Manager Elevation of Privilege Vulnerability


Securing the Supply Chain: Lessons Learned from the Codecov Compromise | Rapid7 Blog

Apply least privilege permissions for CI jobs using job-specific credentials ... detect when atypical IP addresses are accessing critical systems that should only be accessed by trusted IPs.


Exploitation of Mitel MiVoice Connect SA CVE-2022-29499 | Rapid7 Blog

... which at the time of detection was an undisclosed zero-day vulnerability — as an initial access vector. ... network filters for these devices and employ the principle of least privilege.


Rapid7 Recognized in Forrester’s 2024 Attack Surface Management (ASM) Wave Report | Rapid7 Blog

Monitor effective access and enforce least privilege access (LPA): Analyze all roles and identities across your clouds to help eliminate excessive permissions and enforce LPA at scale.


Cloud Complexity Requires a Unified Approach to Assessing Risk | Rapid7 Blog

... and remediating exploitable vulnerabilities; managing identity and access management (IAM) policies to maintain least privilege access; and utilizing encryption for data, whether it’s at ...