Implementation -> Infrastructure Hardening: Simple access control for systems
Risk and Opportunity
Risk: Attackers a gaining access to internal systems and application interfaces
Opportunity: All internal systems are using simple authentication
Exploit details
Usefullness: Very High
Required knowledge: Medium (two disciplines)
Required time: Medium
Required resources (systems): Medium
Additional Information
Dependencies: Defined deployment process
Implementation hints: HTTP-Basic Authentication, TLS, VPN
OWASP SAMM 1 Mapping: EH1-B
OWASP SAMM 2 Mapping: o-environment-management|A|1
ISO27001:2017 Controls Mapping: