Every enterprise cybersecurity architecture has some form of vulnerabilities within various components that made up the architecture. Vulnerabilities must be mitigated to strengthen the cybersecurity posture.
INSTRUCTIONS
Conduct research on mitigations for these vulnerabilities: lack of firewall to the web servers, system admins have network-wide access, does not have an established insider threat program, weak account access implementation (using only an 8-character password – changing every 180 days), and no intrusion detection implementation at data servers.’