PR.PS-01.239
Does your organization have a documented process for reviewing default configuration settings for security implications when installing or upgrading software?
Explanation
Default configurations in software often prioritize usability over security, potentially leaving systems vulnerable to attacks. This review process should identify and modify insecure default settings such as default credentials, unnecessary open ports, excessive permissions, or enabled but unneeded features that expand the attack surface. Evidence could include a formal configuration review checklist or procedure document, screenshots of configuration management tools, or documentation showing before/after configuration settings with security-focused changes highlighted during recent software deployments.
Implementation Example
Review all default configuration settings that may potentially impact cybersecurity when installing or upgrading software
ID: PR.PS-01.239
Context
- Function
- PR: PROTECT
- Category
- PR.PS: Platform Security
- Sub-Category
- Configuration management practices are established and applied

