Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Newest First  |  Oldest First  |  Threaded View
ElizaPt
50%
50%
ElizaPt,
User Rank: Apprentice
10/2/2018 | 1:00:48 PM
Thanks!
Your way of telling the whole thing in this post is genuinely fastidious, all be capable of simply understand it, Thanks a lot.
Sportialize
100%
0%
Sportialize,
User Rank: Apprentice
9/26/2018 | 5:53:11 PM
Re: proof reading is for losers right?
Hehe, nice find !
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
9/20/2018 | 4:00:28 PM
There really are 5 steps!
Yep. copy & paste error left out Step 4! Details in the commentary. But here's a brief recap:

Step 1: Set your target goals

Step 2: Create a detailed profile

Step 3: Assess your current position

Step 4: Gap analysis action plans

Step 5: Implement action plan

 

 

 

 
Marilyn Cohodas
100%
0%
Marilyn Cohodas,
User Rank: Strategist
9/20/2018 | 12:40:02 PM
Re: proof reading is for losers right?
Good catch! All fixed. Thanks for being such a great proofreader. --the editors
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
9/20/2018 | 12:39:12 PM
Re: proof reading is for losers right?
Good catch! It's four steps. Editor error! :-)

Fortunately we have very astute readers. Thanks!
errwhat
50%
50%
errwhat,
User Rank: Apprentice
9/20/2018 | 11:52:17 AM
proof reading is for losers right?
Step 1, Step 2, Step 2 again, Step 4 and no step 5?

 

I think you might need to proof read this again ^^


NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8567
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
CVE-2020-8568
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...
CVE-2020-8569
PUBLISHED: 2021-01-21
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, ...
CVE-2020-8570
PUBLISHED: 2021-01-21
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executi...
CVE-2020-8554
PUBLISHED: 2021-01-21
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typicall...