Avoid exposing technical information
Summary
Technical information (product name, version, configuration) of exposed services should not be accessible.
Description
Attackers usually perform reconnaissance to gather information about the target system. Exposing detailed technical information makes it easier for attackers to identify potential vulnerabilities or outdated software versions that may have known security issues.
Supported In
This requirement is verified in following services
Plan | Supported |
---|---|
Essential | 🔴 |
Advanced | 🟢 |
References
- CAPEC™-116. Excavation
- CAPEC™-224. Fingerprinting
- HITRUST CSF-06_d. Data protection and privacy of covered information
- ISO/IEC 27002-8_8. Management of technical vulnerabilities
- ISA/IEC 62443-DC-4_1. Information confidentiality
- NIST 800-115-7_4_1. Data collection
- ISO/IEC 27001-8_8. Management of technical vulnerabilities
free trial
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan. If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.