Avoid exposing technical information
Summary
Technical information (product name, version, configuration) of exposed services should not be accessible.
Description
empty
Supported In
This requirement is verified in following services
Plan | Supported |
---|---|
Machine | 🔴 |
Squad | 🟢 |
References
- CAPEC™-116. Excavation
- CAPEC™-224. Fingerprinting
- HITRUST CSF-06_d. Data protection and privacy of covered information
- ISO/IEC 27002-8_8. Management of technical vulnerabilities
- ISA/IEC 62443-DC-4_1. Information confidentiality
- NIST 800-115-7_4_1. Data collection
- ISO/IEC 27001-8_8. Management of technical vulnerabilities
Vulnerabilities
free trial
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.