Filtering Exploitable Ports and Minimizing Risk from the Internet and from Your Customers

Barry Greene @ bgreene@senki.or Version 1.3 TLP: CLEAR  What are you doing to prepare for the next “scanning malware” and “Internet Worm?” Recommendation: Operators (CSPs, ISPs, Cloud Companies, and Hosting Companies) are strongly encouraged to deploy Port Filtering on the known Exploitable ports and Source Address Validation (SAV) on their customer edge of the network

Filtering Exploitable Ports & Minimizing Customer Risk

  Barry Greene @ bgreene@senki.org Version 1.0 TLP:WHITE Updates for this Best Common Practice (BCP) are maintained on this page: Filtering Exploitable Ports and Minimizing Risk from the Internet and from Your Customers Recommendation: Operators (CSPs, ISPs, Cloud Companies, and Hosting Companies) are strongly encouraged to deploy Port Filtering on the known Exploitable ports and Read More