The Hacker News¤Ï¤³¤Î¤Û¤É¡¢¡ÖNew XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs¡×¤Ë¤ª¤¤¤Æ¡¢¥¤¥¹¥é¥¨¥ë¤Î¥µ¥¤¥Ð¡¼¥»¥­¥å¥ê¥Æ¥£´ë¶È¡ÖXM Cyber¡×¤¬¸ø³«¤·¤¿¥»¥­¥å¥ê¥Æ¥£¥ì¥Ý¡¼¥È¡ÖeBook | Research Report: 2024 State of Exposure Management¡×¤Ë¤Ä¤¤¤Æ²òÀ⤷¤¿¡£

New XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs

¡û4,000Ëü·ï°Ê¾å¤ÎÀȼåÀ­¤È¿ôËü·ï¤Î¹¶·â·ÐÏ©¤òʬÀÏ

¤³¤Î¥»¥­¥å¥ê¥Æ¥£¥ì¥Ý¡¼¥È¤Ï´ë¶È¤Ë¤ª¤±¤ë4,000Ëü·ï°Ê¾å¤ÎÀȼåÀ­(exposures)¤È¿ôËü·ï¤Î¹¶·â·ÐÏ©¤Ë¤Ä¤¤¤ÆʬÀϤ·¤¿¤â¤Î¡£¤½¤Î¥Ý¥¤¥ó¥È¤È¤·¤Æ¡¢°Ê²¼¤¬¾Ò²ð¤µ¤ì¤Æ¤¤¤ë¡£

¡ûɬ¤º¤·¤âÀȼå¤È¤Ï¸Â¤é¤Ê¤¤

ÂçȾ¤ÎÁÈ¿¥(Ìó86%)¤Ë¤ª¤¤¤Æ¡¢¥ê¥â¡¼¥È¥³¡¼¥É¼Â¹Ô(RCE: Remote Code Execution)¤ÎÀȼåÀ­¤Ï¤¹¤Ù¤Æ¤ÎÀȼåÀ­¤Î1%¤ËËþ¤¿¤º¡¢½ÅÍפÊÀȼåÀ­¤Î11%¤·¤«Àê¤á¤Æ¤¤¤Ê¤¤¡£ÂФ·¤Æ»ñ³Ê¾ðÊó¤Î¹½À®¥ß¥¹¤ÏÀȼåÀ­¤Î80%¤òÀê¤á¤Æ¤ª¤ê¡¢¤³¤ì¤éÀȼåÀ­¤Î3ʬ¤Î1¤Ïµ¡Ì©¾ðÊó¤ò¥ê¥¹¥¯¤Ë¤µ¤é¤·¤Æ¤¤¤ë¡£

¤Ä¤Þ¤ê¡¢¥»¥­¥å¥ê¥Æ¥£Âкö¤ÏÀȼåÀ­¾ðÊó¥Ç¡¼¥¿¥Ù¡¼¥¹(CVE: Common Vulnerabilities and Exposures)¤ËÅÐÏ¿¤µ¤ì¤ë¤è¤¦¤ÊÀȼåÀ­¤Î½¤Àµ¤À¤±¤Ç¤ÏÉÔ½½Ê¬¤Ç¤¢¤ê¡¢Àȼå¤Ê»ñ³Ê¾ðÊó¤Ê¤É¤òÂкö¤¹¤ëɬÍפ¬¤¢¤ë¡£

¡û¥Á¥ç¡¼¥¯¥Ý¥¤¥ó¥È¤òõ¤¹

½¾Íè¤Î¥»¥­¥å¥ê¥Æ¥£Âкö¤Ï¤¹¤Ù¤Æ¤ÎÀȼåÀ­¤ò½¤Àµ¤¹¤ë¤â¤Î¤Ç¤¢¤Ã¤¿¤¬¡¢ÀȼåÀ­¤Î74%¤Ï¹¶·â¼Ô¤Î¹ÔÆ°¤òÀ©¸Â¤¹¤ë¤¿¤á½ÅÍפǤϤʤ¤¡£»Ä¤ê¤Î26%¤Î¥»¥­¥å¥ê¥Æ¥£Âкö¤¬½ÅÍפǤ¢¤ê¡¢µ¡Ì©¾ðÊó¤Ë¤Ä¤Ê¤¬¤ë¥Á¥ç¡¼¥¯¥Ý¥¤¥ó¥È(ÀïάŪ¤Ë½ÅÍפʷÐÏ©)¤ÎÆÃÄ꤬½ÅÍס£Ä´ºº¤Ç¤Ï¥Á¥ç¡¼¥¯¥Ý¥¤¥ó¥È¤Î20%¤¬µ¡Ì©¾ðÊó¤Î10%°Ê¾å¤Ë¤Ä¤Ê¤¬¤Ã¤Æ¤¤¤¿¡£

ÀȼåÀ­(exposures)¤Èµ¡Ì©¾ðÊó¤Ë¤Ä¤Ê¤¬¤ë¥Á¥ç¡¼¥¯¥Ý¥¤¥ó¥È¤ÎʬÉÛ¿Þ ¡¡°úÍÑ¡§XM Cyber

¡û½ÅÍפʻñ»º¤Ë¾ÇÅÀ¤òÅö¤Æ¤ë

½ÅÍפʤΤϵ¡Ì©¾ðÊó¤Ë¤Ä¤Ê¤¬¤ëÀȼåÀ­¤Ç¤¢¤ê¡¢¥¯¥é¥¦¥É´Ä¶­¤Ïµ¡Ì©¾ðÊó¤ò´í¸±¤Ë¤µ¤é¤·¤Æ¤¤¤ë¡£Active Directory¤ÏÁÈ¿¥¤Î¥¢¥«¥¦¥ó¥È´ÉÍý¤Î´ðÁäÀ¤¬¡¢Ï³±Ì»ö°Æ¤Î80%¤ÏActive Directory¤Î¹½À®¥ß¥¹¤Þ¤¿¤Ï¼åÅÀ¤Ëµ¯°ø¤·¤Æ¤¤¤ë¡£

¡û¶È³¦¤´¤È¤Î°Û¤Ê¤ë·¹¸þ

¶È³¦¤´¤È¤Ë¥»¥­¥å¥ê¥Æ¥£¥ê¥¹¥¯¤Ï°Û¤Ê¤ë¡£¥¨¥ó¥Æ¥£¥Æ¥£(ÀøºßŪ¤Ê¹¶·â¥Ý¥¤¥ó¥È)¤Î¿¤¤¶È³¦¤Û¤ÉÀȼåÀ­¤â¿¤¯¤Ê¤ë·¹¸þ¤¬¤¢¤ê¡¢°åÎŤϥ¨¥Í¥ë¥®¡¼¤ª¤è¤Ó¸ø¶¦»ö¶È¤ËÈæ¤Ù5ÇܤÎÀȼåÀ­¤¬Â¸ºß¤¹¤ë¡£¤·¤«¤·¤Ê¤¬¤é¡¢½ÅÍפʤΤϵ¡Ì©¾ðÊó¤Ë¤Ä¤Ê¤¬¤ëÀȼåÀ­¤Î³ä¹ç¡£±¿Í¢¤ä¥¨¥Í¥ë¥®¡¼¶È³¦¤ÎÀȼåÀ­¤Ï¾¯¤Ê¤¤¤¬¡¢µ¡Ì©¾ðÊó¤Ë¤Ä¤Ê¤¬¤ëÀȼåÀ­¤Î³ä¹ç¤Ï¹â¤¤¡£

¶È³¦¤´¤È¤Î¥»¥­¥å¥ê¥Æ¥£¥ê¥¹¥¯¡¡°úÍÑ¡§XM Cyber

¡û·ëÏÀ

ËÜÅö¤ËɬÍפʥ»¥­¥å¥ê¥Æ¥£Âкö¤ÏÀȼåÀ­¾ðÊó¥Ç¡¼¥¿¥Ù¡¼¥¹(CVE)¤ËÊнŤ·¤¿Âкö¤Ç¤Ï¤Ê¤¯¡¢±Æ¶Á¤ÎÂ礭¤¤ÀȼåÀ­(exposures)¤Ø¤ÎÂкö¡£µ¡Ì©¾ðÊó¤Ë¤Ä¤Ê¤¬¤ë¥Á¥ç¡¼¥¯¥Ý¥¤¥ó¥È¤òÆÃÄꤷ¡¢½¤Éü¤¹¤ë¤³¤È¤¬½ÅÍפȤʤ롣The Hacker News¤Ï½¾Íè¤Î¥»¥­¥å¥ê¥Æ¥£Âкö¤«¤éæµÑ¤·¡¢¸½¼ÂÀ¤³¦¤Î¹¶·â¥Ù¥¯¥È¥ë¤Ë¾ÇÅÀ¤òÅö¤Æ¤¿Âкö¤Ë°Ü¹Ô¤¹¤ë»þ´ü¤¬Í褿¤È¤·¡¢¥ì¥Ý¡¼¥È¤ò±ÜÍ÷¤·¤Æ¿·¤·¤¤°ìÊâ¤òƧ¤ß½Ð¤¹¤³¤È¤ò¿ä¾©¤·¤Æ¤¤¤ë¡£