Go to content

Cybersecurity

Log4Shell worst-case scenario

Jon Taylor

Jon Taylor


Chief Operating Officer

22.12.22


4 min read


This has been a worst-case scenario for cybersecurity professionals.

A new vulnerability in Log4j (CVE-2021–44228) impacts most companies as they rely on services that use this Java library for their day-to-day operations.

This critical and remotely exploitable vulnerability is being actively used by cybercriminals worldwide allowing them to access computer systems to introduce malware, ransomware, steal data or cause mayhem.

This vulnerability is difficult to manage as it is so widespread and may be present on servers throughout your organization.

The Nanitor Diamond solution identifies this vulnerability and provides comprehensive detail of exactly where it is found so that you can remove the vulnerable class, upgrade or otherwise mitigate this vulnerability.

Nanitor has published an open-source tool that helps find and remove it from the class-path: https://github.com/nanitor/log4fix.

Even if the vulnerability is addressed and removed from your IT infrastructure, you need to keep in mind that it may be present on servers you have not considered and may resurface later. The Nanitor Diamond solution continuously monitors your IT assets and ensures that you have an up-to-date view of your IT assets and can quickly respond to identified vulnerabilities.

icon

Good cybersecurity practices and cyber hygiene need to be practiced by all employees, however, it is the head of the company, the CEO and the board of directors that are responsible for company affairs.

How does the Nanitor Diamond help you stay secure?

  • An active and accurate inventory of your networked IT assets.
  • Manages your approved technical policy that is based on established cybersecurity frameworks and industry best practices.
  • Continually monitors your IT infrastructure for potential issues.
  • Identify deviations from your approved technical policy (security misconfigurations) and provide detailed remediation instructions for IT administrators.
  • Checks operating systems and software for missing security patches.
  • Actively check for known vulnerabilities and raise prioritized issues.

As always, you need to have a backup plan:

  • Backup your key systems and user data.
  • Plan how to recover your systems in case required (disaster recovery).
  • In case of unresolved vulnerabilities on your systems, isolate your critical servers and ensure they are kept up to date until you have addressed them.

Does the CEO have regular and concise updates about the state of cybersecurity and possible cybersecurity resource requirements?

With the Nanitor Diamond solution, management has clear visibility of the state of their cybersecurity posture, can enforce their approved technical policies to systematically act.