Assets, Threats & Vulnerabilities
Assignments: 1. Vulnerability Assessment, 2. NIST SP 800 Report.
Assignments: 1. Vulnerability Assessment, 2. NIST SP 800 Report.
Analyze a vulnerable system for a small business
I recently joined an e‑commerce organization as a cybersecurity analyst and immediately identified a critical architectural concern within the environment. The company relies on a remotely hosted database server to support a globally distributed workforce, enabling employees to retrieve customer‑related data from various locations. However, since the company’s launch three years ago, this database server has been publicly accessible on the internet—creating a significant and ongoing exposure of sensitive business information.
From a security standpoint, maintaining an internet‑facing database without proper access controls represents a severe vulnerability. Such exposure increases the likelihood of unauthorized access, data exfiltration, credential harvesting, and automated exploitation attempts from threat actors. Recognizing the gravity of this issue, I initiated a structured vulnerability and risk assessment to evaluate the threat landscape surrounding this system and quantify the potential business impact.
To complete this assessment, I performed the following activities:
Reviewed the vulnerability assessment findings to understand the server’s configuration, exposure points, and existing security gaps.
Conducted a formal risk analysis by defining the system’s purpose, identifying credible threat sources, mapping potential threat events, and calculating the associated risk levels.
Developed a targeted remediation strategy outlining a secure approach to hardening the server, restricting access, and reducing the organization’s attack surface.
This analysis was guided by the methodologies defined in NIST SP 800‑30 Rev. 1, ensuring that the evaluation followed industry‑recognized standards for risk assessment. The resulting report clearly communicates the operational risks posed by the publicly exposed server and provides actionable recommendations to secure the environment and protect the organization’s critical data assets.
Vulnerability Assessment Report
NIST SP 800-30 Rev.1 Report