Blog

Beyond the Checklist: Why Attackers Love Your Misconfigurations- And How to Stop Them

Posted by: Batya Steinherz
May 29, 2025
Getting your Trinity Audio player ready...

Some of the worst breaches in recent years didn’t come from sophisticated malware or cutting-edge exploits. They came from something much simpler – somebody, somewhere, left a setting wide open. A misconfigured S3 storage bucket with public read permissions; An ephemeral test environment with production credentials exposed to the internet; A permissive firewall rule with overly broad CIDR notation allowing ingress from unauthorized networks. These types of security misconfigurations propagate silently throughout environments, creating exploitable attack vectors for threat actors.

They’re also everywhere. Research estimates that misconfigurations drive 10 to 15 percent of all security incidents. And they don’t just affect one part of your environment – they show up across multi-cloud architectures, on-premises systems, IAM configurations, RESTful APIs, containerized microservices, and beyond. A small oversight in one place can lead to a much bigger problem somewhere else in the technology stack. The reason? Attackers know how to find misconfigurations and use them to establish persistent attack paths. The question is: can your team spot these attack vectors and remediate critical choke points before an adversary exploits them?

What Misconfigurations Are and Why They Matter

Misconfigurations happen when something isn’t set up quite right from a security or operational perspective. An S3 bucket with authenticated-read ACL but missing bucket policy restrictions, allowing any authenticated AWS user to access sensitive data through pre-signed URLs. An API that lacks proper rate limiting and input validation. An identity with excessive entitlements that violate the principle of least privilege. Sometimes it’s as simple as default credentials that remain unchanged in production environments.

They’re easy to introduce – and hard to catch. A rushed deployment during a CI/CD pipeline execution. A copied IAM policy with inherited permissions. A reused infrastructure-as-code template with embedded secrets. These vulnerabilities propagate rapidly, and in complex ephemeral environments, they’re rarely evident until a threat actor exploits the attack chain.

Other common examples include:

  • Weak or missing access controls
  • Disabled security settings
  • Unencrypted data in transit or at rest
  • Overly broad identity or role permissions
  • Poorly secured APIs

On their own, any one of these might not seem urgent. But attackers don’t think in isolated terms. They think in paths. That misconfigured test service you forgot about? If it links to production through a reused credential or over-permissioned role, it suddenly matters a lot more.

The problem usually isn’t negligence – it’s complexity. Different teams manage different parts of the stack. One handles cloud, another handles identities, a third oversees network. It’s easy for something to fall through the cracks. What matters is understanding how those cracks connect – and how quickly someone could exploit them.

Mapping Misconfigurations to MITRE ATT&CK Techniques

If you want to understand how this plays out in actuality, mapping misconfigurations to MITRE ATT&CK techniques is a good place to start. The MITRE ATT&CK framework provides a perfect lens to view these risks, showing exactly how attackers leverage common misconfigurations to execute sophisticated attacks. 

Here let’s have a look at some of them:

(Fig 1: Table of MITRE ATT&CK Techniques mapped to misconfigurations)

 

What Traditional Tools Miss

Most security tools can spot individual misconfigurations. They’ll flag an open port or a public bucket. But they tend to look at those issues in isolation. What they often miss is how one small misstep can fit into a much larger attack path.

That’s where a lot of teams hit a wall. They see the alert – they know something’s misconfigured – but they’re not sure if it’s actually dangerous. So they either scramble to fix everything or end up tuning out most of the noise.

The real danger is hard to spot – whether that wrong setting opens a door to something that matters. An exposed bucket is worth fixing. But an exposed bucket full of customer data, accessible through a compromised developer account? That’s the kind of thing that warrants immediate attention.

This is why many teams are moving toward a more connected view – using continuous exposure management to understand how misconfigurations link together. They start asking better questions: Does this setting allow someone to move deeper into the environment? Could it touch a critical system? Would it help an attacker cause actual harm?

Real-World Scenarios

Misconfigurations don’t usually blow things up on their own. They just sit there – quiet and easy to overlook – until an attacker chains one to another and everything comes apart. Here’s how that looks in the real world:

  • The Developer Who Had Access to Everything

A developer still had an obsolete RBAC assignment in Azure that granted excessive permissions beyond their functional requirements. No one cleaned it up because, well, nothing broke. But embedded within that role was permission to execute arbitrary SQL queries against an internal database. An adversary could execute a successful spear-phishing campaign against the developer, compromise their credentials, and begin lateral movement through the environment. No zero-day exploits, no security alerts – just leveraging legitimate access to traverse the network. The compromise went on for days because all activities appeared as authorized – because technically, everything was “working as intended.”

  • The Test Container That Became a Backdoor

Someone deployed a container in a development environment to test something quickly. It executed with privileged mode enabled. No biggie – it’s just a non-production environment, right?  Except that the firewall rule allowed traffic from production. And the service account it was using? Way too permissive. If an attacker were to find an old vulnerability in the container image, that could let them in, and from there, it’s a straight shot to production. That container wasn’t meant to be part of critical infrastructure, but no one circled back to lock it down.

  • The SaaS Setup That Never Got Finished

A new collaboration tool got rolled out fast – because the team needed it yesterday. MFA was optional, and shared links didn’t require login. Someone got phished, clicked a fake file share, and just like that, internal docs were exposed to the world. No one realized until those files started popping up in search results. The setup wasn’t wrong, exactly – it just wasn’t hardened. And no one had gone back to check.

Why Prevention Alone Falls Short

Setting things up securely from the start is important – no question there. And existing tools provide solid prevention basics: automated configuration checks, smart access controls, proper error handling. All good stuff.

But even the best setup won’t catch everything. New systems get spun up. Policies drift. Developers tweak things to get features working. Admins make changes under pressure. At some point, something slips through.

That’s where validation comes in. It’s not just about asking, “Is this setting correct?”. It’s about asking, “Could someone use this to get in, move around, or cause damage?”. If you’re only relying on static rules or one-time scans, you’re probably missing the bigger picture.

A more effective way (and the XM Cyber way, of course) is to not just list misconfigurations – but rather map them into full attack paths across your environment. That way, you can see how seemingly small issues connect, and fix the ones that actually put you at risk. 

(Fig 2: Attack graphs show how issues interconnect)

The Bottom Line: Moving From Lists to Insight

Security teams do not need another list of issues. They need clarity. They need to understand what’s dangerous, what’s background noise, and what to fix first.

That’s where a context-driven approach to addressing misconfigurations pays off. It allows teams to see how misconfigurations fit into attack paths, which means they can focus on the actual issues. They waste less time chasing false positives. They improve collaboration across IT, cloud, and security teams. Most importantly, they reduce real risk.

Misconfigurations happen. They are easy to make and hard to eliminate completely. But they don’t have to result in compromise. By understanding how they fit into the larger threat picture, teams can take back control – and keep adversaries from getting their hands on your critical assets.

 


Batya Steinherz

Batya is the Director of Content Marketing at XM Cyber. She loves words, cybersecurity, spinning, and chocolate (though the last two may cancel each other out). She has over a decade of weaving words into storylines for cybersecurity companies and an extensive collection of kids, cats and running shoes. Connect with her on Linkedin!

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.