Four Data Categories in Bitsight's Security Ratings Platform
1. Compromised systems
Compromised Systems are devices within an organization's network that are infected with malware. Each separate instance of malware communications, even if it is from the same machine, constitutes a single observation.
We identify and classify compromised systems into the following risk types:
Botnet Infections
A unified network of machines that are performing coordinated actions based on instructions received from the malware’s creators.
Spam Propagation
Machines compromised with malware that causes them to send large volumes of unwanted email.
Malware Servers
A machine hosting a website that injects malicious code into a visitor’s browser, often resulting in the installation of new malware on that visitor’s computer.
Potentially Exploited
A machine running a potentially unwanted application which leaves the system vulnerable to adware, spyware, and remote access tools.
Unsolicited Communications
Any host that is observed trying to contact a service on another host that is not expected or supported.
2. Diligence
Diligence records demonstrate the steps a company has taken to prevent attacks. We identify and classify diligence risk vectors as follows:
Open Ports
Ports that are exposed to the public internet, which are evaluated to determine whether or not unnecessary access points exist.
TLS/SSL Certificates
Records verifying the authenticity of your company servers to your associates, clients, and guests, and which serve as the basis for establishing cryptographic trust.
TLS/SSL Configuration
Records indicating that servers have properly configured security protocol libraries and support strong encryption standards when making encrypted connections to other machines.
Web Application Headers
HTTP header configurations that inform how to receive and respond to web requests in a manner that prevents malicious behavior such as man-in-the-middle and cross-site scripting attacks.
Sender Policy Framework (SPF)
A DNS (Domain Name System) record identifying which mail servers are permitted to send email on behalf of a domain, preventing spammers from sending emails with forged “From:” addresses.
DomainKeys Identified Mail (DKIM)
A protocol designed to prevent unauthorized servers from sending email on behalf of a company’s domain.
Patching Cadence
The speed at which a company resolves publicly disclosed vulnerabilities, which are bugs in software or device firmware that can be used to gain unauthorized access to systems and data.
Server Software
Versions of commonly installed IT infrastructure software, which can indicate security vulnerabilities and obsolescence.
Desktop and Mobile Software
Versions of commonly installed desktop and mobile operating systems and browsers, which can indicate security vulnerabilities and obsolescence.
Insecure Systems
Devices that may be communicating with domains registered by malware distributors or hacking teams, which could allow attackers to inject malicious code back into these systems and access or extract sensitive data.
DNSSEC Records*
A protocol that uses public key encryption to authenticate DNS servers.
Mobile Application Security*
Versions of mobile applications in Android and iOS app stores with known security risks that can compromise end-users' devices and networks.
Domain Squatting*
Web Domains that appear to be a legitimate domain of an organization, but are under the control of external actors and can be used to carry out spear phishing attacks.
* risk vector does not currently impact rating calculations
3. User Behavior
User Behavior examines activities that may introduce malicious software onto a corporate network, for example, by downloading a compromised file. We identify and classify user behavior into the following risk types:
File Sharing
Media and software shared using peer-to-peer exchange protocols, which can be infected with malware.
Exposed Credentials*
Indicates whether employees of a company have had their personal or corporate information revealed as a result of a publicly-disclosed data breach.
* risk vector does not currently impact rating calculations
4. Public Disclosures
Bitsight collects information about publicly disclosed breaches and interruptions to business continuity from a variety of news sources and data breach aggregation services. A breach is attributed to a company when there is significant, publicly-disclosed evidence that the company was at fault for the data loss, such as a company-issued disclosure notice or investigation from a credit card company.