← Back to Learn Centre

What is security misconfiguration?

Security misconfiguration happens when systems, applications, cloud services, or devices are set up in a way that creates avoidable risk.

Simple example

An admin dashboard is left exposed to the internet with default settings or unnecessary features enabled.

Why it matters

Misconfigurations are common because systems are complex and defaults are not always secure.

Common warning signs

  • The activity is unexpected or unusual for the business context.
  • The request or system behaviour creates pressure to act quickly.
  • Normal approval, verification, or security processes are bypassed.
  • There are signs of unauthorised access, data exposure, or system change.
  • Staff are unsure whether the request, message, or system behaviour is legitimate.

Cyber Doc view

This term should be understood in business context, not only as a technical issue. Good protection usually combines clear processes, appropriate technical controls, staff awareness, and a calm response plan.

What to do

Proactive steps

  • Use secure baseline configurations.
  • Disable unused services and features.
  • Change default credentials.
  • Review cloud and web server settings.
  • Perform regular configuration reviews.

Reactive steps

  • Restrict the exposed service or setting quickly.
  • Review logs to see whether it was accessed.
  • Correct the configuration and document the change.
  • Rotate secrets if they may have been exposed.
  • Add monitoring to detect recurrence.

Related terms

  • Secure configuration
  • Attack surface
  • Cloud security