Frequent Security Misconfigurations and How to Mitigate Them