EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA



Similar documents
Manage Vulnerabilities (VULN) Capability Data Sheet

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

CDM Vulnerability Management (VUL) Capability

Federal Desktop Core Configuration (FDCC)

BMC Client Management - SCAP Implementation Statement. Version 12.0

Tenable for CyberArk

Assuria Auditor The Configuration Assurance, Vulnerability Assessment, Change Detection and Policy Compliance Reporting Solution for Enterprise

Vulnerability Management

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Pragmatic Metrics for Building Security Dashboards

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Software Vulnerability Assessment

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Information Security Office

How To Use A Policy Auditor (Macafee) To Check For Security Issues

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SAST, DAST and Vulnerability Assessments, = 4

SECURITY PATCH MANAGEMENT INSTALLATION POLICY AND PROCEDURES

White Paper. Understanding NIST FISMA Requirements

Using Nessus In Web Application Vulnerability Assessments

Vulnerability Scan Results in XML

Report Book: Retina Network Security Scanner Unlimited

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference

Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services

Is Penetration Testing recommended for Industrial Control Systems?

Why The Security You Bought Yesterday, Won t Save You Today

User s Guide. Skybox Risk Control Revision: 11

A Network Administrator s Guide to Web App Security

An Approach to Vulnerability Management, Configuration Management, and Technical Policy Compliance

Nessus and Mobile Device Scanning. November 7, 2014 (Revision 12)

How to Grow and Transform your Security Program into the Cloud

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Vulnerability Management Nirvana: A Study in Predicting Exploitability

Access FedVTE online at: fedvte.usalearning.gov

Payment Card Industry (PCI) Data Security Standard

Patch and Vulnerability Management Program

IBM Security QRadar Version Vulnerability Assessment Configuration Guide IBM

IBM Security QRadar Vulnerability Manager Version User Guide

Feeling Vulnerable? Jamie S. Herman, C CISO, CISM, CISSP Balazs Bucsay, OSCE, OSCP, GIAC, GPEN

How To Monitor Your Entire It Environment

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

AHS Flaw Remediation Standard

McAfee Vulnerability Manager 7.0.2

Nessus Perimeter Service User Guide (HTML5 Interface) March 18, 2014 (Revision 9)

Security compliance automation with Red Hat Satellite

Review: McAfee Vulnerability Manager

WHITEPAPER. Nessus Exploit Integration

6. Exercise: Writing Security Advisories

Nessus Enterprise Cloud User Guide. October 2, 2014 (Revision 9)

Streamlining Application Vulnerability Management: Communication Between Development and Security Teams

White Paper. Managing Risk to Sensitive Data with SecureSphere

Medical Device Security Health Group Digital Output

Introduction to QualysGuard IT Risk SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA Enterprise Security

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

White Paper. Automating Your Code Review: Moving to a SaaS Model for Application Security

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

Vulnerability Scans Remote Support 15.1

CDM Hardware Asset Management (HWAM) Capability

Using the Tenable Solution to Audit and Protect Firewalls, Routers, and Other Network Devices May 14, 2013 (Revision 1)

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Web Application Vulnerability Testing with Nessus

Vulnerability Scanning Requirements and Process Clarification Comment Disposition and FAQ 11/27/2014

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

WebGoat for testing your Application Security tools

Running head: USING NESSUS AND NMAP TOOLS 1

Penetration Testing Report Client: Business Solutions June 15 th 2015

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Defending Against Data Beaches: Internal Controls for Cybersecurity

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

cve-search - a free software to collect, search and analyse common vulnerabilities and exposures in software

State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard

Cybersecurity and internal audit. August 15, 2014

Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, Juan Ortega. Juan Ortega, juaorteg@uat.edu. 1 Juan Ortega, juaorteg@uat.

NetIQ FISMA Compliance & Risk Management Solutions

April 11, (Revision 2)

Adobe Systems Incorporated

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Security and Control Issues within Relational Databases

IT Risk Management: Guide to Software Risk Assessments and Audits

Top 10 Baseline Cybersecurity Controls Banks Aren't Doing

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Policy Compliance. Getting Started Guide. January 22, 2016

NETWORK PENETRATION TESTING

Cybersecurity: What CFO s Need to Know

Enterprise Software Management Systems by Using Security Metrics

Vulnerability Management in Software: Before Patch Tuesday KYMBERLEE PRICE BUGCROWD

Transcription:

EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA Paul R. Lazarr, CISSP, CISA, CIPP, CRISK Sr. Managing Consultant, IBM Cybersecurity and Biometrics January 21, 2016

PERSONAL BACKGROUND Senior Managing Consultant at IBM Global Business Services ISACA Certifications: CISA, CISM Other Certifications: CISSP Vulnerability Management Practitioner: 2001-Present Federal Information System Security Officer (ISSO/AISSO): 2011-Present PCI Compliance and Privacy Lead Risk Management Lead Disaster Recovery, Business Continuity and Crisis Mgmt. Practitioner

AGENDA 1. Scanning Where & How It Fits Into a Vulnerability Management Program 2. Review Key Definitions 3. Vulnerability Severity/Risk Assessment - Into to CVSS 4. What Nessus 5. Nessus Scan Output 6. Understanding Nessus Output 7. Before You Start Considerations 8. Refining & Assessing the Output 9. Additional Checks 10. Presenting your results

WHY IS VULNERABILITY MANAGEMENT IMPORTANT COST OF A BREACH Numerous Cost Models exist. However, Verizon s data is based on statistics collected from a more holistic sample: Source: Verizon 2015 Data Breach Investigations Report (p. 30)

FOUNDATIONS OF A HOLISTIC VULNERABILITY MANAGEMENT PROGRAM 1. Monitor and Track Threat and Vulnerability Feeds/Sources 2. Access New Threats and Vulnerabilities for Relevance 3. Develop a Repeatable/Sustainable Patch Management Process 4. On-Going Monitoring of Vulnerabilities, Misconfigurations & Defects 5. Review Scan Output, Access Findings and Follow-up with Stakeholders 6. Track Remediation Progress 7. Pay Attention to Lingering Vulnerabilities/Risks

HOLISTIC SCANNING: 1. Hardware and Software Vulnerability Scans (e.g. Nessus, NexPose) Patch Management / Open vulnerabilities (e.g. weak SSL) Software and Firmware Currency Communications and Protocol Weaknesses 2. Configuration (Hardening) Compliance Scans Measures Hardening Compliance (e.g. DISA STIGS, CIS Benchmark, Agency Guidance) Policy Enforcement (e.g. Active Directory Group Policy) 3. Application Code Scanning Static Code Scans (SAST) IBM AppScan, HP Fortify, Trustwave Dynamic Code Scanning (DAST) Interactive Code Scanning (RAST) Mobile Code Scanning combination of SAST & DAST

KEY DEFINITIONS: Vulnerability: A flaw or weakness in hardware or software design, implementation that may result in the loss of Confidentiality, Integrety or Availability (CIA) Threat: The potential for a specific vulnerability to be exercised either intentionally or accidentally Control: measures taken to prevent, detect, minimize, or eliminate risk to protect the Integrity, Confidentiality, and Availability of information. Vulnerability Management: The process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.

KEY DEFINITIONS - CONTINUED: NVD: National Vulnerability Database CPE: Common Platform Enumeration CVE: Common Vulnerabilities and Exposures (i.e. CVE-2016-002) CVSS: Common Vulnerbability Scoring System

ACCESSING VULNERABILITY SEVERITY INTRO TO THE COMMON VULNERABILITY SCORING SYSTEM (CVSS) Defined: The Common Vulnerability Scoring System (CVSS) is an open framework for communicating the characteristics and severity of software vulnerabilities. Consists of three metric groups: Base, Temporal, and Environmental. The Base group represents the intrinsic qualities of a vulnerability, The Temporal group reflects the characteristics of a vulnerability that change over time, The Environmental group represents the characteristics of a vulnerability that are unique to a user's environment. The Base metrics produce a score ranging from 0 to 10, which can then be modified by scoring the Temporal and Environmental metrics. Created & Managed by: FIRST.ORG -The Forum of Incident Response and Security Teams

CVSS BENEFITS: 1. Standardized Approach to Scoring Vulnerability. Allows an organization to use a common algorithm for scoring vulnerabilities across all IT platforms. Allows for an organization wide Remediation Policy and standardized remediation times 2. Open Framework Vendor independent 3. Supports Risk Prioritization

CVSS HISTORY Launched in 2005 (CVSS 1.0) Updated in February 2007 (CVSS 2.0) and June 2015 (CVSS 3.0): Source: First.Org CVSS v3.0 Specification (v1.7), Pg. 5

CVSS 3.0 MAJOR CHANGES CVSS v3.0 creates the ability to score vulnerabilities that exist in one software component (vulnerable component) but which impact a separate software, hardware, or networking component (impacted component). This is captured by the new metric called, Scope Source: First.Org CVSS v3.0 Users Guide (v1.4), Pg. 5

TENABLE NESSUS / SECURITY CENTER Two flavors: Stand Alone Scanner or Bundled with Security Center Scan Output Results File Types 1. CSV or Excel File 2. XML (.nessus) File (ideal for scripting) 3. PDF Report (least useful/actionable) 4. Online via Security Center Dashboard (access restricted) Scan Output - Content 1. Vulnerabilities (plugins < 1000000) 2. Configuration Checks (Plugins >= 100000) Plugin A unique test (query) to determine if a vulnerability or a misconfiguration exists Security Center Version 4 - Focus of this presentation

NESSUS OUTPUT KEY FIELDS Risk: Severity, CVSS Base & Temporal Score, STIG Rating, Exploit? What: Plugin #, Plugin Name, Plugin Text, etc Where: IP, DNS Name, NetBIOS Name, etc When: First & Last Observed, Vuln Publication Date, Patch Publication Date, Plugin Publication Date, and Plugin Modification Date Exploitability: Exploit?, Exploit Ease, Exploit Frameworks

CONSIDERATIONS BEFORE YOU START 1. Assets Know thy Inventory Hardware (Type, Make, Model, Names, function) Software (O/S, COTS Packages installed, Misc Other, e.g. Java, etc) Environment & Network (PROD vs Non-Prod) 2. Scan Specifics When: Scan Run Date Scan Type: (Vulnerability, Configuration, Both, Other e.g. NMAP,) Authentication: (Credentialed versus Non-Credentialed) LETS REVIEW SAMPLE OUTPUT..

REFINING THE DATA. Check the Output and Refine as Appropriate Limit / Refine Output to Only Include Rows with Plugin ID # s Limit Output to Include Only Current Results (i.e. Last Observed Date) Remove Word Wrapping Initial High-Level Analysis Exploring the Power of the PIVOT Table or Power Shell Summary View Explore Various PIVOTS: i.e. By: Assets Only, Severity/Vulnerability, etc Access the Plausability of the Data Does it look/smell right Looking Beyond the Plugin Name It May Not Tell the Whole Story The Power of the Plugin Text Review examples Consolidates key data in to one cell (Security Center v4 ONLY) Enhance Readability via excel or copy/paste in to word or email Plugin Output shows what was found and where (actionable at a granular Level)

ADDITIONAL CHECKS Scan Completeness All applicable assets scanned; All Applicable Assets Scanned Scans Completed Successfully? Use Plugin ID to Determine Authentication Success Windows: / Unix: Apache & Java Embedded in many Products There may be multiple versions on the same host Nessus typically reports only fixed version not current version Vet the Data Ask SME s/admins to Validate Results = Nessus is Not Always Correct Protect and Enhance your Credibility Through Research and Vetting

PRESENTING YOUR RESULTS: Present the Data in a Format Relevant to Your Audience (Rollup & Exec Summary) Make the Data as Actionable as Possible Include Positive News Where possible (e.g. xx% are New) AVOID SUPRISES Where possible Expect Pushback and Angst It s human Focus on Highest Risks (exploitable) First / Everything Can t Fixed at once Pay Attention to Older / Languishing Vulnerabilities. Understand why they are. Offer to Work with SME s / Admins / Engineers to Understand the Data Focus on Sustainable and Repeatable Process to Ensure Timely Remediation (target dates)

RESOURCES AND LINKS: 2015 Verizon Data Breach Investigations Report (DBIR) http://www.verizonenterprise.com/dbir/2015/ First.Org Common Vulnerability Scoring System (CVSS v3.0) https://www.first.org/cvss https://www.first.org/cvss/cvss-v30-specification-v1.7.pdf https://www.first.org/cvss/cvss-v30-user_guide_v1.4.pdf https://www.first.org/cvss/cvss-v30-examples_v1.1.pdf https://www.first.org/cvss/calculator/3.0 Tenable (Nessus) Plugin Info: http://www.tenable.com/plugins/ Microsoft Patch Tuesday Bulletins https://technet.microsoft.com/en-us/library/security/dn631938.aspx

EXAMPLE RESEARCHING A MICROSOFT PATCH NVD publishes both CVSS 2.0 and 3.0 scores now. The example below traces a Microsoft Patch Tuesday Vulnerability thru to the NVD Site along with a trace through the Nessus Site to determine Plugin ID and Text. Example: Microsoft Patch: MS16-001 - https://technet.microsoft.com/en-us/library/security/ms16-jan.aspx Has two (2) CVE's associated with it in the above link. If you click on CVE-2016-002, it takes you to the Mitre CVE site: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0002 Clicking on the "learn more at NVD" link you get to NISTs NVD Detail site: https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0002 You will see CVSSv3 score of the left side of the page along with the older CVSSv2 score of the right Nessus shows one plugin ID for this vulnerability (#87887). You can figure this out by selecting "View All Plugins" from the main Tenable plugin page: https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-0002 From there select, "Microsoft Bulletins" http://www.tenable.com/plugins/index.php?view=all&family=windows+%3a+microsoft+bulletins From this page, select MS16-001 and you get: http://www.tenable.com/plugins/index.php?view=single&id=87877 Scrolling down Currently Nessus only lists the CVSSv2 score

WRAP UP/QUESTIONS QUESTIONS?

CONTACT INFORMATION Paul R. Lazarr, CISSP, CISA, CIPP, CRISC Managing Consultant, Cybersecurity and Biometrics IBM Global Business Services - US Federal Team Mobile: 703-628-0024 prlazarr@us.ibm.com Lazerp13@gmail.com