Best Practices for Threat & Vulnerability Management. Don t let vulnerabilities monopolize your organization.

Similar documents
Best Practices for Vulnerability Management

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

How To Test For Security On A Network Without Being Hacked

Attack Intelligence: Why It Matters

Vulnerability management lifecycle: defining vulnerability management

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Optimizing Network Vulnerability

Breaking down silos of protection: An integrated approach to managing application security

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

Minimizing Risk Through Vulnerability Management. Presentation for Rochester Security Summit 2015 Security Governance Track October 7, 2015

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

SecurityMetrics Vision whitepaper

Risk Analytics for Cyber Security

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

NERC CIP VERSION 5 COMPLIANCE

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Seven Things To Consider When Evaluating Privileged Account Security Solutions

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

CDM Vulnerability Management (VUL) Capability

Total Protection for Compliance: Unified IT Policy Auditing

8 Key Requirements of an IT Governance, Risk and Compliance Solution

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Risk-based solutions for managing application security

How To Choose the Right Vendor Information you need to select the IT Security Testing vendor that is right for you.

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Application Security in the Software Development Lifecycle

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Payment Card Industry Data Security Standard

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

Leveraging a Maturity Model to Achieve Proactive Compliance

Extreme Networks Security Analytics G2 Vulnerability Manager

Data Classification Technical Assessment

Patch and Vulnerability Management Program

WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

How To Manage Security On A Networked Computer System

CORE Security and GLBA

Privilege Gone Wild: The State of Privileged Account Management in 2015

How To Manage A Network Security Risk

BIG SHIFT TO CLOUD-BASED SECURITY

Network Security and Vulnerability Assessment Solutions

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

PCI DSS Overview and Solutions. Anwar McEntee

2011 Forrester Research, Inc. Reproduction Prohibited

FIVE PRACTICAL STEPS

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Privilege Gone Wild: The State of Privileged Account Management in 2015

The Path Ahead for Security Leaders

Cyber Security RFP Template

THE EVOLUTION OF SIEM

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Cyber R &D Research Roundtable

SANS Top 20 Critical Controls for Effective Cyber Defense

Avoiding the Top 5 Vulnerability Management Mistakes

Information Security Organizations trends are becoming increasingly reliant upon information technology in

Cloud Infrastructure Security Management

PENETRATION TESTING GUIDE. 1

IBM Security QRadar Vulnerability Manager

THE TOP 4 CONTROLS.

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Continuous Network Monitoring

SECURITY FIRST: AN ESSENTIAL GUIDE TO PENETRATION TESTING

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

A Practical Approach to Threat Modeling

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

2015 Enterprise Vulnerability Management Trends Report

The Emergence of Security Business Intelligence: Risk

IPLocks Vulnerability Assessment: A Database Assessment Solution

The Value of Vulnerability Management*

The SIEM Evaluator s Guide

Scanless Vulnerability Assessment. A Next-Generation Approach to Vulnerability Management

Vulnerability Management Isn t Simple (or, How to Make Your VM Program Great)

Convergence of Desktop Security and Management: System Center 2012 Endpoint Protection and System Center 2012 Configuration Manager

Cyber Security Metrics Dashboards & Analytics

IBM Internet Security Systems October FISMA Compliance A Holistic Approach to FISMA and Information Security

IBM SECURITY QRADAR INCIDENT FORENSICS

Transcription:

Best Practices for Threat & Vulnerability Management Don t let vulnerabilities monopolize your organization.

Table of Contents 1. Are You in the Lead? 2. A Winning Vulnerability Management Program 3. Vulnerability Management s Seven Primary Objectives 4. Next Steps

Part 1 Are You in the Lead? Are your critical assets really that secure? While the need to manage and analyze risk has existed for some time, a new era of cyber crime may be causing you to question your current vulnerability management practices. Are traditional vulnerability management solutions enough?

To find out, start with the basics. Avoid making the same wrong moves that allow attackers to win. Vulnerability exposure, elimination, and control require vulnerability management. A vulnerability can be defined as a defect/bug that allows an external entity to directly or indirectly influence the availability, reliability, confidentiality or integrity of a system/application/data. New vulnerabilities appear daily because of software flaws, faulty configuration of applications, and human error. When discovered, these can be exploited, resulting in erratic program behavior, illicit network entry, privacy violations, and interrupted business operations.

Why risk it? Remember: Risk knows no boundaries. How much risk is acceptable to your organization? It doesn t matter if you re a small business, a mammoth corporation, or a government entity every organization with an Internet connection is at risk. New vulnerabilities are discovered each day and the speed at which these new threats are created make securing your critical assets even trickier. The solution is to quickly immunize your infrastructure from these threats by eliminating their foundation: vulnerabilities.

44% of breaches are due to known vulnerabilities that are two to four years old. HP Cyber Risk Report

Part 2 A Winning Vulnerability Management Program Here are few best-practices to keep in mind when maturing your own vulnerability management program.

Winning vulnerability management programs have evolved to include additional solutions and workflow, beyond scanning, adding to a larger picture required to truly understand how an adversary could and will attack. Scanning isn t your get out of jail free card. Stop! Too much data. Remember: Too much vulnerability data is a problem when building any sort of risk assessment. In many organizations there are no effective processes in place to consolidate and prioritize results. Most organizations use traditional scanning to uncover vulnerabilities, but this approach is often a flop too much data is a problem. IT security teams are drowning in data, producing the infamous 300-page report with a mind-numbing table of vulnerabilities and no business context, risk prioritization, or actionable quick fixes. Once the data is prioritized, automating the analysis of the vulnerabilities will allow remediation efforts to focus on critical risks and not waste time and resources chasing low-risk assets.

Don t let vulnerabilities win. How do you determine which are critical and which aren t? Create a short list of action items that can be completed quickly to reduce and eliminate the risk of exploitation. A Holistic Defense: Most attacks today incorporate multiple steps, crossing different vectors (Network, Web, Mobile, Wireless, Endpoint). An isolated view of any of these steps could appear harmless causing a potential drastic oversight. There are two approaches: 1.Asset Categorization and Prioritization: An approach that helps determine whether the vulnerability is threatening an important system and what will happen if it is exploited. 2.Attack Path Analysis: An approach that demonstrates how attackers can chain vulnerabilities across vectors to move through your environment. An effective vulnerability management program is nearly impossible to do manually. Organizations need to simplify each element of their programs to win.

Part 3 Vulnerability Management s Seven Primary Objectives Here are the seven simplified objectives of any successful vulnerability management program.

1. Discover and categorize your assets To manage vulnerabilities, you must understand what assets you have in your network and then test to find any vulnerabilities that may exist. This is when you create and continuously maintain a database of all IP devices attached to your network. Scanning is most often done by focusing on a particular IP or range of addresses, so organizing your database by IPs makes sense. 2. Identify assets based on business risk Now that you have a big picture view of your assets, where they reside, and how they are categorized, it s time to prioritize. It is important to isolate critical assets that have a direct impact on business risk. For example, a database that contains social security numbers or credit card information.

3. Scan for vulnerabilities Scanning is the foundational process for finding and fixing network vulnerabilities. Traditional vulnerability scanners are isolated from each other, each collecting their own set of vulnerabilities, resulting in data overload. Scan results should be consolidated and normalized into a unified repository. 4. Prioritize vulnerabilities Traditional vulnerability management solutions often produce thousands of high severity vulnerabilities for the operations staff to remediate. This scan data overload leads to confusing priorities and complicates remediation efforts. Prioritization based on previously defined critical assets, exploit types, business risk, among other things can help reduce this overload.

5. Generate attack paths to high-risk assets Attack paths reflect the ability to understand not only where the critical assets are, but also what the topography around those assets looks like considering vulnerabilities, exploits, network configurations, and potential attacker patterns. This will help define exposure points that should be locked down along with any other areas of the network that could lead an adversary to your critical data. 6. Remediate / patch / monitor As these areas have been defined, they should be shared with other constituents. Strong reporting for all levels within the organization is required for risk reporting, trending, compliance efforts, remediation efforts, and overall business risk. The data discovered by scanning, consolidating, prioritizing, and modeling attack paths should be translated into tangible remediation tasks for IT Operations through service desk tools or patch management.

7. Validate Validation is extremely important and often overlooked. Since remediation responsibilities usually fall on a different team than information security, remediation validation is an important step for closing the loop. These validation efforts should output to a report, comparing new results with original results, to ensure the vulnerabilities have been addressed.

Part 3 What Next? Gather your team and plan your program Create processes to collect, analyze, and act on threat data Measure risk to critical assets Start prioritizing threats Is your organization s vulnerability management program winning? Take our quiz and find out! Learn more about how to mature your current program and visit, coresecurity.com/maturity Share this ebook!