1 / 24

Vulnerability Management

Vulnerability Management. Let’s Get It Right This Time!. Shon Harris CEO Logical Security. Evolving in our approaches to information security. We are currently here. Steps of vulnerability management lifecycle. What to do first is usually the hardest question for companies to answer….

emmett
Download Presentation

Vulnerability Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Vulnerability Management Let’s Get It Right This Time! Shon Harris CEO Logical Security

  2. Evolving in our approaches to information security We are currently here

  3. Steps of vulnerability management lifecycle What to do first is usually the hardest question for companies to answer…

  4. Step 1: Define roles and responsibilities • All of the best practices, checklists and procedures do not add up to a pile of beans if individuals are not tasked with the necessary responsibilities • Roles, responsibility and enforcement go a lot farther than any new expensive gadget promising you everlasting security bliss

  5. Step 2: Inventory • It is important to know what needs to be protected and then drill down into how to protect it. • Identify the roles of the different assets to your organization. • This will help you understand the business impact if one or more of these assets are negatively affected. • The following outlines the necessary steps of asset management; • Identify all assets, configurations, versions, software, and patches • Update and maintain this information on all assets through their life cycles – from procurement to disposal • Identify an individual who is responsible for asset management

  6. Step 3: Develop metrics • Metrics for tracking and reporting • Number and type of incidents per month • Cost of recovery from incidents in man hours • Time it takes to resolve experienced incidents • Classifications that you could use can be mapped to maximum tolerable downtime (MTD) calculations; • Non-essential = MTD 30 days • Normal = MTD 7 days • Important = MTD 72 hours • Urgent = MTD 24 hours • Critical = MTD Minutes to hours

  7. Step 4: Assess and baseline • Carry out initial vulnerability assessments to recognize your current level of vulnerability and threat level. • Types of assessments you choose to carry out depends upon your scope of vulnerabilities you are going to address. • Once you establish the metrics your company will use, then you need to determine the range of deviations your company can accept

  8. Step 5: Develop a CSIRT • Many companies try to prevent bad things from taking place but do not properly plan for what to do when bad things take place. • The team should be made up of technical staff, management, legal and human resources. • http://www.csrc.nist.gov/publications/nistpubs/800-3/800-3.pdf.

  9. Step 6: Control vulnerability information flow • Do not be overwhelmed with an excessive amount of alerts that do not affect you. • META Security Group • TruSecure IntelliShield Early Warning System (EWS) • SecureNet Solutions • Computer Associate’s eTrust Managed Vulnerability Service • There are many more out there…

  10. Step 7: Develop threat classifications • Classify vulnerabilities based on their level of threat and degree of success • Classify asset according to their level of vulnerability, role in company and value • Decision on remediation activities are based on a combination of technical and business data

  11. Step 8: Standardized procedures • Develop standardized procedures and checklists to follow when a new vulnerability is identified. • This formalized approach reduces wasted time and operational costs.

  12. Vulnerability action steps

  13. Vulnerability action steps

  14. Vulnerability action steps

  15. Vulnerability action stepsoverview We will dig a littler deeper into a few of these steps…

  16. Vulnerability identification • Goal: • Identify weaknesses before they can be exploited • Process: • Continually scan for new vulnerabilities • Continually scan for rogue technology devices • Keep up-to-date on vulnerability alerts • Carry out compliance testing • Carry out operational availability analysis • Technologies: • Scanners • Vulnerability assessment tools • Penetration testing tools • New vulnerability alert subscription

  17. Threat analysis • Goal: • Identify threat agents that can exploit identified vulnerabilities • Measure the efficiency of current controls and countermeasures • Minimize down time due threat activity and other negative ramifications • Process: • Classify new vulnerabilities based on probability of success of exploitation and potential damage • Classify vulnerable asset by role in company and business impact of disruption • Align threats with business impact and develop proper mediation steps • Use results of incidents to improve preventative measures • Technologies: • Vulnerability management automated tools • Intrusion detection systems • Event correlation • Content scanning • Antivirus

  18. Remediation • Goal: • Reduce business down time and business impact • Contain and mitigate damages • Respond effectively and efficiently to incident • Process: • Role out temporary fix • Test and implement permanent fix • Carry out proper configuration management • Report activities to affected business units and personnel • Document change to environment • Technologies: • Patch management • Configuration and software deployment tools • Vulnerability management automated tools

  19. Step 9: Improve preventative controls • When an intrusion is endured the security staff should treat this as an opportunity to reinforce necessary security barriers. • Too many times companies just “plug the hole” without investigating the layers of controls that had to be penetrated for this threat to be successful.

  20. Step 10: Continual monitoring • Vulnerability management is a process, not a product or a project

  21. Common vulnerabilities that are overlooked • Remote access servers • Is this traffic monitored via firewalls and IDS? • Out-going ports (egress filtering) • Are your employees carrying out hacking activities or are any of your systems infected with zombie software? • Hanging modems and rogue access points • Have new ones popped up on your environment you are unaware of? • Personnel security knowledge assessment • The most commonly overlooked item that can cause the most damage. • Data validation and buffer overflows in software • Have you properly tested for these types of attacks? • Proper configuration of security devices • IDS, firewalls, access controls misconfigurations count for most of the serious vulnerabilities in many of the environments today.

  22. More vulnerabilities • Authorization creep • Employees and contractors gaining more and more access rights without their access needs being validated. • Internal fraud • Authorized users are the most difficult to audit and monitor because they have been granted privileged access. • Confidential data • Are your employees sending this type of information out through e-mail or saving it to disks to take out of the environment? • PBX fraud • Are you monitoring long distance use to ensure that phreakers are not selling access to your telephone service? • Wireless • Checking for rouge access points, possibility of sniffing, and man-in-the-middle attacks.

  23. A process - not a product or a project • Do not throw money and resources at the issue • Develop a strategic and on-going process that is integrated into every day activities • A large corporation of over 200,000 employees created an 80-person staff dedicated just to vulnerability management. • They could not keep up and be successful because of lack of organization, vision, strategy, and process integration • Not from a lack of money

  24. How do we do that again? • Process: • Capture baseline of security posture • Develop desired baseline of security posture • Acceptable risk level • Inventory and classify assets based on value to company • Develop a Computer Security Incident Response Team (CSIRT) • Control vulnerability information flow • Develop standardized procedures and checklists to follow when a new vulnerability is identified • Integrate activities with asset management, event and patch management processes • Review and improve upon preventative countermeasures currently in place • Continually to monitor environment’s security baseline

More Related