Vulnerability Assessment Best Practices
Vulnerability Assessment Best Practices
Vulnerability Assessment Best Practices
Vulnerabilities
Where do they come from?
Flaws in software Faulty configuration Weak passwords Human error
Inappropriately assigned permission levels System inappropriately placed in infrastructure/environment
Best Practices
Establish chain of command/authority Create official purpose and procedures Decide on schedule
Best Practices
Think in terms of risk Document everything! Know your environment Be prepared
CERT Methodology
1) Setup 2) Test Execution 3) Vulnerability Analysis
4) Reporting
5) Remediation Repeat!
8
Step 1: Setup
Begin documentation Secure permission Update tools
Configure tools
10
11
12
CERIAS Cassandra service - https://cassandra.cerias.purdue.edu Verify with a trusted source or multiple sources if possible
14
15
Error prevention
Use several different tools for verification Examine the traffic generate by tools Consult with the system owner/administrator
16
Step 4: Reporting
Goals
Present a meaningful summary of the vulnerabilities found Prioritize and explain vulnerabilities Provide possible remediation suggestions
17
Step 4: Reporting
Anatomy of a report
Header Summary List of vulnerabilities - For each vulnerability, at a minimum provide:
Unique tracking number Risk level
High - Immediate action Medium - Action required Low - Action recommended
Brief description
18
Step 4: Reporting
Metrics
Tracking progress of key metrics over time allows progress to be quantified Also a good idea to tie metrics to cost savings Examples:
Number of vulnerabilities found by criticality Average number of vulnerabilities found Number of vulnerabilities remediated Time from vulnerability discovery to remediation Time per assessment Total assessments done
19
Step 4: Reporting
Best Practices
Standardization
Prioritize by risk
Track progress
20
Step 5: Remediation
Vulnerability remediation is the process of fixing vulnerabilities Pick the issues you want to fix because you may not have enough resources to fix them all Remediation choices
For every vulnerability there are three choices for remediation:
Fix - eliminate vulnerability altogether Accept - the cost of fixing outweighs the risk Mitigate - don't outright fix but use additional layers of security to lessen the risk presented by the vulnerability
21
Step 5: Remediation
Types of remediation
Manual
Pros - less likely to cause system problems Cons - does not scale well, time consuming
Automatic remediation
Pros - scales very well Cons - may cause system problems, may not actually remediate, potential for breaking something is greater
22
Step 5: Remediation
Remediation Planning
Plan for remediating all vulnerabilities found in the system
23
Step 5: Remediation
Test remediation on a dev instance before implementing on a production system
Verification
Cooperation required for successful remediation Dont forget change management
24
Questions?
25