24
Effective Vulnerability Management Vicky Ames 15 OCT 2015

Effective Vulnerability Management

Embed Size (px)

Citation preview

Page 1: Effective Vulnerability Management

Effective Vulnerability Management

Vicky Ames15 OCT 2015

Page 2: Effective Vulnerability Management

Process overview Important concepts Wrap Up

Agenda

Page 3: Effective Vulnerability Management

Process OverviewThe 5 Steps of Effective Vulnerability Management

Page 4: Effective Vulnerability Management

Prepare

Detect

EvaluateRemediate

Measure

Process

Page 5: Effective Vulnerability Management

Policy◦ Authorization to conduct activities

Procedures◦ Document what will be done and by whom

Partnership◦ Server/application teams do work◦ Business/application owner must approve

Information◦ Subscribe to vulnerability notifications

Asset Inventory◦ Can’t fix what you don’t know about

Prepare

Page 6: Effective Vulnerability Management

Secure Configurations◦ Systems come preconfigured for the convenience

of the vendor◦ Settings run counter to security◦ Implement secure settings before deployment

Host based security software Know your compliance requirements

◦ SOX◦ HIPAA◦ FDA◦ FISMA

Establish an implementation strategy

Prepare

Page 7: Effective Vulnerability Management

Scanners◦ Check systems to identify vulnerabilities◦ Some now provide exploitation capabilities

Use wisely◦ Provide reports – most important IMHO

Commercial and Free Multi-Function Web Application Database 3rd party manual assessments

Detect

Page 8: Effective Vulnerability Management

Vendors provide risk scores◦ This is guidance

Establish evaluation criteria for your environment◦ Every environment is unique◦ You and the other IT folks know it best

So ask them to help develop criteria◦ Sample Environmental Criteria

Accessible from Internet Host protections

Secure configuration AV/Malware protection Access restricted

Evaluate

Page 9: Effective Vulnerability Management

Vendors provide remediation steps◦ This is guidance

Determine the best solution for your environment◦ Every environment is unique◦ You and the other IT folks know it best

So ask them to help develop criteria◦ Sample Remediation Activities

Apply patch Turn off service Change setting Add host based protection software Remove default account or password

Remediate

Page 10: Effective Vulnerability Management

Establish maintenance windows ◦ Routine outages are more acceptable than

random ones Do rolling fix implementation

◦ Do development/test environment first◦ Test ◦ Do other non-production environment second ◦ Test◦ Do production last◦ Test

Remediate

Page 11: Effective Vulnerability Management

Establish metrics ◦ Shows what success is◦ Establishes a goal to work towards

Trust but verify ◦ Rescan with same tool(s)

Report below and above◦ Provide reports to teams doing the work

Track their progress Identify and address technical issues

◦ Provide reports to leadership Track how well the program is doing

Measure

Page 12: Effective Vulnerability Management

Important ConceptsA Deeper Dive Into a Few Things

Page 13: Effective Vulnerability Management

Must have for any security program◦ Provides authority to do work◦ Establishes the requirement for assistance from other

teams◦ Establishes the IT security requirements for the whole

company (CEO to Users) Elements of good policy

◦ Clear high level requirements (“thou shalt”)◦ Establish high level responsibilities for security◦ Establish consequences for non-compliance◦ Signed by CIO◦ Supported by Executives

Security Policy

Page 14: Effective Vulnerability Management

Establish how each element of the policy will be implemented

Outline of the activities that will be done to comply with the policy

High level – not work instructions Establish who is responsible for specific

activities

Procedures

Page 15: Effective Vulnerability Management

Security Patches are released at (mostly) regular intervals from vendors◦ Microsoft – Monthly◦ Oracle – Quarterly◦ Cisco – Whenever

Inventory should identify major vendors Create a plan Discuss with other players Get CIO approval Communicate to the business Select good tools to apply patches and to

verify patch application

Patch Management

Page 16: Effective Vulnerability Management

Nothing is infallible Commercial tools superior to free

◦ Provide comprehensive and timely updates◦ Easier to use◦ Reporting is better

All do some things better than others Variance in reporting Patch supercedence issue Occasional false positive

Scanning Tools

Page 17: Effective Vulnerability Management

Plan to have a team assess your environment◦ Penetration Testing vs. Vulnerability Assessment◦ Ensure they are not going to run a scanner and give

you that report◦ Establish rules of engagement up front

Should emulate real world attack scenarios Do not let them do a representative sample Do not let them leave out network devices and workstations Do not remove “sensitive” or “critical” systems

◦ Get permission from CIO◦ Your call on who to inform internally

Could be a good test of internal resources

3rd Party Assessments

Page 18: Effective Vulnerability Management

Wrap UpFinal thoughts

Page 19: Effective Vulnerability Management

Effective vulnerability management is complex Don’t try to do everything at once Full implementation plan

◦ Start with whatever is manageable – Phase 1 Windows OS patches Secure baselines for your Oses

◦ Build on success – Phase 2 Java or Adobe patches Secure baselines for databases

Get buy in from other teams, leadership and the business

Final Thoughts

Page 20: Effective Vulnerability Management

Vicky Ames [email protected]

Thank You

Page 21: Effective Vulnerability Management

AppendixLinks

Page 24: Effective Vulnerability Management

Free Secure Baselines◦ Center for Internet Security (CIS) https

://benchmarks.cisecurity.org/ Free Web Application Security Information

◦ OWASP https://www.owasp.org/index.php/Main_Page

Appendix