6

Click here to load reader

Closing the Loop on Vulnerability Management - Core Security

Embed Size (px)

DESCRIPTION

Vulnerabilities • Vulnerabilities represent potential damage • Difficult to use in convincing arguments • Provide the opportunity to accept risk without pain Penetration Testing • The ability to exploit a vulnerability removes ambiguity • Successful exploits demonstrate tangible consequences to the business • Almost all penetration tests expose unauthorized access to data The Key to Successful Risk Management • The ability to demonstrate tangible consequences of risk acceptance • Effective penetration testing makes accepting risk uncomfortable • The combination of identified vulnerabilities and demonstrated exploitation provide a persuasive argument against risk acceptance Phased Approach • Resistance to penetration testing can be overcome over time • Start in the lab • Move to non essential systems • Build trust to test critical production systems Penetration Testing Should Not be Optional • Vulnerability assessment without penetration testing only reveals part of the problem • Don’t force yourself to make a convincing argument for security without one of the most persuasive tools Learn more at http://www.coresecurity.com/solutions/consolidating-prioritizing-vulnerabilities

Citation preview

Page 1: Closing the Loop on Vulnerability Management - Core Security

P A G E © 2 0 1 4 C o r e S e c u r i t y

Closing the Loop on Vulnerability Management

Page 2: Closing the Loop on Vulnerability Management - Core Security

P A G E © 2 0 1 4 C o r e S e c u r i t y

Vulnerabilities

• Vulnerabilities represent potential damage • Difficult to use in convincing arguments • Provide the opportunity to accept risk without pain

Page 3: Closing the Loop on Vulnerability Management - Core Security

P A G E © 2 0 1 4 C o r e S e c u r i t y

Penetration Testing

• The ability to exploit a vulnerability removes ambiguity • Successful exploits demonstrate tangible consequences to the

business • Almost all penetration tests expose unauthorized access to

data

Page 4: Closing the Loop on Vulnerability Management - Core Security

P A G E © 2 0 1 4 C o r e S e c u r i t y

The Key to Successful Risk Management

• The ability to demonstrate tangible consequences of risk acceptance

• Effective penetration testing makes accepting risk uncomfortable

• The combination of identified vulnerabilities and demonstrated exploitation provide a persuasive argument against risk acceptance

Page 5: Closing the Loop on Vulnerability Management - Core Security

P A G E © 2 0 1 4 C o r e S e c u r i t y

Phased Approach

• Resistance to penetration testing can be overcome over time • Start in the lab • Move to non essential systems • Build trust to test critical production systems

Page 6: Closing the Loop on Vulnerability Management - Core Security

P A G E © 2 0 1 4 C o r e S e c u r i t y

Penetration Testing Should Not be Optional

• Vulnerability assessment without penetration testing only reveals part of the problem

• Don’t force yourself to make a convincing argument for security without one of the most persuasive tools