1.3 Given a scenario, perform vulnerability management activities
Vulnerability identification:
Asset criticality: impact if CIA was breached; sensitivity of data & business criticality
Active vs passive scanning: interact with targets VS use stored data to find info/identify targets
Mapping/enumeration: host/asset/network/infrastructure/systems discovery/mapping
Validation:
True positive: scanner correctly identifies existing vulnerability
False positive: reported vulnerability that doesn't exist (verify patch/versions, or attempt actual attack)
True negative: scanner correctly doesn't alert on non-existent vulnerability
False negative: scanner alerts on non-existent vulnerability
Remediation/mitigation:
Configuration baseline: perform anomaly analysis; provides info on OS/apps
Patching: maintain current security patch levels on OS/apps (with e.g. SCCM)
Hardening: disable unnecessary ports/services, centralised control, secure config etc.
Compensating controls: when system can't be upgraded/patched; isolate and place compensating controls in front
Risk acceptance: don't take any action against risk (low risk; ALE < mitigation cost)
Verification of mitigation: audits (formal), assessments (informal), patch levels, repeated vulnerability scanning
Scanning parameters and criteria:
Risks associated with scanning activities: scans consume bandwidth and resources, and risk business process interruptions (tune intensity & scan times)
Vulnerability feed: SCAP (e.g. CCE [config], CPE [product names], CVE [vulnerabilities], CVSS [severity], XCCDF [checklist results], OVAL [testing procedures used by checklists])
Scope: extent of scan (included systems/networks; host discovery methods; what tests will be conducted against active hosts)
Credentialed vs non-credentialed: can confirm an issue by accessing OS/database/app info VS chance of false positives/negatives
Server-based vs agent-based: central server remotely scans hosts VS agent installed on targets perform internal scans and report back to the server
Internal vs external: gives different perspectives; insider threat vs external attacker
Special considerations:
Types of data: health, financial, PII etc.; data classification
Technical constraints: capabilities of the scanning system => frequency limitations
Workflow: remediation workflow (detection -> remediation -> testing);
Sensitivity levels: minimum severity rating (low, medium, high, critical)
Regulatory requirements: PCI DSS (internal & external; at least quarterly by qualified professional or ASV); FISMA (updated scanning tools, update vulnerability list before /after scan, some authenticated scans, determine discoverable info and correct them)
Segmentation: compliance networks can be segmented to reduce scan scope
IPS, IDS, and firewall settings: internal = insider threat; external = external attack
Inhibitors to remediation:
MOU: non-legally binding; customer must participate in including scanning in MOU
SLA: customer expectations of security, performance & uptime
Organisational governance: may block config changes needed for scanning; limited resources and support
Business process interruption: taking down systems can cause significant interruption
Degrading functionality: service degradation can lead to business process interruption
Legacy systems: EoL unsupported systems don't get security updates
Proprietary systems: different vendors; some vendors will not have patches/updates
Last updated