Code IB 2019: Vulnerability Management Masterclass
Alexander Leonov
Vulnerability & Compliance Management, Security Automation, Metrics
On March 29, I held one hour master class “HOW to avoid excessive formalism in Vulnerability Management process” at Code IB Profi 2019. Everything went quite well and I’ve got 88% positive ratings. Not bad result ^_^.
The main feature of the conference was a very special audience. The only way to visit this event was to buy a real ticket (there were no promotional codes, invites, free tickets from sponsors, etc.). So, the people who came were really interested in the content. Target audience: CISO, their deputies, leading experts from all industries. The whole event was up to 200 people, it lasted for 2 days with 4 threads of masterclasses.
This year organizers decided that titles of all masterclasses should start with “How to” (to keep them practical) and there should be checklists for each masterclass as a handout. I am going to translate my checklist Into English and publish it in this blog soon.
In fact, there were 2 masterclasses on Vulnerability Management at the conference! The second was held by Lev Paley. However, our content did not intersect: I spoke mostly about technical stuff (and I criticized VM vendors as usual), and he spoke mainly about the organizational part and high-level processes.
Vulnerability Management Masterclass
My main message was that Asset Management is the cornerstone for all Infrastructure Security and especially for Vulnerability Management.
- If you know about all the hosts in your infrastructure at any time (at least the hostname, IP address, OS, project, owner, scopes), then you can make further assessment even with some home grown script. And what is the most important, you can measure your progress.
- If you do not have this visibility, then even the most expansive vulnerability scanner won’t help you – there will be blind spots, that attackers can easily use.
By tradition, I criticized Vulnerability Management vendors and their product:
- detection methods (see “No left boundary for Vulnerability Detection“);
- detection plugin structure (see “What’s wrong with patch-based Vulnerability Management checks?“);
- lack of effective differentiation between exploitable and unexploitable vulnerabilities (see “Guinea Pig and Vulnerability Management products“);
- potential danger of active vulnerability scanning (see “Can a Vulnerability Scan break servers and services?“);
- lack of effective vulnerability remediation tools (see “Vulnerability Management vendors and Vulnerability Remediation problems“)
Basically, we have the following sad facts:
- active scanning is dangerous;
- detected vulnerabilities are mostly “theoretically exploitable” ;
- continuous patching requires lots of resources mainly from IT (see “Why *they* don’t patch vulnerabilities“).
This leads to very unpleasant situation when Vulnerability Management becomes a formal procedure, needed only for policy compliance. That’s why the IT teams try to avoid it by all means (especially the final Remediation part). And there are plenty ways how IT can effectively sabotage the VM process. So, do not provoke them!
What can be opposed to this? I don’t have a silver bullet or solution that would be suitable for every organization, but I my opinion current Vulnerability Management solutions are not good enough for big companies with complex infrastructure. Basically, for all organizations, that need a separate Vulnerability Management team. For such organizations it’s much better to make custom and vendor-neutral processes:
- Flexible Asset Management;
- Automation for Vulnerability Scanning (several Vulnerability Assessment products);
- Vulnerability Prioritization;
- Remediation Task Management;
- Vulnerability Management Metrics.
Read more: https://avleonov.com/2019/05/01/code-ib-2019-vulnerability-management-masterclass/
Every post from you is a quite a learning experience even though I thought I know quite a bit about VM to begin with. As usual great stuff!