Understanding vulnerability risk - a best practice guide
Vulcan Cyber, a Tenable Company
Manage and reduce attack surface risk, through a single platform.
Written by:? Nino Klimiashvili Customer Success Manager at? Vulcan Cyber, a Tenable Company
In times like these, budgeting is one of the toughest aspects of any organization's operation. One of the first expenses that get trimmed is the security budget.
This unfortunate reality is leaving many companies vulnerable to malicious actors who seek to exploit these newfound vulnerabilities.
Vulcan Cyber industry-leading customer success team has decided to work with our dedicated customers, creating a best practice guide based on their experience of success, enabling other customers to replicate these best practices to quickly realize ROI.
Introducing customize risk scores
Vulcan Cyber recognizes the need for some organizations to determine a unique risk score that is dynamic, personalized, and customizable, incorporating different contextual risk attributes to produce a dynamic score for each vulnerability in the system and for vulnerabilities in aggregate.
Our success is determined by the ability to identify several critical (prioritized) vulnerabilities that can actually be addressed in a reasonable timeframe and meet the organization's SLAs. This number, of course, depends on various factors within the company,?yet at Vulcan Cyber, we instruct our customers to obtain a level of critical vulnerabilities between 1-2% out of total vulnerabilities.
We support the customization of risk scoring through:
Best practice 1 – Use different KPIs from the scanners
** This practice is true for Qualys QVS, CrowdStrike?Exprt.AI, BitSight Rating score, and many more. You can decide to solely use a different risk parameter than CVSS, or combine it with Vulcan Cyber risk calculation logic.
Best practice 2 – Use the Vulcan Cyber threat intelligent sources
领英推荐
Example:
Vulnerabilities with CVE:
Critical where -
High where -?Threats = RCE AND Remote AND Exploitable
Medium where -?Threats = Exploitable
Low where -?All other vulnerabilities
Vulnerabilities without CVE:
"CVSS": 0.6,
"Threats": 0.0,
"Tags": 0.4
Security Posture Rating (SPR), is the main KPI driving the vulnerability management (VM) program through the Vulcan platform. The SPR value (in %) is the percentage of scanned assets complying with a?defined threshold?for maximum risk. All the assets having risk below this threshold are risk complaint assets, so the goal is to have the SPR as high as possible.
Want to learn more?
Our team put together this guide of 5 different best practice methods for you to explore. Read all about it here >>
Cyber and Risk Program Leadership
1 年Liam Sklar, I would be interested reading a case study or white paper on how Vulcan Enterprise was implemented in a multi-cloud, multi-country, global company. Is it scalable? Is it native NIST?
Who else wants to be our Northern Star?