What is Vulnerability Management?
Naveen Wijesinghe
Cybersecurity & AI Enthusiast | Python Developer | Ethical Hacking & Penetration Testing | Blog Writer | BIT (Hons) in NMC Graduate | Redlogicx
Vulnerability Management is the process of identifying security flaws and vulnerabilities in software and reporting those vulnerabilities so they can be fixed, with the goal of reducing the risk and impact of cyber-attacks. This is a very important aspect of network and computer security because it reduces the attack surface, a term used to describe the number of potential security vulnerabilities that malicious actors could exploit to cause harm to an organization. The process includes the following steps:
Identify – use vulnerability scanners, manual techniques and asset discovery methods to identify and document systems (e.g. servers, desktops, laptops, mobile devices, IoT devices) and any security issues they have and score them based on different factors (see CVSS score).
Reporting - Report these issues to the appropriate stakeholders (e.g. system owners) so that they can be addressed and ultimately resolved.
Fix - Have the system owner or technology owner fix the security issue so that the security hole no longer exists. Vulnerabilities can be remediated using different methods, such as security patches, reconfiguration, or mitigation controls.
Reassessment - Scanning or manual review to ensure that security issues have been successfully remediated.
This is a cyclical process, so assets should be scanned regularly, especially after significant changes. Identifying and fixing vulnerabilities quickly means malicious actors have less time to discover and exploit them.
Why is it useful?
Vulnerabilities are constantly being announced, most of which affect heavily used software. An average of 50 new vulnerabilities were detected per day in 2017. Examples include security vulnerabilities in Google Chrome, the Windows operating system, and other common programs such as Adobe Flash Player and Adobe Shockwave Player.
Being able to stay on top of these issues, and make sure the product is patched as quickly as possible (often after testing to make sure the patch doesn't have unwanted effects), means hackers have less time to try and exploit it.
By securing Internet-facing systems, it's harder for attackers to break in, and by securing internal systems, it's harder for attackers to move around and do what they want, such as privilege escalation or information gathering.
Related roles
The following roles typically include work on vulnerability management, such as vulnerability scanning, exploit knowledge, and system hardening:
Threat Intelligence Analyst
Receive and report intelligence on newly released vulnerabilities or vulnerabilities actively exploited in the wild, as well as threat actors. Intelligence analysts often have access to commercial tools that allow them to observe development activity around the world, as well as underground discussions about vulnerabilities, helping vulnerability analysts prioritize issues that need to be fixed first.
Vulnerability Analyst
Identify, report, and help remediate vulnerable assets to harden assets and reduce the risk of cyberattacks. Daily tasks include vulnerability scanning, analyzing results, performing manual checks, reporting security vulnerabilities, keeping up with the latest public news about vulnerabilities, and receiving threat intelligence reports from intelligence analysts.
Incident responder
Knowledge about vulnerabilities, and how to deal with compromises that result from successful exploitation, is key to understanding how to respond in the most effective manner.
Penetration Tester/Red Team
Knowing how to identify and scan for vulnerabilities and security breaches is key to this role, which allows you to exploit systems for security purposes and gain access, reporting these vulnerability analysts can work with stakeholders to remediate systems.
Soft skills
Communication - this is very important. You will be communicating with many people in this role, including your own team, the wider security team, stakeholders from basically every department, management, and even other organizations. You should have a high level of written and oral communication skills and be able to communicate technical information to non-technical people in a way they can understand.
Analytical - You should be analytical, which means you are good at solving problems and gathering and analyzing information. An example of this is when you receive output from a vulnerability scanner, you should be able to interpret the results and understand what the report is telling you so you can prioritize remediation.
Teamwork - this is a very obvious question, but as mentioned above, you will likely be working with a lot of people and you need to be able to work together effectively, in some situations where the pressure is high and the pace is fast.
领英推荐
Time Management - If you are going to be responsible for conducting vulnerability scans, you need to be very skilled at time management. Not only do you need to find the best time to scan (taking into account factors such as run time, the sensitivity of systems being scanned, and stakeholders who can respond if problems arise), but you also need to make sure that everyone understands what is going on in the wild Vulnerabilities being exploited, coordinating remediation activities (to an extent), and other tasks that take time to plan effectively.
Security-Related Knowledge
If you haven’t already worked in a security position, there are some things you can do to really boost your knowledge, and skills, and look better in a hiring manager’s eyes. For this specific role, the best experiences I can recommend are:
CVEs and CVSS Scores
Common Vulnerabilities and Exposures
CVE, which stands for Common Vulnerabilities and Exposures, is a way to standardize names for publicly-known vulnerabilities. I like to think of CVEs working like domain names. Everyone knows www.Google.com, but most people don’t know the website's IP. We use www.Google.com because it’s convenient, easy to remember, and easy to use. The same goes for CVEs. we know that CVE-2019-0708 is assigned to the Remote Desktop Protocol (RDP) zero-day remote code execution vulnerability named ‘BlueKeep’. It makes life easier when talking about vulnerabilities, or sharing information between different vulnerability databases, tools, and services. The term CVE, which is copyrighted by MITRE (to ensure it remains free and usable by the security community), is stated that “CVE Entries are comprised of an identification number, a description, and at least one public reference.”
https://CVEDetails.com is a security vulnerability database that has lots of information and can allow us to search for specific CVEs, or even look at vulnerabilities sorted by release date.
https://nvd.nist.gov is the National Vulnerability Database, created by the National Institute of Standards and Technology. NIST states “The NVD is the U.S. government repository of standards-based vulnerability management data”. This is a website I used every day at work because it provides valuable information about vulnerabilities.
CVSS:3.0 = This score is generated using CVSS 3.0 (as opposed to version 2.0)
AV:N = Attack Vector: Network (Exploitation can occur over a network, such as the Internet)
AC:L = Attack Complexity: Low (This attack is easy to conduct, and requires little technical sophistication)
PR:N = Privileges Required: None (The attacker does not need an account with any specific permissions for successful exploitation)
UI:R = User Interaction: None (Exploitation does not rely on a legitimate user doing something, such as clicking something or opening a malicious file)
S:U = Scope: Unchanged (The scope for this vulnerability has not been changed)
C:H = Confidentiality Impact: High (Confidentiality is broken, meaning the attack will gain access to files or information that should be restricted)
I:H = Integrity Impact: High (Integrity is broken, meaning the attack is able to modify files or information)
A:H = Availability Impact: High (Availability is broken, meaning the attack can restrict legitimate access to a system)
Reference :-
https://tryhackme.com/