02 Security
02 Security
Remediation at Scale
Eric Anderson
Chief Architect DSO
Cyber Security – Two different worlds
“We just can’t keep up with the “We didn’t realize this was an
volume of vulnerabilities found” issue … until now.”
Vulnerabilities
Common by Year
Vulnerabilities and Exposures
Average number of days to
16000
14000
(CVEs) by Year
84 patch vulnerabilities
12000 14,712
10000
8000
Median days to first exploit
6000
4000
5,297
7,946
6,480 6,447 30 of a known vulnerability
3,392
2000
2013 2014 2015 2016 2017 2018
0
(MAR)
2001 CVEdetails.com
Source: 2004 2010 2014 2017
Of exploited vulnerabilities
Nearly 15K CVEs in 2017 and on 99% will be known by Security and
pace to surpass that in 2018 IT for over 1 year - Gartner
Security vs Ops
“Problem” Security - Find vulnerabilities
- Prevent Intrusion
Qualys
Rapid 7
Tenable
Patch
Configure
50,000 vs 5,000
What/Who/When/How?
CURRENT STATE: VULNERABILITY MANAGEMENT
PROCESS IT Typical Vulnerability Mgmt. Process Highlights
Security Operations
Weekly / Scanners do weekly or monthly scans but might not pick up all resources, leading to
Monthly Vuln.
scanners blind spots.
Scan results
Ops receives, May contain thousands of lines of data with no more context than IP address and
analyzes and vulnerability. Manual analysis can take weeks.
sent Ops
plans work
Change
ticket Manual tickets can take 30 minutes to open, including all documentation required.
SecOps Gap
opened
CAB
approval due CAB approvals can involve tens of people spending hours discussing and approving
to risk
Remediation Matching remediation tasks to vulnerabilities can be onerous. WannaCry had over
analysis and
planning
40 patch variants based on OS. Companies can have hundreds of maintenance
windows.
Remediation May include configuration changes or patches. Application owners might delay or
Execution control execution.
Rescan for Change By the time the remediation cycle is complete, new scan data might be arriving that
verification ticket closed include remediations already in process.
Multi-Tier Remediation
Vulnerability Management
Automated Remediation
Automated Discovery The ability to automatically remediate
The ability to automatically discover vulnerable devices or cloud services across
infrastructure, applications and dependencies Servers and Network and multi-cloud
within an ecosystem without needing agents
Real-Time Visualization
The ability for security and operations REQUIRED
CAPABILITIES
teams to visually assess the ecosystem
for vulnerabilities and non-compliance
Configuration Compliance
Continuous Policy Based Compliance
Vulnerability Lifecycle Management The ability to continuously assess and
The ability to track the status of identified report upon network or server
vulnerabilities through the remediation to compliance automatically through use of
ensure compliance with governance processes defined standards and policies
Automation At Scale
Public Cloud Private Cloud
Change
Mgmt
TS Server
Multi Tiered – Synergies Automation TS Orch
Change
Mgmt
Schedule
TS Vuln Mgmt
SecOps – Align Security and Ops Patch
Remedy
Vulnerabilities
Enrichment
– PCI/DISA/CIS/SOX/HIPPA
– Open Standard – SCAP1.2
– Vulnerability management
Patching
– Scan & Patch Deployment
Analytics and Dashboard
© Copyright 2014 BMC Software, Inc. Internal Use Only 11
TrueSight Network Automation
Vulnerability Remediation: Combine with TrueSight Vulnerability Out of In Band
Management for an unprecedented visibility and remediation Band Change
planning. Out-of-box content for Cisco® security advisories. Change
Router VPN
Compliance: Use the compliance engine to apply standards for
regulatory and security rules such as SOX, PCI-DSS, HIPAA, NIST,
DISA, and CIS.
Wireless
Administration: Fine-grained RBAC, engineering and executive
reporting, heterogeneous management,
Current 2019
TS Vulnerability Management Patch Orchestration Self Service Patching
Fix SecOps Gap • Orchestrate Patches • Service based Risk
Increased visibility • Dev/QA/Prod lifecycle Scoring
Operational Intelligence • Automate for • Self-Service Remediation
Automate for velocity complexity • Lifecycle aware
CLOUD
GOVERNANCE
AND SECURITY
IAM
IAM
Lambda Lambda Lambda
IAM
RDS
Elastic Search
Your Policies
IAM
Glacier S3
AWS Quality
Your Policies
AWS Development
VMWare
VMWare Hyper-V