Vulnerability Management Programs - HB - Final
Vulnerability Management Programs - HB - Final
APPLICATION DEVELOPMENT
BI/APPLICATIONS
VIRTUALIZATION
NETWORKING
HEALTH IT
SECURITY
CLOUD
1
Vulnerability Management
EDITOR’S NOTE
Programs: A Handbook 2
RANK THE
VULNERABILITIES
4
prioritize vulnerabilities based on sound risk-management principles.
PEN TESTING
TECHNIQUES
1
EDITOR’S NOTE
With each new year, information security means being aware that security attacks are no
Home gets tougher—threats keep growing in both longer unidirectional but might assault your
frequency and sophistication while corporate system via multiple channels. Diana Kelley
Editor’s Note
security budgets never seem to keep pace. So offers keys to a dynamic vulnerability man-
while the why of a corporate vulnerability man- agement program, which include resource-
Rank the
Vulnerabilities
agement program is obvious; what’s less clear is maximizing tips such as how to reduce the
the how. This handbook tackles that dilemma “noise” of false positive threat alerts.
Vulnerability by providing specific techniques and tools This handbook closes with CTO Dave Shack-
Program Tips InfoSec pros can use to improve their programs. leford’s innovative take on penetration testing,
A company that mounts a vulnerability man- using the latest social engineering concepts.
Pen Testing agement program often soon finds itself with His four techniques—phishing, pretexting,
Techniques an avalanche of information on network secu- media dropping and tailgating—take pen test-
rity vulnerabilities. A crucial next step, then, ing to new levels.
is to wade in and sort out the data, to identify The threats to information security are not
what vulnerabilities get priority. To aid in that going away. But this handbook gives you the
prioritization process, security expert Mike guidance you need to meet the challenge head-
Chapple proposes a three-prong approach, in- on and seal up your enterprise’s security pe-
cluding the calculation of “risk scores.” rimeter. n
Once you’ve got your vulnerability priori-
ties straight, you’ll need a set of best practices Brenda L. Horrigan
to keep things running smoothly. Today that Security Media Group
2 V U L N E R A B I L I T Y M A N AG E M E N T P R O G R A M S : A H A N D B O O K F O R S E C U R I T Y P R O S
2
VULNERABILITIES
Soon after initiating a vulnerability environment. These may come from a variety
Home management program, enterprises often find of sources within your vulnerability manage-
themselves facing an intimidating avalanche ment program, including Web and network
Editor’s Note
of data about network security vulnerabilities. vulnerability scanners, data loss preven-
Scan results may show hundreds or even thou- tion systems and configuration management
Rank the
Vulnerabilities
sands of vulnerabilities distributed across a software.
wide variety of systems and applications.
Vulnerability How should security professionals tackle
Program Tips this mountain of risk? In this chapter, we ex- STEP 1: DETERMINE VULNERABILITY SEVERITY
amine a three-prong prioritization program The first data element you need is an assess-
Pen Testing that incorporates external criticality assess- ment of the severity of each vulnerability that
Techniques ments, data sensitivity and the existing control exists in your environment. In many cases, this
environment to help organizations successfully severity information is provided through data
rank vulnerabilities and, in turn, prioritize re- feeds from the vendors that provide your vul-
mediation efforts. nerability management tools.
This three-step process assumes that you The severity assessment should be based
have access to information about the network upon the potential damage that a successful
security vulnerabilities that exist in your en- exploit might cause. For example, a vulner-
vironment, the sensitivity of information ability that allows an attacker to gain admin-
processed by systems and applications, and istrative access to a system is much more
the state of existing security controls in the severe than one that causes a denial of service.
3 V U L N E R A B I L I T Y M A N AG E M E N T P R O G R A M S : A H A N D B O O K F O R S E C U R I T Y P R O S
2
VULNERABILITIES
4 V U L N E R A B I L I T Y M A N AG E M E N T P R O G R A M S : A H A N D B O O K F O R S E C U R I T Y P R O S
2
VULNERABILITIES
5 V U L N E R A B I L I T Y M A N AG E M E N T P R O G R A M S : A H A N D B O O K F O R S E C U R I T Y P R O S
2
VULNERABILITIES
Rank the
is a must for any organization ability prioritization system for a particular or-
Vulnerabilities looking to reduce IT security risk. ganization. Regardless of the tweaks you make,
an effective vulnerability management program
Vulnerability based on risk-based prioritization decisions is
Program Tips a system lacking security controls containing a must for any organization looking to reduce
highly sensitive information). IT security risk. Simplifying the process used
Pen Testing While this may seem like a lot of data to to perform vulnerability risk analysis makes it
Techniques gather and math to perform, you can find much easier to begin and sustain such a pro-
ways to automate the process and feed your gram. —Mike Chapple
6 V U L N E R A B I L I T Y M A N AG E M E N T P R O G R A M S : A H A N D B O O K F O R S E C U R I T Y P R O S
3
VULNERABILITY
TIPS
7 V U L N E R A B I L I T Y M A N AG E M E N T P R O G R A M S : A H A N D B O O K F O R S E C U R I T Y P R O S
3
VULNERABILITY
TIPS
8 V U L N E R A B I L I T Y M A N AG E M E N T P R O G R A M S : A H A N D B O O K F O R S E C U R I T Y P R O S
3
VULNERABILITY
TIPS
9 V U L N E R A B I L I T Y M A N AG E M E N T P R O G R A M S : A H A N D B O O K F O R S E C U R I T Y P R O S
3
VULNERABILITY
TIPS
1 0 V U L N E R A B I L I T Y M A N AG E M E N T P R O G R A M S : A H A N D B O O K F O R S E C U R I T Y P R O S
4
PEN TESTING
Social engineering has become one of ■■ Socialproof: Looking to others for guidance
Home the more prevalent attack methods in use to- on how to act.
day, and has been featured heavily in some
Editor’s Note
high-profile breaches. The 2011 RSA breach, ■■ Commitment/Consistency: Developing pat-
for example, involved a targeted spear phishing terns of behavior and maintaining them out
Rank the
Vulnerabilities
campaign and an exploit-laden Excel file. Thus, of habit.
for organizations to adequately model the real
threats they face, social engineering penetra- ■■ Liking: Wanting to “fit in” and being more
Vulnerability
Program Tips tion testing should be a mandatory tactic in easily persuaded by someone you like.
every pen testing toolkit.
Pen Testing Social engineering relies heavily on psychol- ■■ Authority:Acquiescing to requests or de-
Techniques ogy. There are several types of incentives and mands from perceived authority figures.
motivators to which people are highly suscepti-
ble, allowing social engineers to persuade peo- ■■ Scarcity:
Feeling higher motivation to pursue
ple to take an action. For example, Dr. Robert something if it is limited or exclusive.
Cialdini in his classic book Influence: The Psy-
chology of Persuasion (first published in 1984) Pen testers can leverage these motiva-
described six key motivators: tors when performing social engineering
assessments.
■■ Reciprocation: Feeling indebted to someone There are four social engineering tech-
for doing something for you. niques that pen testers can use to test an
1 1 V U L N E R A B I L I T Y M A N AG E M E N T P R O G R A M S : A H A N D B O O K F O R S E C U R I T Y P R O S
4
PEN TESTING
1 2 V U L N E R A B I L I T Y M A N AG E M E N T P R O G R A M S : A H A N D B O O K F O R S E C U R I T Y P R O S
4
PEN TESTING
1 3 V U L N E R A B I L I T Y M A N AG E M E N T P R O G R A M S : A H A N D B O O K F O R S E C U R I T Y P R O S
4
PEN TESTING
1 4 V U L N E R A B I L I T Y M A N AG E M E N T P R O G R A M S : A H A N D B O O K F O R S E C U R I T Y P R O S
ABOUT
THE
AUTHORS
MIKE CHAPPLE, Ph.D., CISA, CISSP, is an IT security
manager with the University of Notre Dame. He previously
served as an information security researcher with the
National Security Agency and the U.S. Air Force. Chapple
is a frequent contributor to SearchSecurity and serves as its
resident expert on enterprise compliance, frameworks and Vulnerability Management Programs: A Handbook for Security
Pros is a SearchSecurity.com e-publication.
Home standards for its Ask the Experts panel. He previously served
as site expert on network security, is a technical editor for Robert Richardson | Editorial Director
Editor’s Note
Information Security magazine and the author of several Eric Parizo | Executive Editor
information security titles, including the CISSP Prep Guide Kathleen Richards | Features Editor
and Information Security Illuminated.
Rank the Kara Gattine | Senior Managing Editor
Vulnerabilities Brenda L. Horrigan | Associate Managing Editor
DIANA KELLEY is a partner with Amherst, N.H.-based
Brandan Blevins | Associate Editor
consulting firm SecurityCurve. She formerly served as
Vulnerability
vice president and service director with research firm Sharon Shea | Assistant Editor
Program Tips
Burton Group. She has extensive experience creating secure Linda Koury | Director of Online Design
network architectures and business solutions for large Neva Maniscalco | Graphic Designer
Pen Testing
Techniques
corporations and delivering strategic, competitive knowl- Doug Olender | Vice President/Group Publisher
edge to security software vendors. [email protected]
TechTarget
DAVE SHACKLEFORD is principal consultant at Voodoo
275 Grove Street, Newton, MA 02466
Security, senior vice president of research and CTO at www.techtarget.com
IANS and a SANS analyst, instructor and course author. © 2014 TechTarget Inc. No part of this publication may be transmitted or re-
produced in any form or by any means without written permission from the
He previously worked as CSO for Configuresoft, CTO for publisher. TechTarget reprints are available through The YGS Group.
the Center for Internet Security and as a security architect, About TechTarget: TechTarget publishes media for information technology
professionals. More than 100 focused websites enable quick access to a deep
analyst and manager for several Fortune 500 companies. store of news, advice and analysis about the technologies, products and pro-
He is co-author of a SANS Institute book on virtual cesses crucial to your job. Our live and virtual events give you direct access to
independent expert commentary and advice. At IT Knowledge Exchange, our
security and currently serves on the board of directors at social community, you can get advice and share solutions with peers and experts.
1 5 V U L N E R A B I L I T Y M A N AG E M E N T P R O G R A M S : A H A N D B O O K F O R S E C U R I T Y P R O S