Vulnerability Management 2
Vulnerability Management 2
MANAGEMENT
A HYBRID FRAMEWORK
APPROACH
Vishwanath P.R Yogesh B S
ABSTRACT
In this paper, we propagate the idea of a
framework for vulnerability management to
meet the Infrastructure security and
compliance requirements standards of an
organization.
TABLE OF CONTENTS
Introduction 04
Discover 06
Classification 06
Assessment 06
Report 06
Remediate 07
Verify 07
Preparation 07
Vulnerability scan 07
Rescan 08
Port audits 09
Traditional Framework 11
Patch Management 12
Hybrid Framework 13
Glossary 14
Conclusions 16
References 16
VULNERABILITY MANAGEMENT 04
INTRODUCTION
Vulnerability Management
Program
Every organization needs a Vulnerability Management for its assets connected to the
internet. Many industries are striving hard to be compliant with regulations. Most of the
attacks which are resulted in data loss are often caused due to usage of known,
unpatched vulnerabilities. Vulnerability Management comes handy for those assets on
your network that is not regularly monitored for patches.
Vulnerability Management is
BAU (Business, As Usual)
Vulnerability management is a continuous process that ideally helps organizations
better manage their Infrastructure vulnerabilities in the persistent future. A good
Security program is constituted from a matured model implementation which is an
ongoing process, and to protect organization and data, Vulnerability Management is
recommended as the best practice.
The Center for Internet Security (CIS) Top “20 Critical Security Controls”, like Basic CIS
Controls, Foundational CIS Controls and Organizational CIS Controls. Implementing the
CIS Top 20 critical security controls is a great way to secure and strength the
Organization network.
04 Continuous Vulnerability
Assessment and Remediation 05 Controlled Use of
Administrative Privileges 06 Maintenance, Monitoring, and
Analysis of Audit Logs
VULNERABILITY MANAGEMENT 05
VULNERABILITY MANAGEMENT
LIFE CYCLE
Verification Discovery
Vulnerability
Remediation Management Classification
Life Cycle
Reporting Assessement
Classification
In this stage, we need to prioritize the assets by categorizing the business unit based on the criticality
to business operation. The main goal is not to attend the low priority assets while keeping the
high-impact assets vulnerable.
Assessment
The assessment stage includes identifying vulnerabilities through automated scans and credentialed
scans. In order to run a vulnerability management program, we must continuously reiterate the
configuration changes which provides breadth and depth of scanning range. Breadth is achieved by
scanning every asset in the environment. Depth is achieved by providing credentials. Ensure the
scanners are updated to the latest versions before running the scans, and all the non-intrusive checks
are enabled. One of the main challenges in the authenticated scans is credentials supplied in the policy
are not successful due to account lockouts, lack of permissions or ports such as 22, 139, and 445.
Note: All the scheduled scans are to be run in the window after the close of business, so that the
network congestion does not impact the network bandwidth.
Report
In this stage, the report generated should reflect the audience. There are different types of reports,
such as executive report, technical report, summary report, and remediation report. Knowing our
audience, we can generate reports in a different format. The security professionals refer the technical
reports, executive reports are generated for technical managers, and remediation report are generated
for the patch management team.
The Information security team needs information about the success of scanning strategies to track
remediation efforts.
VULNERABILITY MANAGEMENT 07
Remediate
In this stage, the remediation efforts are tracked based on the plan of actions such as patches from
vendors (OS or applications), configuration changes like registry changes, version update, or upgrade.
Keep a rollback plan for any impact. When creating the plan of action’s, one must keep in mind the order
of preference like Prioritize and mitigate the vulnerabilities based on the business risk.
Verify
Finally, to cross-check whether all the remediation efforts were successful or not initiating rescan with
the same configuration ensures that no vulnerability are present in the environment. Tickets need to be
closed after this step and keeping it as a reference for the future if any justifications required for
accepted vulnerabilities such as no patch for zero-days, business justification for legacy applications,
database or protocol in use should be documented.
VULNERABILITY MANAGEMENT
PROCESS
Vulnerability Management is the process of identifying, evaluating, treating and reporting on security
vulnerabilities in systems and software that runs on them. The Vulnerability Management Process
Involves five phases.
Preparation
The first phase in Vulnerability Management is the preparation phase. Instead of considering
thousands of vulnerabilities together, it is always recommended to start with a smaller number or by
limiting the number of vulnerabilities identified by the vulnerability scanner.
The Information Security Team handles all the responsibility of this preparation phase in an
organization. The very first step of the Vulnerability Management Process is defining its scope.
Obtaining an agreement is very important and to analyze which system to be included or excluded from
the Vulnerability Management Process. Besides the in-scope systems, an organization should also
determine the type of scans. The Scan performed might be from the perspective of an external
attacker on the external network or from the perspective of an internal attacker on the internal
network.
Vulnerability scan
Once the preparation phase is complete, the next phase of the process begins, and the initial
vulnerability scans are performed. Any issues which occur during the scans must be recorded as it
might happen again in the future like unavailability or poor application response. By recording this
information, it reduces the impact of future scans over the performance or stability of the target
systems. Most of the vulnerability scanning tools offer a wide range of reporting options to visualize
scan results, and it is necessary to use these tools to create numerous reports.
VULNERABILITY MANAGEMENT 08
Management and Information Security team shows more involvement to know the risk organization is
currently facing that includes the rate of vulnerabilities detected and its severity of the detected
vulnerabilities. The owner of the assets wants to get an overview of vulnerabilities in the systems that
they are responsible.
The IT department will want an overview (per technology) of technical information about detected
vulnerabilities as well as recommendations for mitigation and improvement.
After analyzing the vulnerabilities from a technical perspective, the IT department suggest on the
availability of the patches or whether to harden the configuration needs. The IT team also recommends
on the feasibility of the possible remediating action like whether they can avail the same support from
the vendor after updating patches.
The Information Security Team should set clear deadlines on the remediating action implementation in
order to ensure enough priority is given to remediation. Asset owners must have a timeline in their
action plan when to implement these remediating actions, and the timeframe should be in line with the
level of risk detected.
Rescan
Rescan must be scheduled to verify whether remediating actions have been successfully implemented.
Like the initial scan even this scan will be performed using the same vulnerability scanning tools and
identical configuration settings. This is a very important step to prevent inaccurate results due to
configuration errors. Generally, for implementing remediating actions, rescan is scheduled after the
deadline. Like the initial scan reports even for these the same types of reports are created.
The management and asset owners will be interested to know whether the remediating actions have
been effectively implemented and whether any residual risk remains. The IT department will be
interested in how effective the remediating actions have been implemented.
The security team will analyze the vulnerabilities throughout the vulnerability management process,
determine the associated risks and provides input on risk remediation. Further, from a technical
perspective, the team will analyze the vulnerabilities and provides information on the availability of
patches or whether to harden the configuration. This ongoing process has resulted in eliminating most
vulnerabilities that cybercriminals use to breach an organization.
VULNERABILITY MANAGEMENT 09
Port audits
Your Vulnerability Management program must have the capacity of controlling the firewall ports to
determine which applications require the firewall ports to be open or closed, especially on internet
servers. In case if inactive ports are open, then it might lead to exploitation by injecting trojans or other
malware.
Did you know the ransomware WannaCry, which wreaked havoc in 2017 to businesses worldwide,
came with a simple fix for disabling the SMB (Server Messaging Block) V1 and closing port 445? A lack
of awareness led to widespread ransomware attacks.
VULNERABILITY MANAGEMENT 10
Vendor
Issue Patch
Vulnerability
Announced
Vulnerability
Discovered
TRADITIONAL FRAMEWORK
Whenever a vulnerability is disclosed to the public through the CVE database, by the usage of
automation tools like Nessus, Qualys Guard, Rapid7 Insight VM network scans are performed to
discover, assess and report these vulnerability findings. When the vendor releases the patches for
vulnerabilities, the patch management team use patching tools to deploy monthly patches, cumulative
patches without the regard for impact analysis coverage. Without the proper process defined, it would
be a tedious task to align or synchronize different teams to manage vulnerabilities with ever-growing
CVE database. A lack of awareness of the impact of vulnerabilities among IT engineers leads to failure
of such traditional frameworks.
With considerations of the cons of traditional frameworks, adopting a hybrid framework was much
needed to implement a VM program.
Most importantly for patch management, if patches are available for the known vulnerability, a built-in
patch manager solution can resolve the vulnerabilities quickly.
VULNERABILITY MANAGEMENT 12
PATCH MANAGEMENT
New Patch
Release
Clean UP Prioritize
Report
Patch management makes the process simple and easy to manage the patches and helps to acquire
the patches, installing and then testing them. It helps to keep the system updated on all the security
patches available. It also decides which patch should be used or which shouldn’t be.
The software companies carry patch Management in order to detect any software bug and then
release a patch for the same. A lot of difference has been seen since the inception of patches. Initially,
the patches were sent over the external media devices and that too as individuals stand-alone code
modules. It used to be based on traditional fee-licensing systems. But today in this digital era of web-
delivered systems and cloud computing, the delivery system has undergone a sea change. Now
patches are applied to programs over a global IP.
With the above significant points in mind, we here propagate a hybrid approach with some of the
modifications from the NIST framework and other research conducted in the universities.
HYBRID FRAMEWORK
Here in this hybrid framework, the demerits of the traditional approach have been converted into
advantages. To introduces a new maturity model which has worked out in the current project. In this
paper, we present to you some of the key modifications done and how we were able to solve some
of the complex problems introduced in the Infrastructure vulnerability program. For example:
VULNERABILITY MANAGEMENT 14
By the time we write this paper, the framework built has matured into running this program smoothly.
Security professionals can adopt this framework to make this better and seamless.
member.
Review of vulnerabilities by
05 Clean-up procedure 06 manual observation in the
testbed environment.
$filename = "\Windows\system32\ntoskrnl.exe"
$obj = New-Object System.Collections.ArrayList
$computernames = Get-Content C:\Users\xyz\Desktop\Servername.txt
foreach ($computernames in $server)
{
$filepath = Test-Path "\\$server\c$\$filename"
if ($filepath -eq "True") {
$file = Get-Item "\\$server\c$\$filename"
$obj += New-Object psObject -Property @{'Computer'=$server;'FileVersion'=$file.VersionInfo|Select
FileVersion;'LastAccessTime'=$file.LastWriteTime}
}
}
$obj | Out-Host
Categories of Vulnerabilities
Actions Zero Day OS Patch Application Patches Application Patches
Deployment Implement Deploy patch, 2nd Need to update the Reboot after fix
workaround, if no Tuesday of the application patches
patch from the month every 15days
vendor (Microsoft patch
release)
CONCLUSION
Here we conclude by stating that the framework propagated is a continuous and
on-going process which needs correction and execution in the Organization. The work
and study conducted predominately over the windows environment.
By adopting these framework security professionals need to modify based on their
Organization’s requirements and business risk. Since different organizations have
different needs and requirements, one needs to establish the importance of security
policies as per organizational requirements and implement them accordingly.
AUTHOR BIO
Yogesh Babu B S has over 12 years of experience in IT Indus-
try as Server Administrator, VMware and Information Security.
He is currently a part of the Infrastructure Management and
Security Services Business unit in Happiest minds Technologies
Ltd. He is responsible for Security Vulnerability Management,
Vulnerability Assessment Project, SCCM, Servers, Microsoft
Exchange and emerging technologies.
Business Contact
A Great Place to Work-Certified™ company, Happiest Minds is headquartered in Bangalore, India with operations in the U.S., UK, The Netherlands,
Australia and Middle East.