Qualys Foundation
Qualys Foundation
Agenda
1. Define a vulnerability
2. Explain the need for Vulnerability Management
3. Set the scope of Vulnerability Management
4. Identify different options for Vulnerability Management
5. Describe the effectiveness of VM solution in terms of network monitoring,
identifying risks
6. List the best practices of Vulnerability Management
Introduction
Course Description
Globally, almost all businesses are linked to the Internet in some way or another.
However, connecting with the global internet exposes your organization's network to
many threats. Tech-savvy criminals can use the Internet to break into your network,
sneak malware onto your computers, extract proprietary information and abuse your IT
resources. In order to address these threats, organizations need to have a Vulnerability
Management (VM) program. VM enables you to monitor your network infrastructure
continuously, allowing you to address vulnerabilities as they are discovered in your
network. In this course, you will understand what vulnerabilities are and the importance
of having a program to address them.
Importance of
Vulnerability Management
Introduction
Lesson Objectives:
At the end of this lesson, you will be able to:
exploitation, and now they successfully attack the Internet almost every day.
In a University study, it was found that attackers scanned servers with open
exploitation was made within the average time of fewer than 19 hours. Any
to abuse and information theft. They also need to identify and prioritize
Sources of Vulnerabilities
Flip the cards to learn more.
Programming Errors:
Software Misconfiguration:
1. Front of card
organization’s reputation and can have an impact on the business. Over the
1. 1
2. 2
3. 3
4. 4
•
•
•
•
•
•
•
•
Repeat the VM scan and provide reports to the security team, auditors, and management
servers, desktops, copiers, and mobile devices) are running on your network,
which involves uncovering forgotten devices. You cannot secure what you do
not know. You also need to identify the people who are responsible for
Internet-facing assets are at high risk for attacks. Always begin asset scoping
with internet-facing assets. Scoping starts with a vulnerability scan—usually
done by directing the scanner at a particular IP address or range of
addresses, so it's helpful to organize your database by IPs; this is one way. In
addition to an active vulnerability scanner, various sensor types used for
asset discovery and vulnerability detection may be needed, depending on
your environment.
Launching a Scan
–
You can schedule a vulnerability scan to run repeatedly or run it on demand, using a scanner or
agent. The scanning is performed by your VM application based on your computer system or
network selection. To avoid unnecessary alerts, request your system owner to 'whitelist' the IP
addresses of your scanner and VM scanning solution.
Reviewing Options for Scanning Tools
–
1. It can check for a comprehensive and continuously updated database of vulnerabilities.
2. The ability to scale to the size of your organization.
SaaS allows you to do both of these things.
Mobile workforce
Today, many employees work remotely, which can cause severe challenges for your
Vulnerability Management program. One way to scan remote users is to ensure they are
connected to your VPN and scanning them over the tunnel, assuming the network and VPN can
handle the traffic. The better solution is an agent-based approach. Scanning is performed by a
local agent that runs on the host machine and provides the information necessary to evaluate the
security state of the machine, with little effect on processing, memory, and bandwidth.
Virtualization
–
Virtualization has led to gains in flexibility. With virtualization technology, a server can be set up
on demand, often within a few minutes.
To scan virtualized servers efficiently in your VM program, evaluate:
Virtual scanners: Scan engines are available for your virtualization platforms, allowing
you to seamlessly integrate the scanner into your virtualization setup.
Monitoring: In virtual environments, the creation of new servers tends to be dynamic.
This is especially true for virtualization service providers and may result in the creation
of new server networks. The downside for you is that your virtual servers on these
networks are not automatically scanned by many VM solutions. Be sure your VM
solution provides monitoring capability to automatically scan virtual servers. This
requirement is mandatory.
Authorization: Service providers frequently restrict scanning to pre-approved hosts.
Consider pre-approved scanning solutions to eliminate this manual and time-consuming
requirement.
Lesson Objectives:
As you weigh options for each step of VM, consider these tips:
Automate As Much As You Can
–
Many of the steps to VM are repetitive and applied to all networked devices in the enterprise. VM
automation is economical, rapid, systematic, comprehensive, and continuous. Manual
intervention should be limited only to prioritize patches and negotiate the proper window to apply
those patches.
Use Solid, Safe Technology
–
VM is concerned with preserving the safety and security of your data, applications, and network.
Do not compromise; use only VM technology that has a solid track record and is used globally.
Consultants are a great resource to assist you in protecting your network and
You will want to understand what you are getting and not getting from the
Results are valid only until the environment changes or until new
threats arise – which is daily!
Networks and devices are reconfigured regularly. Vulnerabilities are
found daily, and vulnerability assessments are quickly outdated. If you
want VM to help strengthen security, it’s more appropriate to do
consistent, daily scans or use an agent which provides near real-time
results.
Lesson Objectives:
•
Identify both external and internal weaknesses.
•
•
•
•
•
•
•
•
•
•
User’s access Qualys VM by simply logging in via a web browser. Users can
immediately use the service and audit the security of their external and
internal networks.
Qualys VM:
KnowledgeBase
–
The core of Qualys VM is its KnowledgeBase. The KnowledgeBase is the continuously updated
and comprehensive database of vulnerabilities signature.
Scanner Appliances
–
To map domains and scan IPs behind the firewall, Qualys VM Scanner Appliances are installed
by customers. These are virtual or physical devices that install within minutes, gather security
audit data inside the firewall, and communicate securely with Qualys SOCs. These devices poll
the SOCs for software updates and new vulnerability signatures and process job requests.
defenses against cyber threats such as malicious code, bot attacks, social
Protection helps to pinpoint your assets that have the highest exposure to
the latest known threats so that you can prioritize and mitigate the high-risk
open tickets based on what’s discovered via scan or cloud agent detection.
Think of a ticket as an audit trail for each detected vulnerability. This audit
trail identifies the specific Qualys user assigned to this vulnerability and the
deadline (in the number of days) for this user must fix or mitigate the
associated vulnerability.
Reports from Qualys VM automatically identify and rank vulnerabilities with
the Qualys VM Scanning Engine. This engine assigns one of five severity
levels to define the urgency associated with remediating each vulnerability.
Rankings are based on a variety of industry standards, such as Common
Vulnerabilities and Exposures (CVE) and National Institute of Standards and
Technology (NIST).
These levels are:
Automating Reporting
Qualys VM is a flexible, comprehensive, and intelligent reporting capability.
Qualys VM reports come with filtering and sorting that enables you to view
data any way you want.
Components of Qualys VM reporting are:
Network assets (IPs and/or asset groups) are included in the report.
Graphs and charts showing overall summaries and network security
status.
Trending analysis for a given network.Vulnerability data with detailed
specificity.
Filtering and sorting options to provide other flexible ways to view your
network’s data.
Qualys Dashboards:
1. 1
2. 2
3. 3
4. 4
Misconfigurations and new vulnerabilities appear daily and may immediately expose a computer or
network device to attacks. These threats make the job of defending networks an urgent priority for
organizations. Your network should have an always‐on, continuous dashboard of your global
perimeter to handle this responsibility and network security controls. It should automatically identify
and alert any attack, prevent operational interruptions, and protect the confidentiality, integrity, and
availability of critical applications and data. This lesson describes the need for CM and offers a
blueprint for creating a continuous security practice.
Lesson Objectives:
Understanding CM and VM
The key benefit of Qualys CM is that it instantly alerts first responders on operational teams as soon
as an unauthorized change is detected. A deep, symbiotic relationship exists between continuous
vigilance and alerting aspects of Qualys CM and the assessment and remediation aspects of Qualys
VM. Cyber threats may consist of software‐borne threats, such as exploits that install worms,
viruses, and ‘drive‐by’ infections from malware on websites; they may also target internal issues
such as those related to wrong configurations in your IT environment. Responding to threats from
both scenarios requires the integration of continuous monitoring plus assessment and remediation.
Qualys CM sends essential information quickly into the hands of the right people for immediate and
targeted action. This service accelerates the ability of first responders to stay ahead of threats to the
most critical assets.
Qualys CM helps you follow the guidance of the Critical Security Controls by providing you with the
ability to:
Regular scanning of all assets connecting to your network using scanners and agents.
•
Scan on demand for ad‐hoc checks or specific vulnerabilities such as ‘forbidden ports,’
recommended by CSC 4.
Inspect reports that integrate Common Vulnerabilities and Exposures (CVE) and Common
Vulnerability Scoring System (CVSS) standards for flexible analysis of results.
Track remediation over time with ticketing system and dashboards with trending data.
Continuous Vulnerability
Management—Best
Practices
Introduction
This lesson reflects the variety of Security measures required to identify and eliminate weaknesses
on your network effectively. These checks form an aggressive plan for removing vulnerabilities in
essential resources before attackers can exploit your network.
Lesson Objectives:
Perform comprehensive and accurate scans on your assets, starting with the
most important ones. Doing so will give you complete visibility of the level of
risk associated with your assets. Intelligent scanning rapidly finds
vulnerabilities on your network automatically or on-demand. Scan for as
much as possible, as often as possible, so that you have a fully up to date
version of what is going on in your network.
Introduction to VMDR
Remediate by Prioritizing Patching Efforts
Prioritize application of patches, starting with the most critical vulnerabilities
on the most important assets, and proceed to the less critical ones. Set
performance goals to reduce the level of critical vulnerabilities in the
network.
1. 1
2. 2
3. 3
5. 5