ROI WP - MaximizingROIonVMPrograms
ROI WP - MaximizingROIonVMPrograms
Management Programs
September 2015
Table of Contents
Vulnerability Management........................................................................................................................................................... 3
Typical Problems in Vulnerability Management Programs ............................................................................................ 3
Lack of Corporate Direction ....................................................................................................................................................................................... 3
Lack of Resources ........................................................................................................................................................................................................... 4
Ineffective Scanning ...................................................................................................................................................................................................... 4
Misleading Patch Audits .............................................................................................................................................................................................. 4
Not Using Credentials................................................................................................................................................................................................... 4
Making Vulnerability Management Pay Off ......................................................................................................................... 4
Perform Risk Analysis ................................................................................................................................................................................................... 5
Identify Assets ................................................................................................................................................................................................................. 5
Classify Data..................................................................................................................................................................................................................... 5
Define Requirements .................................................................................................................................................................................................... 5
Create a Vulnerability Program Blueprint ............................................................................................................................................................ 5
Conclusion ........................................................................................................................................................................................ 10
About Tenable Network Security ........................................................................................................................................... 10
Copyright © 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
2
Vulnerability Management
Vulnerabilities are exposures that can be exploited. A vulnerability can be a software defect, configuration error, presence of
malware, or basic human error. Vulnerability management programs attempt to identify and prioritize vulnerabilities:
systems are scanned, requests are made for various people to patch vulnerable systems, and therefore everything is as
secure as it can be.
Or is it? There are many reasons why some vulnerability management programs are unsuccessful, and there are many others
why some programs are successful. In this whitepaper, we’ll discuss how to make your program fall into the “extremely
successful” bucket so that you maximize the return on investment you’re spending on this very important resource.
Demonstrate compliance with regulations or industry standards or the fulfillment of contractual obligations
Secure your systems and reduce risk
Increase your security intelligence
Apply patches to systems faster and/or on a more frequent basis
Programs without a goal are often very reactive, such as responding to an executive’s panicked email about a worm he or she
read about on a blog. A reactive approach will always be behind the curve.
Without a clear goal and direction, it’s challenging for the person responsible for the vulnerability management program to
get buy-in and cooperation with IT, business units, and executive management. Without a consensus on the approach, it is
doomed to failure. For example, a set of systems for a particular business unit may have risks interpreted in several different
ways. The business unit will attach significance to the type of data stored on the servers, while the IT department may be
focused on risks to the operating system itself. Auditors will have a different view and may consider a reported vulnerability
to be of high importance since they are not considering the significance of the data and server it resides on. A “surprise” audit
may make sense to an auditor but is horribly disruptive to IT and the business units.
These are all problems management needs to solve at the executive level. Unfortunately, the frequent cop-out is to blame
the security team for exposures when they haven’t been empowered with a process that works.
Copyright © 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
3
Lack of Resources
Compliance regulations and guidelines do not specify the resources that must be committed to a vulnerability management
program, leaving this up to interpretation – always a bad move when budgets are involved. This leads management to focus
commitment on the purchase of tools or a service, with little regard for developing a process for its use and committing
people to supporting the process. Tools are only effective if they are used by staff trained in their use and following an
established process governing how they are used.
Ineffective Scanning
Vulnerability management is considered a cost center – a necessary process to pass compliance audits that often gets in the
way of business. This attitude results in a lukewarm support for the program so that components are weakened to the point
of minimal effectiveness.
As part of the process to cut corners on the vulnerability management program, many organizations are only concerned with
scanning for vulnerabilities and nothing more. “If it ain’t broke, I don’t want to know about it” is an expression that sums up
their attitude. This reactive attitude results in missing many issues that a more proactive approach would detect. Many
scanners have the ability to use credentials to log in to a system and get information that is not available on a network scan.
This information is crucial to ensuring systems are secured, but management does not want to know about it since it would
ruffle too many feathers. Even system administrators sometimes shy away from authenticated scans so they do not have to
analyze and mitigate as much data.
A configuration audit can be useful to ensure that it is part of the patching process.
Using a network scan to determine if a patch was applied is misleading. Just because the patch process was initiated does not
mean the patch was applied. There are many reasons a scanner may report a system as patched when it really isn’t; lack of
disk space, buggy patches, security settings, loss of power during patch application, incorrect backup methods, systems not
being rebooted, and many other reasons can contribute to a patch that appears to be installed, but did not complete.
Another issue with patch audits involves older operating systems that no longer have patches available. If no patches are
available, scanning for nothing will reveal nothing. For organizations that find need to use manually compiled programs,
patch audits appear to paint a grim picture when in reality, the situation may not be bad at all.
Copyright © 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
4
Perform Risk Analysis
A vulnerability rated as “critical” by a scanner does not have the same importance on all systems. Throwaway systems, such
as a test box that is isolated from critical systems, can easily be reloaded and probably do not store any important data. The
same cannot be said for a system that stores a customer database.
Identify Assets
It is important to identify what you need to protect. For large organizations, this can be a huge challenge. It is often helpful to
group assets by common functions and features, such as OS platform or business function. This facilitates vulnerability
scanning and remediation by ensuring that scans are configured to probe for common weaknesses in the platform or
application. Systems may be classified in multiple asset lists. For example, a Linux web server on the DMZ may be listed
under “Linux Systems”, “Web Servers”, and “DMZ Systems”. This ensures that scans are targeted appropriately. Create asset
lists that logically group assets, such as:
Classify Data
Data leakage is a growing problem that gets considerable media attention. Organizations have a lot of data flowing through
their network and not all of it is of equal importance. Technology does not have ESP. Unless the data has been identified and
classified, the system administrator has no idea of the significance of the data. This requires some effort from the business
owner. Once the data has been classified, the network and security devices can be designed to segregate data flows and
monitor for data patterns. Some typical classifications are as follows:
Define Requirements
What do you want from your vulnerability management program? This question is not as easy to answer as you might think.
You need to consider a number of factors such as compliance requirements, business objectives, and contractual obligations.
Define an effective process for gathering information, performing scans, and creating meaningful reports before deploying
tools.
Copyright © 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
5
identify critical assets and build consensus on the direction of the program. This aids greatly in setting expectations for the
impact of vulnerability scanning and identifies potential risks of scanning before it becomes an issue.
Area Description
Business Requirements The drivers behind the creation of the program, such as:
• Compliance
• Policy
• Contracts
• Standards
• Business Initiatives
Vulnerability Research Review reported vulnerabilities and correlate them with patches. The types of
vulnerabilities reported can determine the course of action taken to remediate the
issues.
Administration and Operations Large IT organizations typically require a detailed list of what is required of them to
Requirements manage the devices. Among the requirements are:
• Network
• System
• Data Center
• Support
Budget Equipment, software, personnel – tell them how many hours are required for
installation and ongoing monthly support.
Metrics Risk metrics show many vulnerable applications you have, the level of vulnerability,
and the remediation status. Status metrics show how far the program has spread
through the company.
Copyright © 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
6
Analyze Solutions
Be objective in your analysis of possible solutions. They all have strengths and weaknesses. Most important is to not try to fit
your program to a specific tool. Find a solution that works with your program and processes.
Since there are multiple vulnerability management solution options, perform a “bake-off” between qualified parties to better
judge their capabilities. Some of your evaluation criteria could include:
Do not just look at the short-term costs. Some solutions may be a bit more expensive up front, but are more inexpensive over
time. In addition, look for solutions that you can leverage for other areas of the organization. For example, can the
vulnerability management solution integrate with your patch management solution? Go beyond just looking for
vulnerabilities.
Areas where integration with the vulnerability management program is helpful include:
Patch Management
Identify the priority of deploying patches during a normal schedule or in an emergency based on the threat level defined in
the vulnerability research part of the program. Use the tools to provide verification that patches have been fully applied to
the systems they are supposed to be applied to.
Configuration Management
Establish “gold” standards and then perform credentialed audits against those standards. Make sure they are your
standards! Use the vulnerability management tools to provide independent verification of any patches or security issues and
adherence to configuration standards in accordance with an established security and configuration management plan.
Incident Response
Monitor networks for potential security incidents. Correlate events over time to detect anomalies that can indicate a
pending attack or the presence of an attacker who already has a foothold in the door.
A Security Incident and Event Management (SIEM) system simplifies incident reporting by gathering IDS and NetFlow data,
operating system logs, and many other disparate pieces of information into one place.
Organizations that have an effective vulnerability management program can quickly provide a global picture of system
activity to those responding to an incident.
Software Development
In organizations that develop applications, it is typical to find the same types of vulnerabilities across many application
segments, begging the following questions:
Copyright © 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
7
Why do they keep occurring?
Who is responsible for detecting and preventing?
What steps can be taken to change programming behavior to reduce vulnerabilities in applications?
Integrate scanning into the Software Development Life Cycle (SDLC) (source code audits, vulnerability scans of development
builds) during development. This will help reduce the number of QA cycles and allow developers to fix problems earlier.
Detecting vulnerabilities early in the development cycle saves costly efforts to mitigate a problem after the software has
been released.
Organizations that create Security Application Coding standards and train their developers on secure coding practices can
use the vulnerability scan metrics to show trends in vulnerabilities to measure the effectiveness of the program.
IT Support
A nice side effect of vulnerability scanning is that it can help identify bugs or problems in the network, which aids system and
network administrators in troubleshooting problems. A passive scanner can identify new devices on the network that
otherwise may go unnoticed, except for a sudden spike in network traffic. A close relationship between the IT support and IT
security teams can greatly improve efficiency.
Here are some measures that will help you maximize the return on the investment you’ve made in a solution:
Establish a Baseline
How will you know if you’re improving if you don’t know where you started? Establish and share a baseline vulnerability
analysis report at the start of the program. Don’t worry if it paints a dismal picture of the organization’s security posture –
you can only go up from there. The baseline provides the foundation for demonstrating progress.
Tune the scan to the target: a thousand database checks against a web server with no database are about as
effective as banging your head against the wall.
Figure out false positives: one hundred findings sounds bad, until you figure out only 30% are valid.
Audit companies and scanners assign risk levels to vulnerabilities based on their standards/experience. Weigh the
risks reported, adjust according to your organization, and then act on them.
Scan Scheduling
Avoid ad hoc scanning as it is typically very disruptive and difficult to manage. Set a schedule for scanning systems and stick
to it. Work with your IT organization so that scans are not disruptive to operations. Ad hoc scans should generally be used
only to test administrative response to an unplanned test. However, unscheduled tests often lead to bad things, including
resentful administrators, unnecessary escalation, and law enforcement are a few of your least favorite things.
Copyright © 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
8
Correlate Results
Large organizations often do not communicate well across departments or divisions. This creates redundancy in software,
personnel, scanning, and remediation. Sharing information, at all levels and processes, benefits everyone. Sharing includes,
but is not limited to:
Analyze Results
Use standard report templates for the vulnerability reports, detailed risk reports and summary risk reports. Standard
templates provide a mechanism for consistent reporting of vulnerabilities and risks. They help establish a level of efficiency
in understanding risks.
Anyone can read a vulnerability report, not everyone can understand one.
Analyze and research the results! Many scanners provide a brief description and suggested remediation of the
detected vulnerability, but don’t take this at face value. Remember, they are giving the “best” recommendation for
the masses, not the recommendation that may be most suitable for your company.
Follow-up on the issue. Did it really get patched? Or did it get addressed through other means without fixing the
underlying issue?
Create risk reports based on vulnerability reports and nature of the data.
Communicate Results
Once all of the reports have been created, make sure they are communicated to the appropriate parties. More importantly,
ensure that they are drafted in a format that is readable to the intended audience. Most importantly, ensure that they will be
read by the audience. Length and technical scope must be tailored for all levels of the organization. Executive management
does not understand what a “fingerd” vulnerability is or its impact to the organization. Make sure the report is worded in
terms they can understand.
Copyright © 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
9
Status Metrics vs. Risk Metrics
Status metrics demonstrate the state of the program and are organized in the following categories:
Information gathering
Vulnerability scanning
Remediation and mitigation efforts
Risk based metrics demonstrate the overall posture of the risk to applications and are organized as follows:
There are several risk scoring systems available (e.g., Microsoft STRIDE and DREAD rating systems, CVSS2, etc.) that can be
used as a template. Develop a consistent scoring system that is in line with business objectives and stick to it. This helps
demonstrate improvements that save money and demonstrates ROI.
Conclusion
Compliance requirements can provide useful checklists to ensure you’ve addressed specific security concerns, but it is
dangerous to base a vulnerability management program solely on a checklist. A proactive vulnerability management program
that addresses specific business needs of the organization will do far more to provide real value to the organization. Planning
requires effort, but poor planning results in wasted resources.
Copyright © 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
10