SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
WHITE PAPERCONFIDENCE: SECURED
ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE
GETTING THE MOST VALUE
FROM VULNERABILITY
MANAGEMENT AND
COMPLIANCE PROGRAMS
As a CISO/CSO/VP of Security,
anticipating these obstacles and planning
how to deal with them will determine
whether or not your VM or compliance
program will meet the expectations set
by your enterprise. We discuss several
solutions to the most common problems
encountered before, during, and after
the initial deployment of your VM or
compliance solution. Careful consider-
ation of these items will help to make
your VM and compliance program more
effective.
REVISIT YOUR PROGRAM GOALS
Your VM or compliance program is well
underway—you’ve installed the technol-
ogy, trained your staff, and are even
generating some reports and metrics.
But the pace of your deployment has
slowed down. It’s now time to review the
reasons you implemented a VM or com-
pliance solution in the first place. Are
you seeing the results you anticipated?
An ideal VM or compliance program
should:
»»Scan all of your assets at a frequency
that allows rapid detection of new
vulnerabilities, rogue devices, and
compliance violations, based on the
criticality of those assets to your
business;
»»Have no impact on production
operations;
»»Have content that is continu-
ously updated as new vulnerability
checks and compliance coverage are
developed;
»»Provide actionable reporting across all
organizational levels and groups;
»»Be fully integrated with remediation
and verification processes and work-
flows to enforce accountability within
the program; and
»»Provide accurate and objective
measurements of risk across your
enterprise and show reduction in risk
over time.
In short, your VM or compliance pro-
gram must be viewed by executives,
operations staff, and other stakeholders
as the source of truth that measures the
vulnerability and compliance posture of
your entire organization, and a corner-
stone of a unified security architecture
that fully supports enterprise risk reduc-
tion efforts.
IT’S ABOUT REDUCING RISK
The overall effectiveness of your VM
or compliance program will be mea-
sured primarily by the reduction of
risk within your organization. Because
risk is inherently intangible and not
absolutely quantifiable (until after an
incident occurs), it is a complex and
difficult metric to calculate. Effective
measurement of risk must bring together
several components, including the
adequacy and frequency of vulner-
ability or compliance scanning, quality
and timeliness of reporting and the
effectiveness of followup remediation
and verification actions suggested by
the output of the VM/compliance tools
and processes. Large organizations with
complex IT departments commonly
experience inconsistencies or gaps within
these components and associated data
reconciliation problems, making the per-
formance of risk reduction efforts even
more difficult to evaluate.
CONSIDER YOUR SCANNING REGIMEN:
COVERAGE, FREQUENCY AND DEPTH
From a coverage perspective, are you
scanning everything you should be and
at the appropriate frequency? Remember,
your network is only as secure and
compliant as the least secure asset on it.
Enterprise VM and compliance solutions
provide automated scanning, and many
companies configure these solutions
for continuous scanning of their entire
enterprise. However, without a com-
plete understanding of all the networks
within your enterprise you might not
be scanning all known assets, let alone
discovering new ones. Integrating your
VM and compliance tool with a robust
and reliable asset management system—
ideally through automated means—will
help to ensure you are scanning all the
networks and assets in your enterprise.
Many organizations lack asset manage-
ment systems that can provide a reliable
OVERVIEW
Enterprise Vulnerability Management (VM) and compliance programs reach
their full potential when they are built on well-established foundational
goals that address the information needs of all stakeholders, and tie their
output back to these enterprise goals. Today’s enterprise-class, state-of-
the-art VM and configuration auditing solutions may well be up to the
task of supporting these programs, but technology is only one essential
ingredient. Effective programs are also supported by robust workflow
processes that cross organizational boundaries to implement a “closed-
loop” model that spans from detection to remediation. Overcoming typical
obstacles such as organizational resistance, incomplete coverage of your
network and gaps in measurement are keys to program success.
2 Getting the Most Value From Vulnerability Management and Compliance Programs
source of configuration data for the VM
or compliance solution. In these cases,
router and firewall configuration files
or the network engineering group can
provide a comprehensive list of networks
to be scanned to assess their vulner-
ability or compliance posture. Be aware
that in some cases, network devices
may block scan traffic to connected
endpoints, resulting in interrupted scans
that contain incomplete vulnerability
and compliance information for filtered
endpoints. Discovery of new or transient
assets beyond just servers and laptops is
most effectively supported using a solu-
tion based on agentless technology.
Periodic reviews of scan results might
reveal seemingly empty networks or
networks comprising hosts without any
reported vulnerabilities or compliance
issues. These are likely indicators of
filtering, either at the network or host
level. While firewalls are an important
component of defense-in-depth secu-
rity, they should not be configured to
interfere with legitimate security or com-
pliance evaluations. A vulnerability or
compliance issue that has been blocked
from detection by your VM or compli-
ance solution still exists and presents
undesirable risk to an organization.
Frequency of scanning is another impor-
tant aspect to consider when measuring
the effectiveness of your program.
Configuring your VM or compliance
tool to scan a network once a year is
less effective than performing daily or
weekly scans, and can result in delayed
detection of important vulnerabilities or
compliance issues. With most automated
tools, updating the solution to include
results of the most recent vulnerability
and compliance checks is critical.
Without a consistent update process,
the technology will not be able to detect
the latest vulnerabilities or compliance
issues. From a quality assurance
perspective, these updates should be
treated much like antivirus signature file
updates in that they should be tested
prior to being used on critical produc-
tion networks and systems.
Depth of scanning refers to whether or
not you are performing authenticated
scans, i.e. using credentials to access
the internal configuration of systems
on your network. While authenticated
scanning is the norm in compliance
and configuration auditing, many VM
programs have not yet progressed to this
stage. Unauthenticated vulnerability
checks are generally not intrusive. In the
unlikely event that such scans disrupt
production services, this should be
logged as a vulnerability on the affected
system. After all, any device or malicious
user who sends identical traffic would
have the same undesirable effect on the
affected systems. Anomalous or unan-
ticipated network traffic should never be
allowed to have a deleterious impact on
any system.
However, the difference between
non-authenticated vs. authenticated
vulnerability scans can be likened to the
difference between your doctor making
a diagnosis merely based on external
observations of symptoms vs. perform-
ing a diagnostic test such as an MRI
or CT scan. Scanning with credentials
is necessary to identify all the vulner-
abilities present on a system. When you
first activate authenticated scanning, be
aware that your VM solution will pres-
ent you with significant amounts of new
information (including vulnerabilities).
This can be overwhelming for your secu-
rity team, and certainly discouraging for
individuals responsible for remediating
the vulnerabilities on affected systems.
Take appropriate steps to work with pro-
gram stakeholders to help them prioritize
remediation efforts.
ADDRESS SPECIFIC INFORMATION
AND REPORTING NEEDS OF
STAKEHOLDERS
Audience-specific reporting is criti-
cal to the continued success of VM
and compliance programs and their
effectiveness as a key part of your
organization’s overall risk management
strategy. There are multiple consumers
of vulnerability and compliance
HOSTNAME SCORE NUMBER OF
VULNERABILITIES
OLDMAIL.EXAMPLE.COM 402,487 16
SQL72-OLD.EXAMPLE.COM 363,889 12
HMI4.OPS.EXAMPLE.COM 318,050 14
LAPTOP34.CLIENTS.EXAMPLE.COM 226,538 8
DEV82.EXAMPLE.COM 192,416 8
LEGACYDEV.EXAMPLE.COM 185,598 10
GUEST734.EXAMPLE.COM 136,283 6
FINANACE23.EXAMPLE.COM 111,320 12
CARDREADER-TAMPA.EXAMPLE.COM 103,208 2
WIN2K.EXAMPLE.COM 9,190 14
TOP 10 VULNERABLE HOSTS (POINT IN TIME)
uu FIG 1: Interactive Reports Help Prioritize Remediation for Operations Staff
3Getting the Most Value From Vulnerability Management and Compliance Programs
reports, from security and operations
practitioners responsible for reme-
diation of any findings to executives
and even your Board of Directors.
Each group will likely require differ-
ent information, and it is important
that each type of report provides
meaningful, actionable data to its
target audience. Your program should
provide targeted and actionable
information to stakeholders at the fre-
quency they demand.
Security and operations staff need
access to the technical details of the
vulnerabilities and compliance find-
ings for which they are responsible to
remediate. They will generally need
this information in a format that
allows correlation by system, system
type, and vulnerability—this is where
automated, interactive reports are
beneficial. With detailed vulnerability
or compliance information at hand,
security and operations can prioritize
remediation and then get timely feed-
back and objective verification of their
efforts.
Security managers generally require
more analytic reports that summarize
the state of vulnerabilities or compli-
ance posture across classes of systems
or networks. For instance, a manager
might want to compare the set of
vulnerabilities in the San Francisco
office with the set of vulnerabilities
in the Toronto and Munich offices to
determine whether or not remediation
efforts are being performed consistent-
ly across the organization. It may also
be useful to compare the compliance
posture of UNIX servers to Windows
counterparts, to see which systems
are being patched in a more timely
manner. Finally, a manager might
want to look at the vulnerability
scores of the entire organization over
time in order to determine the overall
effectiveness of the configuration and
patch management programs.
For executives and board members,
simpler reports summarizing the state
of the VM or compliance program
expressed as a risk or program matu-
rity metric are beneficial and are often
included as part of an overall security
or IT briefing. When included in
other business operations reports, this
information must be high level and
provide at-a-glance understanding of
the overall risk and compliance pos-
ture. In addition to providing a quick
answer to the question, “How secure
and compliant are we?” the accuracy
of the information must be unassail-
able in the event questions arise.
“Traffic-light” reporting (where the
overall posture is given a red, yellow,
or green rating) is common, but this
simple signal should be accompanied
by high-level summary or component
metrics, especially showing change in
risk or compliance posture over time.
For example, the overall status of the
program, represented by a single color,
could comprise underlying coverage,
reporting, and remediation metrics,
each of which contribute to the overall
rating.
A more comprehensive way to rep-
resent the effectiveness of your VM
and compliance program is to use
a capability maturity model (e.g.
such as the SEI CMM). For VM and
compliance programs, six key metrics
can be used to assess effectiveness.
We have already discussed scanning
regimen, and three of the metrics
refer to that—coverage, frequency,
and depth. The next three metrics are
reporting, remediation and currency.
While the scanning regimen metrics
can be easily derived from your VM
or compliance solution, the others can
be more subjective and will require
alternative and possibly more manual
methods of measurement, e.g., a
simple 1-5 scale that answers the fol-
lowing key questions for each metric:
»»How timely, targeted, and relevant
is the information you are providing
to your stakeholders?
»»Are VM and compliance find-
ings being remediated in a timely
fashion?
»»How current is your VM and com-
pliance solution with respect to
software releases and content?
A spider graph is an effective visual
tool to indicate how well your pro-
gram is performing on each of these
six key metrics, and can also be used
to track improvements over time.
uu FIG 2: Analytic Reports Show
Vulner­ability Management or
Compliance Posture Across the
Enterprise
4 Getting the Most Value From Vulnerability Management and Compliance Programs
Report generation needs to be auto-
mated. This saves valuable time and
effort, and results in more objective
reports with greater accuracy. Of
course, reports must be reviewed prior
to distribution, to ensure accuracy and
anticipate any questions that might
ensue, especially from management
and executives. A small incremental
investment in developing, deploying,
and enhancing automated reporting
will provide significant return in
terms of building increased credibility
and lowering the overall cost of your
VM and compliance program.
BREAK DOWN
ORGANIZATIONAL BARRIERS
Not everyone in your organiza-
tion will be ardent supporters of
an enterprise VM or compliance
program. Operations teams may
view the remediation instructions
output from the VM or compliance
tool as an inconvenient increase in
their already heavy workload. Staff
reluctance to support program efforts
can manifest itself in various ways,
including refusal to allow scanning on
networks they “own,” limiting scan
coverage or blocking scan traffic at
network perimeters and endpoints or
complaining about service disruption
from scanning—these are all common
reactions from groups that may be
unconvinced of the value a VM or
compliance program can bring to their
part of the organization.
Adopting some or all of the following
strategies may mitigate some concerns:
1.	Engage the network operations and
engineering teams in designing
the VM or compliance solution,
in particular to address concerns
about the impact of scanning on
the network. Today’s local-area net-
works provide more than sufficient
bandwidth to support continuous
scanning using most automated
VM and compliance tools. For low-
bandwidth or high latency wide-area
networks, the solution needs to be
configurable to avoid interference
with other network traffic by limit-
ing the speed and/or frequency of
scans.
2.	Immediately after initial deploy-
ment, establish an on-call team
(with representation from the
Security and IT Operations teams)
to provide first-level response to any
suspected disruption to operations
from scanning. This team should
be available around the clock,
even when scanning is not active.
Problems may not be immediately
detected after a scan, and then may
require some time to troubleshoot,
especially to provide the necessary
evidence and assurance that the root
cause of the problem isn’t due to
scanning.
3.	As you expand your deployment,
define the standard set of VM and
compliance reports you’ll provide
to each constituent group partici-
pating in the program, as well as
consistent and measurable processes
for scanning, detection, report-
ing, remediation, verification and
handling of exceptions and waiv-
ers. Enlist sponsorship from your
organization’s top-level executives
as you introduce and roll out the
program to each constituent group,
and be prepared in advance to deal
with their potential objections.
The role and profile of the security
team within the organization and
your corporate culture will deter-
mine whether a “carrot” or “stick”
approach will work best.
4.	As each successive group is
deployed, give the respective
operations teams direct access to
the output. Allow them to view
results of scans against their own
assets directly (partitioning the data
as appropriate). Provide a formal
mechanism for feedback and ques-
tions relating to scans, and provide
a method to determine the status
of the automated scans at any
time. This will allow the teams to
eliminate scans as the source of any
operational issues. Provide enough
specifics to permit them to evaluate
the VM and compliance solution as
the cause of an anomaly, unlikely as
that might be.
5.	Give the operations teams reports
that show the effect of their reme-
diation efforts. Ideally, these reports
will be available to them on demand
through a self-service portal. Allow
them to compare their results to
others, and to measure progress over
time.
6.	Ensure that recognition for vulner-
ability reduction and improvement
in compliance is shared with the
uu FIG 3: Simplified Reporting
Provides a Quick Snapshot of
Overall Program Effectiveness
for Executives
5Getting the Most Value From Vulnerability Management and Compliance Programs
EQUIP AND SUPPORT YOUR
SECURITY TEAM
Your security team might itself pres-
ent an impediment to achieving full
maturity of your VM and compli-
ance program. Does your team have
the right skills and are there enough
people to do the job? Security teams
often underestimate the effort needed
to maintain the VM or compliance
solution so it stays aligned with
changes in the network configura-
tion, regulatory policy, or internal
IT change management procedures,
which can slow progress towards full
implementation.
Following are some recommended
practices for you and your team to
adopt to improve the effectiveness of
your VM or compliance program:
1.	Ensure adequate resources are
assigned to deploy and maintain
the solution. Hardware occasion-
ally needs replacement, software
needs updating and changes in the
network design require adjustments
to the configuration of the tool. In
addition, new vulnerability or com-
pliance checks require updates.
2.	Ensure that staff members who
perform scans and prepare reports
are fully trained in the tool’s use.
For example, introducing new
vulnerability or compliance checks
often causes a spike in the reported
number of vulnerable or non-com-
pliant systems. These spikes may
skew trending reports, and without
proper context stakeholders could
misconstrue that the organization
has taken a step backwards in terms
of its risk reduction efforts.
3.	Position your team as “security
analysts” who can advise program
stakeholders on severity of vulner-
abilities or compliance issues, assist
in prioritizing remediation efforts
and research additional informa-
tion when asked. This will increase
the team’s overall job satisfaction
and contribute to raising the pro-
file of your program within the
organization.
4.	Form a productive working relation-
ship with your solution vendor to
raise requests for new features and
to report and resolve false positive
conditions, which can and do occur.
5.	Develop analysis and training pro-
grams so that personnel responsible
for gathering and analyzing data
from the VM and compliance tools
do so in a consistent, repeatable,
and correct manner.
REALIZE EVEN GREATER VALUE
The most effective VM and compli-
ance programs are characterized by
continuous improvement, so that
increases in capability and functional-
ity are part of a program’s natural
evolution, and not just a one-off
effort.
Examples of these natural progressions
include integrating additional data
sources with the existing VM or com-
pliance solution and using the data to
provide reports that influence business
decisions:
1.	Adding asset management data per-
mits correlation of system age and
other system attributes with overall
organizational risk. Older machines
are more difficult (and more expen-
sive) to maintain and keep secure.
2.	Tying business function to specific
systems can provide business units
an easy way to monitor their overall
vulnerability or compliance risk,
making it easier to justify and pri-
oritize investments in IT security.
3.	Providing multiple views of vulner-
ability and compliance exposure
through strategic placement and
configuration of scanning devices
will enable fine-grained examina-
tion of risk which would help in
incident response planning as well
as prioritization of remediation.
4.	Tying DHCP leases to the VM tool
via API calls can provide a “scan on
connect” service that will automati-
cally scan new devices. Passing the
results of the scan to a network
management system can provide an
enhanced form of network access
control, where systems with specific
vulnerabilities can be quarantined
until they are remediated.
TIE OUTPUT TO PROGRAM GOALS
Once your organization is comfortable
with automated and continuous VM
and compliance scans and understands
the value of the information in the
reports, you will be ready to extend
your program to support establish-
ment and measurement of performance
goals. Remember that one of the
primary goals of a VM or compliance
operations teams who are remediat-
ing the vulnerabilities or compliance
issues.
7.	Provide a method for operations
teams to voice concerns and report
suspected issues with vulnerability
and compliance scanning (e.g., false
positives).
6 Getting the Most Value From Vulnerability Management and Compliance Programs
program is to measure the risk of
vulnerabilities and misconfigurations
within a set of systems. When the pro-
gram is providing accurate, actionable
data that is being used by operations
and security staff to guide remediation
activity, you can begin to use the tools
and processes in security planning. By
creating time-based trend reports using
the metrics established through your
program, you can set risk reduction
goals and track progress towards their
achievement.
TAKE YOUR PROGRAM TO
THE NEXT LEVEL
The most effective VM and compli-
ance programs continuously adapt
to remain fully aligned with risk
reduction goals that evolve over time,
whether due to regulatory changes,
M&A activity, new threats, or other
factors. Adopting a deployment meth-
odology that incorporates continuous
program improvement will enable your
organization to improve security and
reduce risk through more rapid and
accurate identification and remedia-
tion of vulnerabilities and compliance
findings in critical systems.
uu ABOUT THE AUTHOR
Seth Bromberger is principal
of NCI Security LLC, (www.
ncisecurity.com), a full-service
consulting firm that offers
relevant, best-in-class security
management services to
government, vendors, and
critical infrastructure owners/
operators.
7Getting the Most Value From Vulnerability Management and Compliance Programs
u Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service provid-
ers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based
on high-fidelity asset visibility and deep endpoint intelligence combined with business-context, and enable security auto-
mation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and
policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at tripwire.com. u
SECURITY NEWS, TRENDS AND INSIGHTS AT TRIPWIRE.COM/BLOG u FOLLOW US @TRIPWIREINC ON TWITTER
©2014 Tripwire, Inc. Tripwire is a registered trademark of Tripwire, Inc.
All other product and company names are property of their respective owners. All rights reserved.	 	 WPVMPCP1a 201307

Weitere ähnliche Inhalte

Was ist angesagt?

Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and RiskSecPod Technologies
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And RiskChandrashekhar B
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsDamon Small
 
Vulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewVulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewSusan Rantall
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)James W. De Rienzo
 
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseLumension
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesRyan Faircloth
 
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...VAST
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSree Harsha Boyapati
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
Vulnerability Management Program
Vulnerability Management ProgramVulnerability Management Program
Vulnerability Management ProgramDennis Chaupis
 
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision PointsNetwork Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision PointsPivotPointSecurity
 
10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and ReponseEMC
 
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
Vulnerability Management Nirvana - Seattle Agora - 18Mar16Vulnerability Management Nirvana - Seattle Agora - 18Mar16
Vulnerability Management Nirvana - Seattle Agora - 18Mar16Kymberlee Price
 

Was ist angesagt? (20)

Vulnerability , Malware and Risk
Vulnerability , Malware and RiskVulnerability , Malware and Risk
Vulnerability , Malware and Risk
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to Basics
 
Vulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) OverviewVulnerability Assessment & Analysis (VAA) Overview
Vulnerability Assessment & Analysis (VAA) Overview
 
Network Operations Center Processes- Isaac Mwesigwa
Network Operations Center Processes- Isaac MwesigwaNetwork Operations Center Processes- Isaac Mwesigwa
Network Operations Center Processes- Isaac Mwesigwa
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)
 
Why Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of DefenseWhy Patch Management is Still the Best First Line of Defense
Why Patch Management is Still the Best First Line of Defense
 
Vulnerability Management V0.1
Vulnerability Management V0.1Vulnerability Management V0.1
Vulnerability Management V0.1
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
B&W Netsparker overview
B&W Netsparker overviewB&W Netsparker overview
B&W Netsparker overview
 
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
Kept up by Potential IT Disasters? Your Guide to Disaster Recovery as a Servi...
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
 
Vulnerability Management Program
Vulnerability Management ProgramVulnerability Management Program
Vulnerability Management Program
 
Dtl 2012 kl-app_ctl1.2
Dtl 2012 kl-app_ctl1.2Dtl 2012 kl-app_ctl1.2
Dtl 2012 kl-app_ctl1.2
 
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision PointsNetwork Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points
 
10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse10 Tips to Improve Your Security Incident Readiness and Reponse
10 Tips to Improve Your Security Incident Readiness and Reponse
 
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
Vulnerability Management Nirvana - Seattle Agora - 18Mar16Vulnerability Management Nirvana - Seattle Agora - 18Mar16
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
 

Ähnlich wie Getting the Most Value from VM and Compliance Programs white paper

Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxAardwolf Security
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability ManagementGFI Software
 
CAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and ControlCAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and ControlCAST
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability ManagementIRJET Journal
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - PrintAndrew Kanikuru
 
Open service risk correlation
Open service risk correlationOpen service risk correlation
Open service risk correlationfrantzyv
 
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity SolutionsSecuring the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity SolutionsSecurityGen1
 
Guardians of Connection: Signalling Protection in the Digital Age
Guardians of Connection: Signalling Protection in the Digital AgeGuardians of Connection: Signalling Protection in the Digital Age
Guardians of Connection: Signalling Protection in the Digital AgeSecurityGen1
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfSecurityGen1
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfElanusTechnologies
 
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...Aricent
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixHCLSoftware
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report exampleIhor Uzhvenko
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudSwapna Shetye
 
Telecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenTelecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenSecurityGen1
 

Ähnlich wie Getting the Most Value from VM and Compliance Programs white paper (20)

Globally.docx
Globally.docxGlobally.docx
Globally.docx
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docx
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
CAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and ControlCAST for Vendor Monitoring and Control
CAST for Vendor Monitoring and Control
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability Management
 
Veracode Corporate Overview - Print
Veracode Corporate Overview - PrintVeracode Corporate Overview - Print
Veracode Corporate Overview - Print
 
network-host-reconciliation
network-host-reconciliationnetwork-host-reconciliation
network-host-reconciliation
 
Managing Compliance
Managing ComplianceManaging Compliance
Managing Compliance
 
Open service risk correlation
Open service risk correlationOpen service risk correlation
Open service risk correlation
 
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity SolutionsSecuring the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
Securing the Digital Frontier: SecurityGen's Telecom Cybersecurity Solutions
 
Guardians of Connection: Signalling Protection in the Digital Age
Guardians of Connection: Signalling Protection in the Digital AgeGuardians of Connection: Signalling Protection in the Digital Age
Guardians of Connection: Signalling Protection in the Digital Age
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
 
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdfThick Client Penetration Testing Modern Approaches and Techniques.pdf
Thick Client Penetration Testing Modern Approaches and Techniques.pdf
 
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
Aricent Highly Automated Vulnerability Assessment Orchestration Containers (H...
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
 
Telecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenTelecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGen
 

Getting the Most Value from VM and Compliance Programs white paper

  • 1. WHITE PAPERCONFIDENCE: SECURED ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE GETTING THE MOST VALUE FROM VULNERABILITY MANAGEMENT AND COMPLIANCE PROGRAMS
  • 2. As a CISO/CSO/VP of Security, anticipating these obstacles and planning how to deal with them will determine whether or not your VM or compliance program will meet the expectations set by your enterprise. We discuss several solutions to the most common problems encountered before, during, and after the initial deployment of your VM or compliance solution. Careful consider- ation of these items will help to make your VM and compliance program more effective. REVISIT YOUR PROGRAM GOALS Your VM or compliance program is well underway—you’ve installed the technol- ogy, trained your staff, and are even generating some reports and metrics. But the pace of your deployment has slowed down. It’s now time to review the reasons you implemented a VM or com- pliance solution in the first place. Are you seeing the results you anticipated? An ideal VM or compliance program should: »»Scan all of your assets at a frequency that allows rapid detection of new vulnerabilities, rogue devices, and compliance violations, based on the criticality of those assets to your business; »»Have no impact on production operations; »»Have content that is continu- ously updated as new vulnerability checks and compliance coverage are developed; »»Provide actionable reporting across all organizational levels and groups; »»Be fully integrated with remediation and verification processes and work- flows to enforce accountability within the program; and »»Provide accurate and objective measurements of risk across your enterprise and show reduction in risk over time. In short, your VM or compliance pro- gram must be viewed by executives, operations staff, and other stakeholders as the source of truth that measures the vulnerability and compliance posture of your entire organization, and a corner- stone of a unified security architecture that fully supports enterprise risk reduc- tion efforts. IT’S ABOUT REDUCING RISK The overall effectiveness of your VM or compliance program will be mea- sured primarily by the reduction of risk within your organization. Because risk is inherently intangible and not absolutely quantifiable (until after an incident occurs), it is a complex and difficult metric to calculate. Effective measurement of risk must bring together several components, including the adequacy and frequency of vulner- ability or compliance scanning, quality and timeliness of reporting and the effectiveness of followup remediation and verification actions suggested by the output of the VM/compliance tools and processes. Large organizations with complex IT departments commonly experience inconsistencies or gaps within these components and associated data reconciliation problems, making the per- formance of risk reduction efforts even more difficult to evaluate. CONSIDER YOUR SCANNING REGIMEN: COVERAGE, FREQUENCY AND DEPTH From a coverage perspective, are you scanning everything you should be and at the appropriate frequency? Remember, your network is only as secure and compliant as the least secure asset on it. Enterprise VM and compliance solutions provide automated scanning, and many companies configure these solutions for continuous scanning of their entire enterprise. However, without a com- plete understanding of all the networks within your enterprise you might not be scanning all known assets, let alone discovering new ones. Integrating your VM and compliance tool with a robust and reliable asset management system— ideally through automated means—will help to ensure you are scanning all the networks and assets in your enterprise. Many organizations lack asset manage- ment systems that can provide a reliable OVERVIEW Enterprise Vulnerability Management (VM) and compliance programs reach their full potential when they are built on well-established foundational goals that address the information needs of all stakeholders, and tie their output back to these enterprise goals. Today’s enterprise-class, state-of- the-art VM and configuration auditing solutions may well be up to the task of supporting these programs, but technology is only one essential ingredient. Effective programs are also supported by robust workflow processes that cross organizational boundaries to implement a “closed- loop” model that spans from detection to remediation. Overcoming typical obstacles such as organizational resistance, incomplete coverage of your network and gaps in measurement are keys to program success. 2 Getting the Most Value From Vulnerability Management and Compliance Programs
  • 3. source of configuration data for the VM or compliance solution. In these cases, router and firewall configuration files or the network engineering group can provide a comprehensive list of networks to be scanned to assess their vulner- ability or compliance posture. Be aware that in some cases, network devices may block scan traffic to connected endpoints, resulting in interrupted scans that contain incomplete vulnerability and compliance information for filtered endpoints. Discovery of new or transient assets beyond just servers and laptops is most effectively supported using a solu- tion based on agentless technology. Periodic reviews of scan results might reveal seemingly empty networks or networks comprising hosts without any reported vulnerabilities or compliance issues. These are likely indicators of filtering, either at the network or host level. While firewalls are an important component of defense-in-depth secu- rity, they should not be configured to interfere with legitimate security or com- pliance evaluations. A vulnerability or compliance issue that has been blocked from detection by your VM or compli- ance solution still exists and presents undesirable risk to an organization. Frequency of scanning is another impor- tant aspect to consider when measuring the effectiveness of your program. Configuring your VM or compliance tool to scan a network once a year is less effective than performing daily or weekly scans, and can result in delayed detection of important vulnerabilities or compliance issues. With most automated tools, updating the solution to include results of the most recent vulnerability and compliance checks is critical. Without a consistent update process, the technology will not be able to detect the latest vulnerabilities or compliance issues. From a quality assurance perspective, these updates should be treated much like antivirus signature file updates in that they should be tested prior to being used on critical produc- tion networks and systems. Depth of scanning refers to whether or not you are performing authenticated scans, i.e. using credentials to access the internal configuration of systems on your network. While authenticated scanning is the norm in compliance and configuration auditing, many VM programs have not yet progressed to this stage. Unauthenticated vulnerability checks are generally not intrusive. In the unlikely event that such scans disrupt production services, this should be logged as a vulnerability on the affected system. After all, any device or malicious user who sends identical traffic would have the same undesirable effect on the affected systems. Anomalous or unan- ticipated network traffic should never be allowed to have a deleterious impact on any system. However, the difference between non-authenticated vs. authenticated vulnerability scans can be likened to the difference between your doctor making a diagnosis merely based on external observations of symptoms vs. perform- ing a diagnostic test such as an MRI or CT scan. Scanning with credentials is necessary to identify all the vulner- abilities present on a system. When you first activate authenticated scanning, be aware that your VM solution will pres- ent you with significant amounts of new information (including vulnerabilities). This can be overwhelming for your secu- rity team, and certainly discouraging for individuals responsible for remediating the vulnerabilities on affected systems. Take appropriate steps to work with pro- gram stakeholders to help them prioritize remediation efforts. ADDRESS SPECIFIC INFORMATION AND REPORTING NEEDS OF STAKEHOLDERS Audience-specific reporting is criti- cal to the continued success of VM and compliance programs and their effectiveness as a key part of your organization’s overall risk management strategy. There are multiple consumers of vulnerability and compliance HOSTNAME SCORE NUMBER OF VULNERABILITIES OLDMAIL.EXAMPLE.COM 402,487 16 SQL72-OLD.EXAMPLE.COM 363,889 12 HMI4.OPS.EXAMPLE.COM 318,050 14 LAPTOP34.CLIENTS.EXAMPLE.COM 226,538 8 DEV82.EXAMPLE.COM 192,416 8 LEGACYDEV.EXAMPLE.COM 185,598 10 GUEST734.EXAMPLE.COM 136,283 6 FINANACE23.EXAMPLE.COM 111,320 12 CARDREADER-TAMPA.EXAMPLE.COM 103,208 2 WIN2K.EXAMPLE.COM 9,190 14 TOP 10 VULNERABLE HOSTS (POINT IN TIME) uu FIG 1: Interactive Reports Help Prioritize Remediation for Operations Staff 3Getting the Most Value From Vulnerability Management and Compliance Programs
  • 4. reports, from security and operations practitioners responsible for reme- diation of any findings to executives and even your Board of Directors. Each group will likely require differ- ent information, and it is important that each type of report provides meaningful, actionable data to its target audience. Your program should provide targeted and actionable information to stakeholders at the fre- quency they demand. Security and operations staff need access to the technical details of the vulnerabilities and compliance find- ings for which they are responsible to remediate. They will generally need this information in a format that allows correlation by system, system type, and vulnerability—this is where automated, interactive reports are beneficial. With detailed vulnerability or compliance information at hand, security and operations can prioritize remediation and then get timely feed- back and objective verification of their efforts. Security managers generally require more analytic reports that summarize the state of vulnerabilities or compli- ance posture across classes of systems or networks. For instance, a manager might want to compare the set of vulnerabilities in the San Francisco office with the set of vulnerabilities in the Toronto and Munich offices to determine whether or not remediation efforts are being performed consistent- ly across the organization. It may also be useful to compare the compliance posture of UNIX servers to Windows counterparts, to see which systems are being patched in a more timely manner. Finally, a manager might want to look at the vulnerability scores of the entire organization over time in order to determine the overall effectiveness of the configuration and patch management programs. For executives and board members, simpler reports summarizing the state of the VM or compliance program expressed as a risk or program matu- rity metric are beneficial and are often included as part of an overall security or IT briefing. When included in other business operations reports, this information must be high level and provide at-a-glance understanding of the overall risk and compliance pos- ture. In addition to providing a quick answer to the question, “How secure and compliant are we?” the accuracy of the information must be unassail- able in the event questions arise. “Traffic-light” reporting (where the overall posture is given a red, yellow, or green rating) is common, but this simple signal should be accompanied by high-level summary or component metrics, especially showing change in risk or compliance posture over time. For example, the overall status of the program, represented by a single color, could comprise underlying coverage, reporting, and remediation metrics, each of which contribute to the overall rating. A more comprehensive way to rep- resent the effectiveness of your VM and compliance program is to use a capability maturity model (e.g. such as the SEI CMM). For VM and compliance programs, six key metrics can be used to assess effectiveness. We have already discussed scanning regimen, and three of the metrics refer to that—coverage, frequency, and depth. The next three metrics are reporting, remediation and currency. While the scanning regimen metrics can be easily derived from your VM or compliance solution, the others can be more subjective and will require alternative and possibly more manual methods of measurement, e.g., a simple 1-5 scale that answers the fol- lowing key questions for each metric: »»How timely, targeted, and relevant is the information you are providing to your stakeholders? »»Are VM and compliance find- ings being remediated in a timely fashion? »»How current is your VM and com- pliance solution with respect to software releases and content? A spider graph is an effective visual tool to indicate how well your pro- gram is performing on each of these six key metrics, and can also be used to track improvements over time. uu FIG 2: Analytic Reports Show Vulner­ability Management or Compliance Posture Across the Enterprise 4 Getting the Most Value From Vulnerability Management and Compliance Programs
  • 5. Report generation needs to be auto- mated. This saves valuable time and effort, and results in more objective reports with greater accuracy. Of course, reports must be reviewed prior to distribution, to ensure accuracy and anticipate any questions that might ensue, especially from management and executives. A small incremental investment in developing, deploying, and enhancing automated reporting will provide significant return in terms of building increased credibility and lowering the overall cost of your VM and compliance program. BREAK DOWN ORGANIZATIONAL BARRIERS Not everyone in your organiza- tion will be ardent supporters of an enterprise VM or compliance program. Operations teams may view the remediation instructions output from the VM or compliance tool as an inconvenient increase in their already heavy workload. Staff reluctance to support program efforts can manifest itself in various ways, including refusal to allow scanning on networks they “own,” limiting scan coverage or blocking scan traffic at network perimeters and endpoints or complaining about service disruption from scanning—these are all common reactions from groups that may be unconvinced of the value a VM or compliance program can bring to their part of the organization. Adopting some or all of the following strategies may mitigate some concerns: 1. Engage the network operations and engineering teams in designing the VM or compliance solution, in particular to address concerns about the impact of scanning on the network. Today’s local-area net- works provide more than sufficient bandwidth to support continuous scanning using most automated VM and compliance tools. For low- bandwidth or high latency wide-area networks, the solution needs to be configurable to avoid interference with other network traffic by limit- ing the speed and/or frequency of scans. 2. Immediately after initial deploy- ment, establish an on-call team (with representation from the Security and IT Operations teams) to provide first-level response to any suspected disruption to operations from scanning. This team should be available around the clock, even when scanning is not active. Problems may not be immediately detected after a scan, and then may require some time to troubleshoot, especially to provide the necessary evidence and assurance that the root cause of the problem isn’t due to scanning. 3. As you expand your deployment, define the standard set of VM and compliance reports you’ll provide to each constituent group partici- pating in the program, as well as consistent and measurable processes for scanning, detection, report- ing, remediation, verification and handling of exceptions and waiv- ers. Enlist sponsorship from your organization’s top-level executives as you introduce and roll out the program to each constituent group, and be prepared in advance to deal with their potential objections. The role and profile of the security team within the organization and your corporate culture will deter- mine whether a “carrot” or “stick” approach will work best. 4. As each successive group is deployed, give the respective operations teams direct access to the output. Allow them to view results of scans against their own assets directly (partitioning the data as appropriate). Provide a formal mechanism for feedback and ques- tions relating to scans, and provide a method to determine the status of the automated scans at any time. This will allow the teams to eliminate scans as the source of any operational issues. Provide enough specifics to permit them to evaluate the VM and compliance solution as the cause of an anomaly, unlikely as that might be. 5. Give the operations teams reports that show the effect of their reme- diation efforts. Ideally, these reports will be available to them on demand through a self-service portal. Allow them to compare their results to others, and to measure progress over time. 6. Ensure that recognition for vulner- ability reduction and improvement in compliance is shared with the uu FIG 3: Simplified Reporting Provides a Quick Snapshot of Overall Program Effectiveness for Executives 5Getting the Most Value From Vulnerability Management and Compliance Programs
  • 6. EQUIP AND SUPPORT YOUR SECURITY TEAM Your security team might itself pres- ent an impediment to achieving full maturity of your VM and compli- ance program. Does your team have the right skills and are there enough people to do the job? Security teams often underestimate the effort needed to maintain the VM or compliance solution so it stays aligned with changes in the network configura- tion, regulatory policy, or internal IT change management procedures, which can slow progress towards full implementation. Following are some recommended practices for you and your team to adopt to improve the effectiveness of your VM or compliance program: 1. Ensure adequate resources are assigned to deploy and maintain the solution. Hardware occasion- ally needs replacement, software needs updating and changes in the network design require adjustments to the configuration of the tool. In addition, new vulnerability or com- pliance checks require updates. 2. Ensure that staff members who perform scans and prepare reports are fully trained in the tool’s use. For example, introducing new vulnerability or compliance checks often causes a spike in the reported number of vulnerable or non-com- pliant systems. These spikes may skew trending reports, and without proper context stakeholders could misconstrue that the organization has taken a step backwards in terms of its risk reduction efforts. 3. Position your team as “security analysts” who can advise program stakeholders on severity of vulner- abilities or compliance issues, assist in prioritizing remediation efforts and research additional informa- tion when asked. This will increase the team’s overall job satisfaction and contribute to raising the pro- file of your program within the organization. 4. Form a productive working relation- ship with your solution vendor to raise requests for new features and to report and resolve false positive conditions, which can and do occur. 5. Develop analysis and training pro- grams so that personnel responsible for gathering and analyzing data from the VM and compliance tools do so in a consistent, repeatable, and correct manner. REALIZE EVEN GREATER VALUE The most effective VM and compli- ance programs are characterized by continuous improvement, so that increases in capability and functional- ity are part of a program’s natural evolution, and not just a one-off effort. Examples of these natural progressions include integrating additional data sources with the existing VM or com- pliance solution and using the data to provide reports that influence business decisions: 1. Adding asset management data per- mits correlation of system age and other system attributes with overall organizational risk. Older machines are more difficult (and more expen- sive) to maintain and keep secure. 2. Tying business function to specific systems can provide business units an easy way to monitor their overall vulnerability or compliance risk, making it easier to justify and pri- oritize investments in IT security. 3. Providing multiple views of vulner- ability and compliance exposure through strategic placement and configuration of scanning devices will enable fine-grained examina- tion of risk which would help in incident response planning as well as prioritization of remediation. 4. Tying DHCP leases to the VM tool via API calls can provide a “scan on connect” service that will automati- cally scan new devices. Passing the results of the scan to a network management system can provide an enhanced form of network access control, where systems with specific vulnerabilities can be quarantined until they are remediated. TIE OUTPUT TO PROGRAM GOALS Once your organization is comfortable with automated and continuous VM and compliance scans and understands the value of the information in the reports, you will be ready to extend your program to support establish- ment and measurement of performance goals. Remember that one of the primary goals of a VM or compliance operations teams who are remediat- ing the vulnerabilities or compliance issues. 7. Provide a method for operations teams to voice concerns and report suspected issues with vulnerability and compliance scanning (e.g., false positives). 6 Getting the Most Value From Vulnerability Management and Compliance Programs
  • 7. program is to measure the risk of vulnerabilities and misconfigurations within a set of systems. When the pro- gram is providing accurate, actionable data that is being used by operations and security staff to guide remediation activity, you can begin to use the tools and processes in security planning. By creating time-based trend reports using the metrics established through your program, you can set risk reduction goals and track progress towards their achievement. TAKE YOUR PROGRAM TO THE NEXT LEVEL The most effective VM and compli- ance programs continuously adapt to remain fully aligned with risk reduction goals that evolve over time, whether due to regulatory changes, M&A activity, new threats, or other factors. Adopting a deployment meth- odology that incorporates continuous program improvement will enable your organization to improve security and reduce risk through more rapid and accurate identification and remedia- tion of vulnerabilities and compliance findings in critical systems. uu ABOUT THE AUTHOR Seth Bromberger is principal of NCI Security LLC, (www. ncisecurity.com), a full-service consulting firm that offers relevant, best-in-class security management services to government, vendors, and critical infrastructure owners/ operators. 7Getting the Most Value From Vulnerability Management and Compliance Programs
  • 8. u Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service provid- ers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context, and enable security auto- mation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence. Learn more at tripwire.com. u SECURITY NEWS, TRENDS AND INSIGHTS AT TRIPWIRE.COM/BLOG u FOLLOW US @TRIPWIREINC ON TWITTER ©2014 Tripwire, Inc. Tripwire is a registered trademark of Tripwire, Inc. All other product and company names are property of their respective owners. All rights reserved. WPVMPCP1a 201307