<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>vulnerability management - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/vulnerability-management/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/vulnerability-management/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Tue, 09 Feb 2021 18:26:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>vulnerability management - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/vulnerability-management/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hackuity &#124; Shake&#8217;Up &#8211; The future of vulnerability management: towards new approaches based on risk and prioritization (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shakeup-the-future-of-vulnerability-management-towards-new-approaches-based-on-risk-and-prioritization-2-2/</link>
		
		<dc:creator><![CDATA[Patrick Ragaru]]></dc:creator>
		<pubDate>Mon, 15 Feb 2021 07:00:24 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[hackuity]]></category>
		<category><![CDATA[prioritization]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[shake'up]]></category>
		<category><![CDATA[Vulnerabilities]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15143</guid>

					<description><![CDATA[<p>We have recently opened the contributions to this blog to start-ups accelerated by our Shake&#8217;Up project. Hackuity rethinks vulnerability management with a platform that collects, standardizes and orchestrates automated and manual security assessment practices and enriches them with Cyber Threat...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shakeup-the-future-of-vulnerability-management-towards-new-approaches-based-on-risk-and-prioritization-2-2/">Hackuity | Shake&#8217;Up &#8211; The future of vulnerability management: towards new approaches based on risk and prioritization (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>We have recently opened the contributions to this blog to start-ups accelerated by our Shake&#8217;Up project. Hackuity rethinks vulnerability management with a platform that collects, standardizes and orchestrates automated and manual security assessment practices and enriches them with Cyber Threat Intelligence data sources, technical context elements and business impacts. Hackuity enables you to leverage your existing vulnerability detection arsenal, to prioritize the most important vulnerabilities, to save time on low-value tasks and reduce remediation costs, to gain access to a comprehensive and continuous view of the company&#8217;s security posture, and to meet compliance obligations.</em></p>
<p><em>After having seen in a first article the state of the threat and the current issues related to vulnerability management, we will see in this second article the new approaches to be considered to better manage vulnerabilities, in particular through the prioritization of vulnerability remediation proposed by Hackuity.</em></p>
<p>&nbsp;</p>
<h2>The advent of Risk-Based Vulnerability Management (RBVM)</h2>
<p>Risk Based Vulnerability Management (RBVM) is an approach that treats each vulnerability according to the risk it represents for each company.</p>
<p>In this context, the classic formula for calculating a risk applies:</p>
<p>&nbsp;</p>
<figure id="post-15089 media-15089" class="align-none"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-15089" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3.1.png" alt="" width="943" height="57" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3.1.png 943w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3.1-437x26.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3.1-71x4.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3.1-768x46.png 768w" sizes="(max-width: 943px) 100vw, 943px" /></figure>
<p>&nbsp;</p>
<p>The first part of the formula, vulnerability × threat, can also be considered as a probability. This probability describes the chances that a given vulnerability will be discovered and used by a threat actor in the specific technical context of the organization.The last part of the formula describes the consequences, or impact, of a successful attack by a threat actor in the company&#8217;s business context.</p>
<p>This is in synthesis the approach adopted by CVSS, a standard developed by FIRST (Forum of Incident Response and Security Teams), initially to quantify the technical severity of a vulnerability. Through 3 metrics (basic, temporal, environmental), the full CVSS score (now in its version 3.1) is supposed to reflect the real risk of each vulnerability, in the context of each company.</p>
<p>&nbsp;</p>
<figure id="post-15091 media-15091" class="align-none"><img decoding="async" class="wp-image-15091 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-5.png" alt="" width="721" height="275" /></figure>
<p style="text-align: center;">Source: FIRST (<a href="https://www.first.org/cvss/specification-document">https://www.first.org/cvss/specification-document</a>)</p>
<p>&nbsp;</p>
<p>Our purpose here is not to describe CVSS, so we assume that the reader is familiar with the concept. The CVSS score has <strong>many advantages</strong>, among the main ones:</p>
<ul>
<li>The only standard on the market available to quantify the criticality of a vulnerability,</li>
<li>A detailed and transparent algorithm,</li>
<li>A scoring widely adopted by the industry,</li>
<li>Several world-wide reference databases available (in particular to qualify the criticality of CVE).</li>
</ul>
<p>However, it has many limitations, the main ones of which can be listed here:</p>
<ol>
<li><span style="text-decoration: underline;">Its low granularity:</span> each of the metrics is composed of categorical values with predetermined values (e.g., low, medium, high) which limits its discrimination capabilities.</li>
<li><span style="text-decoration: underline;">Its vocation to unitarily qualify vulnerabilities:</span> it is thus impossible to evaluate the criticality of a complete attack scenario with CVSS. For example, some cyber-attacks exploit several low vulnerabilities to compromise an entire perimeter. However, the CVSS assessment will only cover each of the vulnerabilities independently; it is necessary for the auditor to present a global scenario to highlight the overall risk, and they cannot rely solely on CVSS to do so since it was not designed to be aggregated.</li>
<li><span style="text-decoration: underline;">Its arbitrary nature:</span> the weights in the algorithm sometimes seem to be composed of <span style="text-decoration: underline;">arbitrary figures</span> making the interpretation of these values complex. In the end, there is sometimes a significant margin of error in the CVSS quantification of the same vulnerability by two professionals.</li>
</ol>
<p>On the other hand, should it be reminded, the public CVSS scores, such as those referenced in the NVD, are only <strong>base scores</strong>. They represent the intrinsic criticality of a vulnerability, but do not reflect the risk that this vulnerability represents for the company. In other words, they answer the question “Is it dangerous?” but not “Is it dangerous for my company right now?”.</p>
<p>Effective vulnerability management must take into account not only the base score, but also temporal and environmental metrics. The FIRST provides the framework, but the NIST cannot compute the CVSS score for the enterprise, as it requires knowledge of the criticality of the assets, identification of controls in place, the exploitability of the vulnerability in this specific context, or the intensity of the actual and current threat.</p>
<p>In the field, however, we note that nearly 45% of the companies surveyed &#8211; of all sizes &#8211; only use the CVSS base score as the sole metric for quantifying the criticality of vulnerabilities.</p>
<p>Beyond the relevance of this approach, the use of this single metric does not solve the major problem of the industry, which remains the <strong>volume of vulnerabilities to be addressed.</strong></p>
<p>&nbsp;</p>
<figure id="post-15093 media-15093" class="align-none"><img decoding="async" class=" wp-image-15093 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-6.png" alt="" width="635" height="413" /></figure>
<p>&nbsp;</p>
<p>Of the 123,454 vulnerabilities (CVE) identified as of 01/15/2020, more than 16K had a CVSS base score (V2.0) deemed critical (i.e., more than 13% of the total).</p>
<p>&nbsp;</p>
<h2>Beyond CVSS ?</h2>
<p>The objective of prioritization is therefore to reduce the stock of vulnerabilities by discriminating the most critical in order to allow the teams and means of remediation to focus on the vulnerabilities that matter the most.</p>
<p>&nbsp;</p>
<figure id="post-15106 media-15106" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15106 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-7.png" alt="" width="1337" height="309" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-7.png 1337w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-7-437x101.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-7-71x16.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-7-768x177.png 768w" sizes="auto, (max-width: 1337px) 100vw, 1337px" /></figure>
<p>&nbsp;</p>
<p>On the other hand, there is no doubt that the daily flood of new vulnerabilities brought up by the detection arsenal <strong>can no longer be managed manually</strong>. It is totally unrealistic to manually examine, analyze and prioritize all identified vulnerabilities.</p>
<p><strong>Automation</strong> should enable teams to work more efficiently, reducing repetitive and/or low value-added manual tasks and processes.</p>
<p>To meet these needs and respond to the limitations of CVSS, the RBVM players are introducing:</p>
<ul>
<li>New risk metrics (scores) &#8211; proprietary &#8211; that complete, overload or replace CVSS,</li>
<li>Automation of analysis and measurement tasks, including correlation with threat sources (CTI) to continuously qualify the threat intensity associated with each vulnerability.</li>
</ul>
<p>More generally, the RBVM approach takes into account numerous evaluation metrics to establish a score based on context and threat. There seems to be a consensus on 4 main categories of criteria:</p>
<h3>1/ The vulnerability or the individual &#8211; intrinsic &#8211; characteristics of the vulnerability itself.</h3>
<p>Through these criteria, the aim is to measure the severity of a vulnerability by taking into account metrics that are constant over time and regardless of the environment, such as the privileges required to exploit the vulnerability or its attack vector (remotely, on the same local network, with physical access, etc.).</p>
<p>For this category, the CVSS base score (generally taken in its version 2.0 to ensure anteriority) is a solid starting point for analyzing the intrinsic criticality of the vulnerability. This is the score used by most solutions on the market.</p>
<h3>2/ The external threats that will be used to quantify the current intensity of the threat associated with each vulnerability.</h3>
<p>The metrics used reflect characteristics that may change over time but not from one technical environment to another.</p>
<p>“Is the vulnerability associated with hot topics on discussion forums, the darknet and social networks? Does it have an exploitation mechanism been published or is it currently being exploited by a particularly virulent ransomware?”</p>
<p>The availability of an “exploit” associated with a vulnerability is, for example, an important factor taken up by most risk-based vulnerability management solutions. According to a Tenable Research study, <strong>76% of vulnerabilities with a CVSS baseline score &gt; 7 do not have an exploit available.</strong></p>
<p>&nbsp;</p>
<figure id="post-15108 media-15108" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-15108 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-8.png" alt="" width="728" height="310" /></figure>
<p style="text-align: center;">Source: (<a href="https://fr.tenable.com/research">https://fr.tenable.com/research</a>)</p>
<p>&nbsp;</p>
<p>This means that companies that are focusing on fixing all their vulnerabilities with a “high” or “critical” risk according to CVSS would spend three thirds of their time filling in holes that ultimately represent little risk. For better operational efficiency, it is therefore appropriate to focus remediation efforts on vulnerabilities for which an exploit has already been released.</p>
<p>&nbsp;</p>
<figure id="post-15110 media-15110" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-15110 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-9.png" alt="" width="852" height="358" /></figure>
<p>&nbsp;</p>
<p>But this is far from being the only relevant criteria. Without known exploit, the age of the vulnerability can be taken into account to compute its probability of exploitation, using a statistical approach based on the occurrences of exploitation measured. Some initiatives such as EPSS (Exploit Prediction Scoring System<a href="#_ftn1" name="_ftnref1">[1]</a> ) even try to predict the “weaponization” of vulnerabilities.</p>
<p>Like the age of the vulnerability, the age of the exploit is also a factor that will highly influence the probability of exploitation. For example, the CVE exploitation rate skyrockets as soon as an exploit is published, and then progressively decreases.</p>
<p>More generally, the threat intensity is an important metric in the prioritization algorithm. Beyond statistical approaches, it can be measured by monitoring CTI sources, social networks or various publications, such as quantifying the number of occurrences of these vulnerabilities in cybercriminal forum discussions. It will thus be possible to determine that a new or particularly active malware exploits a vulnerability and therefore to increase its criticality score.</p>
<p>Many other indicators can be integrated to refine the relevance of vulnerability prioritization. The Hackuity solution takes into account more than 10 criteria in addition to the CVSS metrics to compute its “True Risk Score”:</p>
<p>&nbsp;</p>
<figure id="post-15112 media-15112" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15112 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-10.png" alt="" width="1310" height="629" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-10.png 1310w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-10-398x191.png 398w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-10-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-10-768x369.png 768w" sizes="auto, (max-width: 1310px) 100vw, 1310px" /></figure>
<p>&nbsp;</p>
<p>In addition to the relevance of the choice of these criteria and the algorithm itself, the type and quality of the CTI sources monitored to continuously feed these metrics represent an important issue.</p>
<p>Some of the sources used include the numerous open sources (OSINT) on vulnerabilities and threats (NIST-NVD, Exploit-db, Metasploit, Vuldb, PacketStorm, &#8230;), some of which are consolidated through open-source initiatives such as VIA4CVE (<a href="https://github.com/cve-search/VIA4CVE">https://github.com/cve-search/VIA4CVE</a>).</p>
<p>There are also a large number of private and commercial players offering CTI feeds with virous levels of specialization in vulnerability intelligence.</p>
<h3>3/ The technical context or the unique characteristics of the environment in which the asset is located.</h3>
<p>This category is used to measure the probability / difficulty to exploit a vulnerability in the specific context of each organization.</p>
<p>“Is the asset exposed on the Internet or hidden somewhere in the company&#8217;s datacenter? What are the technical measures (protection, detection) that make it more or less vulnerable to attacks?”</p>
<p>If some market actors just determine that an asset is exposed on the Internet based on its IP addressing scheme, others like Hackuity will seek to measure the depth of the attack trees needed to exploit the vulnerability in the company&#8217;s IS.</p>
<p>These characteristics are by definition specific to each environment. It is therefore necessary to have, take from, or determine such information, in particular by feeding the prioritization formula with contextual data linked to the assets. For example, the data may exist and therefore be extracted from internal repositories.</p>
<h3>4/ The business criticality of the asset.</h3>
<p>This involves measuring the consequences, or impact, of a successful attack by a threat player in the business context of the company.</p>
<p>“Is the asset impacted by the vulnerability critical to the organization in one way or another? Does it host sensitive or nominative information? What are the impacts for the company in terms of financial, reputation or compliance if the vulnerability is exploited?”</p>
<p>As much as for the technical context, these characteristics are specific to each environment. They may be manually entered or derived from risk analysis results such as Business Impact Analyses.</p>
<p>To conclude on RBVM, whatever the degree of automation brought by the Solution, it will only take its full strength with the contribution of contextual elements that the tool cannot guess (business impacts, technical environment of the assets, organization, processes, etc.).</p>
<p>&nbsp;</p>
<h2>Beyond RBVM: Vulnerability Prioritization Technologies (VPTs)</h2>
<p>While the major market leaders in vulnerability detection have adopted a risk-based approach to Vulnerability Management, they have not addressed the main problem associated with the “best-of-breed” approach to detection: companies use multiple detection tools and practices to ensure complete and effective coverage of their technical perimeter.</p>
<p>&nbsp;</p>
<figure id="post-15114 media-15114" class="align-none"><img loading="lazy" decoding="async" class="wp-image-15114 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-11.png" alt="" width="746" height="270" /></figure>
<p style="text-align: center;">Average number of detection tools by company size / Hackuity &#8211; Panel of 93 companies</p>
<p>&nbsp;</p>
<p>As mentioned above, this necessary use to a heterogeneous arsenal promotes a fragmented and unconsolidated view of the situation, which limits the ability to scale and, with the growing volume of vulnerabilities, leads to an explosion of costs.</p>
<p>To address this problem, emerging market players named VPTs (Vulnerability Prioritization Technologies) by Gartner, such as Hackuity, agnostically exploit existing sources of vulnerability.</p>
<p>They collect and centralize vulnerabilities from any company&#8217;s detection arsenal: multiple practices (pentest, bug-bounty, red team, etc.), vulnerability detection solution providers (vulnerability scans, SAST, DAST, IAST, SCA, etc.) and vulnerability watch feeds. The main features of VPT solutions are described below.</p>
<p>&nbsp;</p>
<figure id="post-15116 media-15116" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15116 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-12.png" alt="" width="1298" height="384" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-12.png 1298w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-12-437x129.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-12-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-12-768x227.png 768w" sizes="auto, (max-width: 1298px) 100vw, 1298px" /></figure>
<p style="text-align: center;">Functional diagram of the Hackuity solution</p>
<p>&nbsp;</p>
<h3>A comprehensive view of the state of the stock of vulnerabilities</h3>
<p>Automating the collection of vulnerabilities enables security teams to have, sometimes for the first time, a consolidated and centralized view of the company&#8217;s stock of vulnerabilities, regardless of the solutions or detection practices implemented.</p>
<p>A crucial operation &#8211; and one that is very rarely performed &#8211; is the conversion of proprietary formats into a normalized format. This allows clones of the same vulnerability, which have been identified by several sources, to de deduplicated (e.g. the same SQL injection identified during an intrusion test and during a vulnerability scan).</p>
<p>As such, Hackuity&#8217;s vulnerability’s meta-repository is a multilingual knowledge base that provides a unified and standardized description of all vulnerabilities, including corrective actions, patches, remediation costs, or exploitability, with no loss of information from the original source.</p>
<h3>The establishment and enrichment of an inventory of assets</h3>
<p>In the field, there are only rare exceptions of companies that have an inventory of their assets that is considered complete or at least reliable (CMDB, ITAM, &#8230;). This is an endemic problem in the practice and sometimes the main obstacle to the implementation of an efficient vulnerability management policy in companies. In order to solve this problem, some solutions integrate into their operations the <strong>dynamic and continuous establishment of the repository of the company&#8217;s assets</strong> inventory. This inventory is established by analyzing and correlating the technical data collected (e.g. the software stack installed on a server, its various aliases, etc.) and provides an asset database that is continuously kept up to date with data from multiple sources.</p>
<p>Asset criticality is also a key element in the vulnerability risk measurement process and accounts for nearly 50% in a prioritization approach. Without an accurate inventory of assets and an assessment of their criticality in the company&#8217;s business environment, it is impossible to accurately compute the real risk associated with each vulnerability. Some solutions, such as Hackuity, will compensate for the absence or non-completeness of risk analyses by <strong>automatically assessing the criticality of assets</strong> based on their technical and operational properties (types and families of tools installed, density of interconnections, hosted databases, etc.).</p>
<p><strong>In the end, to have consolidated information about vulnerabilities or the company’s assets, you no longer need to master dozens of tools or formats: the cost and workload associated with managing disparate tools is significantly reduced.</strong></p>
<h3>The missing link between detection and remediation of vulnerabilities</h3>
<p>Finally, the bidirectional link with the teams in charge of remediation or security supervision provides a collaborative approach in managing the stock of vulnerabilities.</p>
<p>Indeed, while automation has become a key lever for vulnerability management, the human factor remains at the heart of the process.</p>
<p>In most companies, Vulnerability Management involves 3 actors who must work together:</p>
<ol>
<li>The security teams in charge of operating the detection tools and managing remediation plans,</li>
<li>The business managers who arbitrate or clarify the remediation plans in the light of business constraints,</li>
<li>Operational staff in charge of deploying corrective measures (patch management, configuration, development, etc.).</li>
</ol>
<p>&nbsp;</p>
<p>&nbsp;</p>
<figure id="post-15118 media-15118" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15118 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-13.png" alt="" width="1336" height="579" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-13.png 1336w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-13-437x189.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-13-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-13-768x333.png 768w" sizes="auto, (max-width: 1336px) 100vw, 1336px" /></figure>
<p>&nbsp;</p>
<p>The efficiency of the process is therefore not limited to the automation of vulnerability collection. In the downstream part of the process (remediation management), play-books can be used to mobilize the resources needed to implement corrective measures: identification of the person in charge of the task, automatic creation of incident tickets, generation of scripts for Infrastructure as Code solutions, etc.</p>
<p>Upstream, the CISO finally has, and often for the first time, a real-time perception of the progress of remediation plans.</p>
<p>The vulnerability management solution is then the <strong>orchestrator of the ecosystem</strong> of solutions aiming at detecting, qualifying, correcting and monitoring vulnerabilities affecting the company.</p>
<p>&nbsp;</p>
<figure id="post-15120 media-15120" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-15120 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-14.png" alt="" width="792" height="511" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-14-295x191.png 295w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-14-60x39.png 60w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-14-768x497.png 768w" sizes="auto, (max-width: 792px) 100vw, 792px" /></figure>
<p>&nbsp;</p>
<p>Designed as an open system, it also allows third party tools and processes (SIEM, GRC, Compliance, Forensics, &#8230;) to be fed with consolidated and structured data on vulnerabilities, assets and threats affecting the business.</p>
<p>&nbsp;</p>
<h2>Conclusion</h2>
<p>As a true cornerstone of corporate cyber security, vulnerability management can finally be synonymous with a scalable, effective practice for which it is now possible to have factual indicators reflecting the efforts made by security teams and teams in charge of remediation.</p>
<p>Besides the direct impact on the company&#8217;s security posture, through a reduction in the vulnerability exploitation window, or even the mobilization of experts on high added-value tasks, the integration of a vulnerability management orchestration solution can also have indirect benefits, such as better understanding the information system thanks or even a tenfold increase in the commitment of the teams thanks to the quantification of the impact of their actions on the company&#8217;s security.</p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="https://arxiv.org/pdf/1908.04856.pdf">https://arxiv.org/pdf/1908.04856.pdf</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shakeup-the-future-of-vulnerability-management-towards-new-approaches-based-on-risk-and-prioritization-2-2/">Hackuity | Shake&#8217;Up &#8211; The future of vulnerability management: towards new approaches based on risk and prioritization (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Hackuity &#124; Shake&#8217;Up &#8211; The future of vulnerability management: threat status and current issues in vulnerability management (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shake-up-the-future-of-vulnerability-management-threat-status-and-current-issues-in-vulnerability-management-1-2/</link>
		
		<dc:creator><![CDATA[Patrick Ragaru]]></dc:creator>
		<pubDate>Wed, 10 Feb 2021 07:00:15 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Ethical Hacking & Incident Response]]></category>
		<category><![CDATA[#vulnerability]]></category>
		<category><![CDATA[hackuity]]></category>
		<category><![CDATA[patching]]></category>
		<category><![CDATA[shake'up]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[vulnerability management]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15135</guid>

					<description><![CDATA[<p>We have recently opened the contributions to this blog to start-ups accelerated by our Shake&#8217;Up project. Hackuity rethinks vulnerability management with a platform that collects, standardizes and orchestrates automated and manual security assessment practices and enriches them with Cyber Threat...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shake-up-the-future-of-vulnerability-management-threat-status-and-current-issues-in-vulnerability-management-1-2/">Hackuity | Shake&#8217;Up &#8211; The future of vulnerability management: threat status and current issues in vulnerability management (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>We have recently opened the contributions to this blog to start-ups accelerated by our Shake&#8217;Up project. Hackuity rethinks vulnerability management with a platform that collects, standardizes and orchestrates automated and manual security assessment practices and enriches them with Cyber Threat Intelligence data sources, technical context elements and business impacts. Hackuity enables you to leverage your existing vulnerability detection arsenal, to prioritize the most important vulnerabilities, to save time on low-value tasks and reduce remediation costs, to gain access to a comprehensive and continuous view of the company&#8217;s security posture, and to meet compliance obligations.</em></p>
<p>&nbsp;</p>
<h2>What are we talking about?</h2>
<p>ISO 27005 defines a <strong>vulnerability</strong> as “<em>a weakness of an asset or group of assets that can be exploited by one or more cyber threats where an asset is anything that has value to the organization, its business operations and their continuity, including information resources that support the organization&#8217;s mission</em>”. For the SANS Institute, <strong>vulnerability management</strong> is “<em>the process in which vulnerabilities in IT are identified and the risks of these vulnerabilities are evaluated. This evaluation leads to correcting the vulnerabilities and removing the risk or a formal risk acceptance by the management of an organization</em>”. Over time, Vulnerability Management has become a fundamental practice in cybersecurity, and now all industry professionals would agree to say that it is an essential process for minimizing the company&#8217;s attack surface.</p>
<p>&nbsp;</p>
<figure id="post-15081 media-15081" class="align-none"><img loading="lazy" decoding="async" class="wp-image-15081 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-1.jpg" alt="" width="675" height="571" /></figure>
<p style="text-align: center;">Source: <a href="https://blogs.gartner.com/augusto-barros/2019/10/25/new-vulnerability-management-guidance-framework/">https://blogs.gartner.com/augusto-barros/2019/10/25/new-vulnerability-management-guidance-framework/</a></p>
<p>&nbsp;</p>
<p>Nowadays, vulnerability management is integrated into all the major security frameworks, standards, sector regulations, guides and good security practices (ISO, PCI-DSS, GDPR, Basel agreements, French LPM, NIS, etc.) and is even regulatory in some contexts. Every “good” corporate security policy includes a significant chapter on this topic. Many would consider that a necessary evil.</p>
<p>&nbsp;</p>
<h2>Vulnérabilités : état de la menace</h2>
<p>However, in 2019, according to a study conducted by the Ponemon Institute<a href="#_ftn1" name="_ftnref1">[1]</a>, “<em>60% of security incidents were [still] the consequence of exploiting a vulnerability that is known but not yet corrected by companies”</em>. To illustrate the current extent of the phenomenon, let&#8217;s consider ransomwares, the main cyber threat of 2020 and probably 2021. Although ransomwares are generally spread through user-initiated actions, such as clicking on a malicious link in a spam or visiting a compromised website, a large proportion of ransomwares also exploits computer vulnerabilities. Thus, if we look at the top-5 most virulent 2020 ransomwares ranked by intel471<a href="#_ftn2" name="_ftnref1">[2]</a>, we can see that their “kill-chains” all exploit vulnerabilities (CVE).</p>
<table style="border-collapse: collapse; width: 100%; height: 868px;">
<tbody>
<tr style="height: 45px;">
<td style="width: 16.6667%; height: 45px; text-align: center;">Ransomware Name</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">First known occurrence</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">Known exploited CVE</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">CVE publication date</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">Patch / workaround</td>
<td style="width: 16.6667%; height: 45px; text-align: center;">CVSS V2.0 Score</td>
</tr>
<tr style="height: 211px;">
<td style="width: 16.6667%; height: 211px; text-align: center;" width="123">Maze(aka ChaCha)</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="123">05-2019</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="123">CVE-2018-15982CVE-2018-4878</p>
<p>CVE-2019-11510</p>
<p>CVE-2018-8174</p>
<p>CVE-2019-19781</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="113">18/01/201906/02/2018</p>
<p>08/05/2019</p>
<p>05/09/2018</p>
<p>27/12/2019</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="85">12-201802-2018</p>
<p>04-2019</p>
<p>08-2018</p>
<p>12-2019</td>
<td style="width: 16.6667%; height: 211px; text-align: center;" width="76">107.5</p>
<p>7.5</p>
<p>7.6</p>
<p>7.5</td>
</tr>
<tr style="height: 133px;">
<td style="width: 16.6667%; height: 133px; text-align: center;" width="123">REvil(aka Sodinokibi)</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="123">04-2019</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="123">CVE-2018-8453CVE-2019-11510</p>
<p>CVE-2019-2725</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="113">10/10/201808/05/2019</p>
<p>26/04/2019</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="85">10-201805-2019</p>
<p>04-2019</td>
<td style="width: 16.6667%; height: 133px; text-align: center;" width="76">7,27,5</p>
<p>7,5</td>
</tr>
<tr style="height: 173px;">
<td style="width: 16.6667%; height: 173px; text-align: center;" width="123">Netwalker</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="123">09-2019</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="123">CVE-2015-1701CVE-2017-0213</p>
<p>CVE-2020-0796</p>
<p>CVE-2019-1458</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="113">21/04/201512/05/2017</p>
<p>12/03/2020</p>
<p>10/12/2019</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="85">05-201505-2017</p>
<p>03-2020</p>
<p>12-2019</td>
<td style="width: 16.6667%; height: 173px; text-align: center;" width="76">7,21.9</p>
<p>7,5</p>
<p>7.2</td>
</tr>
<tr style="height: 212px;">
<td style="width: 16.6667%; height: 212px; text-align: center;" width="123">Ryuk</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="123">08-2018</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="123">CVE-2013-2618CVE-2017-6884</p>
<p>CVE-2018-8389</p>
<p>CVE-2018-12808</p>
<p>CVE-2020-1472</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="113">05/06/201406/04/2017</p>
<p>15/08/2018</p>
<p>29/08/2018</p>
<p>17/08/2020</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="85">*-201404-2017</p>
<p>08-2018</p>
<p>08-2018</p>
<p>08-2020</td>
<td style="width: 16.6667%; height: 212px; text-align: center;" width="76">4,39,0</p>
<p>7,6</p>
<p>7,5</p>
<p>9,3</td>
</tr>
<tr style="height: 94px;">
<td style="width: 16.6667%; height: 94px; text-align: center;" width="123">DopplePaymer</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="123">04-2019</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="123">CVE-2019-1978CVE-2019-19781</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="113">05/11/201927/12/2019</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="85">*-201901-2020</td>
<td style="width: 16.6667%; height: 94px; text-align: center;" width="76">5,07,5</td>
</tr>
</tbody>
</table>
<p style="text-align: center;">Source: Hackuity &amp; National Vulnerability Database (<a href="https://nvd.nist.gov/">https://nvd.nist.gov/</a>)</p>
<p>&nbsp;</p>
<p>It is worth noticing that such vulnerabilities have often been referenced by the NIST when the ransomware first appeared, sometimes for several years. Moreover, patches or workarounds have often been released in most cases. A recent CheckPoint<a href="#_ftn3" name="_ftnref1">[3]</a> study confirms that the <strong>oldest vulnerabilities are always the most exploited.</strong> In mid-2020, more than 80% of the cyberattacks identified used a vulnerability published before 2017 and more than 20% of these attacks even exploited a vulnerability that had been known for more than 7 years.</p>
<p>&nbsp;</p>
<figure id="post-15083 media-15083" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-15083 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-2.png" alt="" width="722" height="334" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-2.png 1196w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-2-413x191.png 413w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-2-71x33.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-2-768x355.png 768w" sizes="auto, (max-width: 722px) 100vw, 722px" /></figure>
<p>&nbsp;</p>
<p>This highlights the importance &#8211; even today &#8211; of rapid installation of security patch as a defense mechanism to minimize cyber risks. Therefore, it’s not surprising that Vulnerability Management &#8211; one of the oldest practices in cybersecurity &#8211; remains one of the major 2021 CISO challenges for Wavestone<a href="#_ftn4" name="_ftnref1">[4]</a>. Does this mean that we should try to correct all the vulnerabilities? Let&#8217;s go back in time.</p>
<p>&nbsp;</p>
<h2>« Vulnerability Assessment » vs. « Vulnerability Management »</h2>
<p>When they first appeared on the market at the end of the 1990s, the vulnerability management solutions worked similarly to an antivirus: the objective was to detect as many potential threats as possible. They were more commonly referred to as “vulnerability scanners”.</p>
<p>The volume of vulnerabilities then was relatively low compared to today. In 2000, the NVD identified about 1,000 new vulnerabilities over the year, compared to more than 18,000 in 2020.</p>
<p>A comprehensive and manual treatment of vulnerabilities was still possible at that time. Scanners provided a list of vulnerabilities, their relevance in the business context was analyzed by IT teams and a report was sent to business managers. Once the report was approved, administrators would fix the vulnerabilities and re-test to ensure that patches were properly implemented.</p>
<p>&nbsp;</p>
<figure id="post-15085 media-15085" class="align-none"><img loading="lazy" decoding="async" class=" wp-image-15085 aligncenter" src="http://riskinsight-prepro.s189758.zephyr32.atester.fr/wp-content/uploads/2021/02/Image-3.png" alt="" width="522" height="365" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3.png 832w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3-273x191.png 273w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3-56x39.png 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3-768x537.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/02/Image-3-245x170.png 245w" sizes="auto, (max-width: 522px) 100vw, 522px" /></figure>
<p style="text-align: center;">Source : National Vulnerability Database (<a href="https://nvd.nist.gov/">https://nvd.nist.gov/</a>)</p>
<p>&nbsp;</p>
<p>Over the next two decades, the number of discovered vulnerabilities has increased steadily at first, then started to skyrocket in 2017, a trend that is still continuing today. In 2020, a record of more than 18,000 new vulnerabilities were published by the NIST. But no, the code quality is not worse than ever! There are several reasons behind the growing number of vulnerabilities being disclosed:</p>
<ol>
<li>Innovation and the accelerated digitization of business lead to an increase in published hardware and software products. In 2010, the NIST recorded 22,188 new entries in its CPE repository, including 1,332 new products and 406 publishers. In 2020, 324,810 entries (+1,460 %), 35,794 new products (+2,690 %) and 6,060 publishers (+1,490%) have appeared in the repository.</li>
<li>Demand for faster time-to-market is driving vendors to shorten development cycles to release and sell products faster, even if it means saving on resources needed for quality assurance and security testing.</li>
<li>Cybercrime has become a lucrative business. A growing number of vulnerabilities are now attributed to cybercriminals seeking new tools to support their attacks.</li>
<li>At the same time, the number of experts and independent organizations involved in the research and disclosure of vulnerabilities is increasing. The democratization and industrialization of <a href="https://www.riskinsight-wavestone.com/en/2021/01/bug-bounty-insight-and-benchmark-on-the-banking-industry-2021/">Bug-Bounty programs</a> are not unrelated to this.</li>
<li>And finally, with rare exceptions such as GDPR, in the lack of adequate legislation and regulations to protect consumer rights in the event of software vulnerabilities, the industry has no incentive to invest in safer products nor take responsibility for the damage caused.</li>
</ol>
<p>However, <strong>the problem is not only the higher number of vulnerabilities identified in the NVD databases or other repositories.</strong> With the advent of ultra-mobility, home-office, cloud-computing, social media, IoT, but also the convergence between IT and OT, Information Systems have continued to become more complex and to expand, open up and multiply the number of their suppliers, &#8230;creating as many potential new entry points for cybercriminals.</p>
<p>At the same time, companies are deploying and operating a vulnerabilities detection arsenal that is continually growing and has become more mature in recent years, or even commoditized:</p>
<ul>
<li>Intrusion tests &amp; red-teams,</li>
<li>Vulnerability scanners: on the entire external and/or internal park</li>
<li>Vulnerability Watch</li>
<li>SAST, DAST &amp; SCA: often directly integrated into development pipelines</li>
<li>Bounty Bug Campaigns</li>
</ul>
<p>All these detection practices are complementary and generally stacked in a best-of-breed approach to evaluate specific parts of the IS or SDLC. Unfortunately, it is often once the arsenal in place that the problems are obvious (non-exhaustive list):</p>
<ul>
<li><strong>The heterogeneity in the deliverables’ formats:</strong> pentest reports in PDF or Excel files, results of scans in the tool own console, vulnerabilities on the bug bounty platform, &#8230;, often force the company to adopt a siloed Vulnerability Management approach. It’s the same for vulnerability scores, which in the end turns out to be a patchwork of CVSS and its multiple versions, proprietary scales and a clever (J) mix of the two.</li>
<li>This results in the <strong>inability to prioritize remediation efforts</strong> globally due to a fragmented and heterogeneous perception of vulnerabilities stock.</li>
<li>Managing <strong>volumes of data that have become far too large to be processed manually</strong>: it is not uncommon for a company that performs authenticated scans on its fleet to see the volume of vulnerabilities exceed several million entries in the scanner&#8217;s console.</li>
<li><strong>Difficulty in coordinating remediation actions:</strong> identification of the asset owner and the holder of a share, exchange of e-mails, progress monitoring, Excel reporting, etc&#8230;</li>
<li>The frustration of the teams in charge of remediation, <strong>who do not have factual reporting</strong> reflecting the remediation effort on the company&#8217;s overall security posture.</li>
</ul>
<p>Facing these problems, companies have no choice but to work on the implementation of processes that are often costly because they rely on manual actions, the development of ad-hoc tooling or an assembly of bits and pieces of solutions gleaned here and there. The lack of automation of this process is all the more absurd since it generally mobilizes rare and expensive cyber security experts on low-value tasks such as compiling data in Excel, endlessly searching for the right stakeholder or tracking email threads.</p>
<p>In its study “<em>Cost and consequences of gaps in vulnerability management responses</em>” (2019), the Ponemon institute estimates that companies with more than 10,000 employees spent an average of more than <strong>21,000 hours (or nearly 12 FTEs)</strong> in 2019 on the prevention, detection and treatment of vulnerabilities. This represents a total of more than $1M for a very disappointing quality/price ratio.</p>
<h2>The « patching paradox »</h2>
<p>In theory, the best way to stay protected is to keep each system up to date by correcting each new vulnerability, as soon as it is identified. IRL, this task has become impossible due to the volume of vulnerabilities too large, the human or financial resources too limited, the existence of legacy systems, and the time of availability of the fix or operational constraints on patch deployment.</p>
<p>Ultimately, no matter how large or small an organization may be, it will never have enough human or financial resources to address all of its vulnerabilities. In fact, the mistaken belief that more people dedicated to addressing vulnerabilities equals better security is called the “Patching Paradox” in the industry.</p>
<p>To reduce the pressure to increase staff at a time when there is a shortage of qualified security experts, and to prevent Vulnerability Management from becoming a frantic and lost race to fix more and more vulnerabilities, organizations today need to determine which ones of their vulnarabilities should be addressed first.</p>
<p>&nbsp;</p>
<p><em>After having seen in this first article the threat status and the current issues related to the management of vulnerabilities, we will see in a second article the new approaches to be taken into account to better manage vulnerabilities.</em></p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> Ponemon Institute &#8211; Cost and consequences of gapes in vulnerability management responses &#8211; 2019</p>
<p><a href="#_ftnref2" name="_ftn1">[2]</a> <a href="https://intel471.com/blog/ransomware-as-a-service-2020-ryuk-maze-revil-egregor-doppelpaymer/">https://intel471.com/blog/ransomware-as-a-service-2020-ryuk-maze-revil-egregor-doppelpaymer/</a></p>
<p><a href="#_ftnref3" name="_ftn1">[3]</a> <a href="https://www.checkpoint.com/downloads/resources/cyber-attack-trends-report-mid-year-2020.pdf">https://www.checkpoint.com/downloads/resources/cyber-attack-trends-report-mid-year-2020.pdf</a></p>
<p><a href="#_ftnref4" name="_ftn1">[4]</a> <a href="https://www.wavestone.com/fr/insight/radar-rssi-quelles-priorites-2021/">https://www.wavestone.com/fr/insight/radar-rssi-quelles-priorites-2021/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/hackuity-shake-up-the-future-of-vulnerability-management-threat-status-and-current-issues-in-vulnerability-management-1-2/">Hackuity | Shake&#8217;Up &#8211; The future of vulnerability management: threat status and current issues in vulnerability management (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
