vulnerability management

15
Importance of Vulnerability Management Importance of Vulnerability Management Vulnerability Management Vulnerability Management Anthony Asher

Upload: asherad

Post on 15-Jan-2015

1.638 views

Category:

Technology


7 download

DESCRIPTION

Presentation I gave to a client on showing the importance of implementing a vulnerability management program life cycle.

TRANSCRIPT

Page 1: Vulnerability Management

Importance of Vulnerability ManagementImportance of Vulnerability ManagementVulnerability ManagementVulnerability Management

Anthony Asher

Page 2: Vulnerability Management

What is Vulnerability Management (VM)?1

Why is VM important?2

Examples of vulnerability exploits3

What the difference?4

Page 3: Vulnerability Management

Vulnerability / Assess / ManageVulnerability / Assess / Manage

• Vulnerability: a weakness of an asset or group of assets that can be exploited by one or more threats.

• Assessment: process of identifyingvulnerabilities in computers and networks as well as weaknesses in policies and practicesweaknesses in policies and practices.

• Management: “process of attempting to identify• Management: process of attempting to identify and mitigate security vulnerabilities within an IT environment on a continuous basis” – Deloitte & Touche

Page 4: Vulnerability Management

Vulnerability Management LifecycleVulnerability Management Lifecycle

DiscoverVerify

Remediate PrioritizeAssets

Report AssessReport

Page 5: Vulnerability Management

Why is vulnerability management important?

1990’s – Hacker’s would try

Host #1

1990 s Hacker s would try single exploit on host after host until they found a vulnerable t t t b k i t

Exploit

target to break into.

H@ck3r

Host #3Host #2

Page 6: Vulnerability Management

Why is vulnerability management important?

Targeted Company

Attack #4

Attack

Targeted C

#4

Att k

#1

Company Attack #5

Attack #2

Attack #6

Attack #3

2008 – Hacker’s target and attack carefully identified companies with an onslaught of attacks until successful.

Page 7: Vulnerability Management

Why is vulnerability management important?

LegalSensitive

AssetControl(Botnet)

LegalComplianceCompany

Information

Vulnerability ExploitsCripple Companies:Cripple Companies:

ReputationFinancialLegalities

CustomerInformation

Legalities

Page 8: Vulnerability Management

Master Lock –Th t t t d dl kThe most trusted consumer padlock.

Vulnerability #1: Combination Code Deduction

EXPLOIT: Deducing the code by removing uneven number the lock stops at while under tension will reveal code.

Vulnerability #2: Shackle Spacing

EXPLOIT: Shim made from soda can open lock.

Page 9: Vulnerability Management

Purpose of Vulnerability Management:p y g

Examine the technologies in place and identifyExamine the technologies in place and identify vulnerabilities. Putting a system in place to continuously compare the vulnerabilities to a policy, and systematically mitigate these vulnerabilities to lower a company’smitigate these vulnerabilities to lower a company s exposure to risk.

Page 10: Vulnerability Management

Examples of NegligenceExamples of Negligence

Page 11: Vulnerability Management

Cost of not managing vulnerabilitiesCost of not managing vulnerabilities

Estimates the average data breach costs the company $4.8 million. • Average cost of $182/ lost customer record g $

• Average 26,300 lost records per breach

Page 12: Vulnerability Management

Five Mistakes of Vulnerability ManagementManagement

Scanning but failing to act

Patching same as VM.

Scanning but failing to act.

VM is only a technical problem.Mistakes

Assessing without whole picture.

Unprepared for Zero Day exploitsUnprepared for Zero-Day exploits.

Page 13: Vulnerability Management

Is Nessus and/or Patching enough?

Tools of Vulnerability

g g

yManagement Life-Cycle

Group AssessPrioritize Group AssessPrioritize

Nessus Security

NessusScan DiscoverRemediate

Scanner(Assess)

Microsoft PatchingWSUS /

Report Verify

g(Remediate)MBSA

Page 14: Vulnerability Management

Vulnerability Management CriticalVulnerability Management Critical

• With a growing number of vulnerabilities, coupled with the dynamic attack methods and exploits in today's security landscape places enterprise businesses at great risk. p g

• Implementing a vulnerability management process will help identify and remediatevulnerabilities before exploits are used.

• Scanning and patching alone will not provide the system to comprehensively lower a y p ycompanies security exposure and risk.

Page 15: Vulnerability Management

Q ti ?Questions?