The Vulnerability Management Episode
Transcript
-
What is a Vulnerability?: A vulnerability is described as a “hole” in a computer system or network’s exterior that allows unauthorized access, similar to an unlocked door or window in a house. These weaknesses can exist in software, hardware, or even the physical environment protecting the computers.
-
Is It Possible to Have Zero Vulnerabilities?: It is likely impossible to have a system with zero vulnerabilities. The goal is to address all known vulnerabilities, as new ones are constantly being discovered by both security researchers and malicious actors.
-
How are Vulnerabilities Detected?: Vulnerabilities are typically discovered by security researchers and then communicated through vendor announcements (e.g., Microsoft, Apple), government agencies (like CISA), and industry news. To be effective, a company must first have a complete inventory of all its hardware and software to know which announcements apply to them.
-
How Do Companies Fix Vulnerabilities?:
-
Patching: The most common first step is applying software updates (patches) from vendors in a timely manner. This can be a challenge for organizations with many devices.
-
Verification: Jeff provides an example of a client with 600 servers where 30-40 were not being patched due to a simple, recurring misspelling (“gray” vs. “grey”) in a configuration file. Once identified, the issue was easily fixed.
-
-
Why Companies are Susceptible to Vulnerabilities:
-
Third-Party Software: Even the best, most reputable software can contain vulnerabilities.
-
Employee Actions: Employees can unknowingly create risks by clicking on malicious links, opening unexpected files, or installing unauthorized software. This is often the initial entry point for an attacker.
-
-
Advice for Someone Undergoing an Audit:
-
It’s a Universal Challenge: Every company faces the challenge of managing vulnerabilities.
-
Take it Step-by-Step: The process doesn’t have to be overwhelming. There are existing templates, tools, and established processes to help.
-
Layered Defense: Implementing multiple layers of security controls is crucial, as one layer might fail.
-
-
Why is Vulnerability Management an Important Topic?: Jeff finds this topic particularly rewarding because addressing a few key areas can significantly reduce risk. He cites a government expert who stated that three actions could prevent up to 80% of breaches:
-
Educating users.
-
Patching software.
-
Changing default passwords.
-
Notes
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission
Jeff Pochily’s background
https://www.linkedin.com/in/jeffreypochily/
Vulnerability Databases
Open Bug Bounty Security Researchers
https://www.openbugbounty.org/researchers/top/
Recommended vulnerability management controls
- Documented vulnerability management policies and procedures
- Assignment of responsibility for vulnerability management to a qualified resource
- Vulnerability assessment during development
- Code reviews for secure coding compliance and software vulnerabilities
- Ranking security vulnerabilities by impact
- Documented asset inventory
- Documented inventory of bespoke and custom software, and third-party software components
- Consistent patch management process
- Subscription to vulnerability notification services
- Manual or automated application vulnerability assessment methods
- Consistently update container deployment tools and images
- Internal vulnerability scans
- External vulnerability scans
- Internal penetration testing
- External penetration testing
- Application penetration testing
- Consistent remediation process for scan and pen test findings
KirkpatrickPrice scripts to check your systems
https://github.com/orgs/kirkpatrickprice/repositories
Cybersecurity & Infrastructure Security Agency
https://www.cisa.gov/topics/cyber-threats-and-advisories
Send a Question
Do you have a question for our podcast? Send it to us here.