(6) Remediation Flow Flashcards

1
Q

What is the remediation workflow?

A

Remediation is about detection, remediation, testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How should the remediation workflow be configured?

A

The remediation workflow should be as automated as possible as long as the tools are available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What options do network admins have when it comes to automated remediation workflows?

A

Many vulnerability management systems have their own tools for remediation, but many admins instead like to manage vulnerabilities through the ITSM (IT Service Management) system.

While this does avoid using two tools, the vulnerability management options will either need to be able to integrate natively with the ITSM system or have integrations built into them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In terms of remediation, what is ongoing scanning?

A

Ongoing scanning is where vulnerability management systems scan IT systems on an ongoing basis

It can be resource intensive but it does help detect issues quicker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

in terms of remediation, what is continuous monitoring?

A

Continuous monitoring takes data from agent based approaches to vulnerability detection and reports the issues right away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What reporting capabilities exist with vulnerability management systems?

A

Vulnerability management systems have the ability to push regular reports and for critical alerts, notifications can be pushed in real time to people who can fix them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What customizations exist for vulnerability management reports?

A

The types of customizations include sorting by vulnerability type, severity, host group, and other things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What considerations do admins need to think on as they consider how to remediate discovered issues?

A

Admins need to make sure that they consider the financial resources that they have, as well as the time and skill to decide which vulnerabilities to remediate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the most important considerations that admins have to make when it comes to choosing which vulnerabilities to fix?

A

The most important considerations include

-Criticality of the systems and information affected by the vulnerability

-Difficulty in remediating the vulnerability

-Severity of the Vulnerability

-Exposure of the Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What should admins do before deploying a remediation activity?

A

Any remediation should be tested before it is put in place in a sandbox environment.

This way any not detectable side effects can be seen and tested.

Another vulnerability scan should be done to make sure that the vulnerability isn’t detected

Also remember to update the baseline for the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If a vulnerability can’t be remediated, other options are possible, what are they?

A

Compensating controls can be put in place. It is an additional security control without taking care of the actual issue.

Secondly the system could accept the risk and not do anything, understanding that the risk is still there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If analysts on the team raise concerns about vulnerability scanning, what three things may they mention?

A

Service degradations

Customer commitments

IT Governance and Change Management Processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When it comes to concerns raised by tech professionals against vulnerability scanning, describe service degradations

A

Vulnerability scans take up bandwidth. It can interrupt business production. In addition, legacy and proprietary systems can cause issues in the face of these scans.

A good idea to work around this is to tune these scans to consume less bandwidth and to scan during down times in business (such as during late hours of the night, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When it comes to concerns that security professionals may raise to vulnerability scans, describe customer commitments

A

Customer commitments include Memoradums of Understanding and Service Level Agreements. (SLAs) with customers. If uptime or other promises in these agreements are violated, then the customers may need to be part of the decision making process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When it comes to concerns that IT professionals can raise to vulnerability scans, describe IT governance and change management processes

A

There can be bureaucratic issues that come into play such as change management approvals that need to be had before vulnerability scans can be done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly