Chapter 12: Reporting and Communication Flashcards
Vulnerability Management Reporting
Vulnerability management requires ongoing reporting to responsible parties, like system admins, security staff, and auditors or others who are responsible for ongoing / point-in-time compliance efforts
Reports typically include a number of common elements:
* Vulnerabilities, including information like CVE number, name, description, and information about the vulnerability itself
* A list of affected hosts with IPs and hostname if it was able to be resolved or is available to the scanner
* A risk score that provides a qualitative measure of the severity of the risk in the context of the org and system, device, or service (NOT A CVSS)
* Mitigation options including patches, updates, and workarounds
* Information about recurrence—if the vulnerability has reappeared, this is often a sign that something has gone wrong and needs to be flagged for investigation
* Prioritization information that will help determine what work needs to be done first—often rlies on risk scores, CVSS, and org policies
Reports are often created in an automated fashion since they’re recurring and can reach significant lengths for larger orgs or complex environments
Stakeholder Identification and Communication
Vulnerability management reporting requires knowing who the proper stakeholders are for the systems and services covered
Need to ensure that communication provides the appropriate information to each stakeholder in a timely manner as well
Think of stakeholders in a few categories:
Technical Stakeholders
* They need information about vulnerabilities, remediation and mitigation options, and prioritization information to allow them to do the work required in the proper order or importance
Security, Audit, and Compliance Stakeholders
* They need a view of the overall vulnerability stance of the org, as well as information about recurring vulnerabilities and other trends that can point to new or ongoing problems
Security Management and Oversight Systems
* These ingest vulnerability information to provide additional context for security operations, and need security reporting information in standardized forms on an automated basis through APIs or other interfaces
Executive or Leadership Staff
* They provide oversight and are responsible for the org’s overall performance and security, and they need dashboards of ongoing vulnerability remediation practices and efforts
Compliance Reports
Vulnerability management systems often have specialized reports designed to provide compliance information aligned to common compliance targets ike the PCI standard
Compliance reporting should be conducted on a regular basis and aligned to reporting requirements outlined in the standard itself
They may need to be provided to a certifying body or simply retained as proof of ongoing compliance with standards
Action Plans
While a major part of vulnerability management is simply installing pathces to remediate vulnerabilities, you need to be aware of the following action plans as well:
* Configuration Management
* Patching
* Compensationg Controls
* Awareness, Education, and Training
* Changing Business Requirements
Configuration Management
Simply configuring services and apps to not expose potentially vulnerable ports, removing or changing default configurations, and hardening systems and services is an important step in vulnerability management
That means that the following are common parts of vulnerability management action plans:
* Configuration management
* Use of configuration management tools
* Defining baseline configurations
Patching
Action plans for patching need to take business processes and requirements into account
Since patching can require service outages in some environments and situations, it needs to be clearly planned and communicated
Patching may also need testing before being done in product environments—they can’t be asumed to be perfect and can cause new issues
Compensating Controls
In cases where compensating controls are put in place, it will need to be documented
The configuration and vulnerability management systems in use will need to have notees or flags set to ensure that the vulnerability isn’t reported moving forward (since it now has compensating controls on it)
Many orgs set review periods for compensating controls, like if a patch isn’t available, is flawed, or can’t be installed for business reasons
* Once the need for compensating controls have been addressed, orgs will remove them and move forward
Awareness, Education, and Training
Vulnerability management practices require employee awareness to be effective
This requires that training, education, and awareness efforts are ongoing in the org for all relevant staff members
Changing Business Requirements
Org requirements and needs will change over time, but vulnerability management may also require an org to modify its practices
Changing business requirements is less frequent, but a crucial part of vulnerability management action plans
Vulnerability Management Metrics and KPIs
Trends
* Focus on the number of vulnerabilities, their severity or risk, and the time to remediate
* Issues with recurrence are also frequent targets of reports, although recurrence should be low or zero in most orgs
Top 10 Lists
* Help identify the biggest threats, most common vulnerabilities, and similar items useful for focusing organizational resources
* Don’t just rely on top 10 lists though, because the number is arbitrary and more than 10 critical items can exist
Critical Vulnerabilities
* Vulnerabilities that are likely to result in exploit and that could have significant impact
* If your org relies on the CVSS standard, a 9.0 to 10.0 is a critical vulnerability
* Mesuring the number of critical vulnerabilities in an org and the time for them to be patched can be important to understand how well the most critical vulnerabilities are being handled
Zero-Days
* Measuring zero-day response is challenging since it relies on vendors and others to release patches, or for orgs to identify and implement compensating controls
Service Level Objectives (SLO)
* Specific metrics like time to remediate or patch
* Set by an org, or defined as part of an SLA with a vendor or service
* Measuring whether SLOs have been met and where gaps exist is a common element of SLA management
Inhibitors to Remediation
There are a number of reasons that vulnerabilities may not be patched or resolved quickly:
MOU
* May have performance or uptime targets that might not be met if systems or services need to be taken offline for patchine
* May specify a support org or other limitations on who can work with a system or if patches can be installed at all
* Common for embedded and specialized systems that may be sensitive to OS and software changes
SLA
* Can have terms that influence performance targets
* May drive orgs to delay patching to ensure uptime or other metrics are met
Organizational Governance
* Can slow down patching either through business process requirements or because of validation processes
Business Process Interruption
* Many modern systems are designed to allow patching by using load balancing and other techniques, but not all systems or services can be patched without requiring downtimw
* Causes worries about interruption
Degrading Functionality
* A patch might disable a service or modify it, or disable older protocols, which breaks connectivity or integration with other systems and devices
Legacy Systems
* May not have any patches available, so compensating controls could be the only option
* If compensating controls can’t fully remedy the vulneraiblity, you must make risk-driven choices about the vulnerabilities vs the need for the system or service
Proprietary Systems
* Similar to legacy systems, may not have patches available or may have specific requirements placed on them by vendors
* May not be able to uninstall specific patch or update versions and retain vendor support
* Could create conflict between vulnerability management policies and functional or business requirements
Stakeholder Identification and Communication
Ensuring that proper parties have the right information at the right times during an incident requires you know who your key stakeholders are—EX:
* Incident responders
* Technical staff (system admins, devs, etc)
* Management
* Legal
* Comms and Marketing
* External stakeholders (customers, service providers, LEO, external legal counsel, government agencies, etc)
Incident Declaration and Escalation
When an incident is detected and analysis begins, comms processes also start:
1. IoC that lead the org to investigate the incident need to be communicated to incident responders
2. Incident responders need to make a determination of whether the IoC point to an incident or false positive
3. If incident is declared, then the org’s incident response process and comms plan is activated—this is the incident declaration step and is followed by containment, eradication, and recovery
NOTE: Remember that comms happen at all stages of the process—always be aware of who needs to know what’s happening, what detail they need, and when they need to receive that information
Incident Communications
NIST 800-61 contains the requirements and guidelines for external communications and information sharing, including:
* What should be shared
* Who it should be shared with
* When it should be shared
* Over what channels it should be shared
The guide describes a number of external orgs that are commonly involved in incident communications
Legal
Legal counesl may be involved in incident communications for a variety of reasons:
* Internal counsel may be asked to consult or be engaged in incident response processes to provide legal advice, particularly if sensitive data, compliance, or HR is involved
* External counsel may be engaged if the org beleives it may face legal action, or for specialized advice related to the incident
NOTE: Involving legal is usually a decision vs an automatic part of incident response—determine when and why counsel would be engaged and establish relationships with counsel prior to needing them