Security Operations: Vulnerability response, Remediation and Reporting Flashcards

1
Q

Why is response so important?

A

Why is response so important? If you go through the process of enumerating, identifying, classifying, and prioritizing vulnerabilities that affect an organization, the subsequent response process enables you to remediate those vulnerabilities and verify that your remediation was successful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some of the strategies you can apply/Implement in the response process?

A

There are several response strategies that you can implement in your response process, including:

Patching: Is the process of addressing known security flaws in software, thereby reducing the risk of exploitation by malicious actors and enhancing overall system security.

Segmentation: Isolates network segments, limiting the lateral movement of attackers and minimizing the potential impact of security breaches. This helps bolster overall network security.

Compensating controls: Serve as alternative security measures to counter vulnerabilities or threats when you can’t implement primary controls. Helps maintain a robust security posture.

Exceptions and exemptions: Are an integral component of security policy management, and provide a mechanism for addressing unique situations where standard security policies or rules may not be suitable. Helps maintain adaptability within a security framework.

Insurance: Enables financial protection against potential losses resulting from unforeseen events or incidents. Offers a safety net to help organizations recover and continue operations in the face of adversity.

Example:

Can’t patch the system you can airgap the legacy systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is validation important?

A

Why is validation so important in our response process? Because the ability to rapidly identify, assess, and mitigate security vulnerabilities helps reduce the risk of exploitation, data breaches, and potential damage to an organization’s reputation and assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some strategies you can implement in validating the process?

A

Validation strategies include:

Rescanning: Helps ensure that:

Identified vulnerabilities have been successfully addressed.

Systems remain secure from potential threats.

Additional vulnerabilities haven’t been introduced.

Audit: Is a process that:

Systematically assesses and verifies the implementation and effectiveness of security measures.

Helps ensure that vulnerabilities are adequately addressed.

Verification:

Allows organizations to confirm that identified vulnerabilities have been successfully mitigated.

Helps assure that security controls function as intended.

Helps reduce the risk of exploitation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is reporting important?

A

Reporting is a process that provides transparency, documentation, and communication of vulnerabilities, remediation progress, and security posture. This supports informed decision making and regulatory compliance while enhancing overall security resilience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should you consider in reporting?

A

Documenting and Transparency

Know your audience

Executive, Severity or Technical Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly