The Problem with Vulnerability Management
LevelBlue Completes Acquisition of Cybereason. Learn more
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
LevelBlue Completes Acquisition of Cybereason. Learn more
Does this scenario look familiar to you?
Monday – “Roll up your sleeves, people! We’re going to patch some security vulnerabilities this week! I can FEEL it!”
Tuesday – “Reports are sent out and tickets have been created. They can’t ignore all those Highs and Critical CVEs THIS time!”
Wednesday – “I haven’t heard back from anyone yet. Maybe they’re so busy patching, they forgot to message me. I’ll email them a friendly reminder.”
Thursday – “No tickets have been closed? Wait, NO TICKETS HAVE BEEN ASSIGNED?!”
Friday – “Sigh. Backlogged again.”
After days, weeks, months, and years(!) of trying the same approach to solving the “vulnerability management problem”, in which your impassioned pleas for security fixes are largely ignored or de-prioritized, you start to realize something.
Your approach to vulnerability management does not work. Creating vulnerability reports, attending vulnerability review meetings, opening tickets to patch vulnerabilities, validating fixes and patches, etc. takes too much time, energy, and head-banging to make a large-scale difference in our respective companies’ admittedly woeful vulnerability statistics.
Because we all have something like 1,000 existing security vulnerabilities in our systems, right? Or is it closer to 10,000? 100,000? Does the number even matter?
Changing and improving the format and frequency of the reports, while seemingly beneficial, is a superficial band-aid to the underlying root cause of the vulnerability management problem: vulnerability reports, even good vulnerability reports, will be ignored.
WHY don’t years of vulnerability reports make a dent in the overall number of vulnerabilities?
WHY do teams take a low-priority approach to fixing critical security vulnerabilities?
WHY do InfoSec teams struggle to garner support and momentum for security activities?
The short answer is this: The vulnerability management problem, and by extension, InfoSec policy, budgeting, and executive-support problems, are largely symptomatic of an ineffective, incomplete, and unsupported approach to Information Security Governance.
Effective Information Security Governance requires several interconnected partnerships within an organization, but the MOST important of these is support at the executive board-level.
In other words, every executive board should*:
A solid Information security governance framework should always include the following components:
* Reference: The Standard of Good Practice for Information Security, Information Security Forum, Ltd. © 2016
Given the potential grandness and effort required to incite support for the points above, it all seems impossible, right? It’s a fine-and-dandy, idealistic, theoretical approach in a bleak world full of egos, personal agendas, and power plays, right?
Fortunately, even without initial executive-level support, the following team-level tasks can be performed in the near-term that would pay huge dividends in securing the overall security postures for our companies:
These three tactical actions – Asset management, baseline configuration management, and vendor management – are where even the smallest InfoSec teams can focus their immediate energy instead of spinning ever-evolving versions of vulnerability reports that would never gather the momentum needed to make a difference in their organizations’ vulnerability management programs.
Along with this bottom-up approach, InfoSec teams can work on the top-down approach of winning the hearts and minds of Executive Board members by helping them develop a strong Information Security Governance framework. This will greatly improve the security mindset, and by extension, the security posture, of any company.
LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.