Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 31
Module 4
Vulnerability Assessment & Risk
Management 4.1 Vulnerability Management
What is Vulnerability management ?
Vulnerability management is a comprehensive process for identifying,
assessing, prioritizing, mitigating, and monitoring vulnerabilities in an organization's information technology infrastructure, applications, and systems. The goal is to reduce the security risk associated with known vulnerabilities and prevent potential security breaches. Vulnerability Management Vulnerability discovery : Often its referred to as vulnerability research or vulnerability finding, is the process of identifying and uncovering security vulnerabilities in software, hardware, or systems. These vulnerabilities can include software bugs, misconfigurations, design flaws, or other weaknesses that could be exploited by malicious actors. Vulnerability prioritization: It is the process of determining the order in which security vulnerabilities should be addressed or remediated based on their potential impact on an organization's systems, networks, and data. Vulnerability assessment : It is the testing process used to identify and assign severity levels to as many security defects as possible in a given timeframe. Vulnerability Management Vulnerability report : It is a document that provides detailed information about security vulnerabilities or weaknesses discovered in an organization's systems, networks, software, or infrastructure. These reports are a critical component of vulnerability management and are used to communicate the findings of vulnerability assessments, penetration tests, or security audits. Vulnerability remediation : It is the process of taking corrective actions to address and mitigate security vulnerabilities discovered within an organization's systems, networks, software, or infrastructure. Vulnerability verification : It is also known as vulnerability validation, is the process of confirming whether a previously identified security vulnerability has been successfully remediated or mitigated. 4.2 Techniques used to Identify Vulnerabilities
Vulnerability Database :
Vulnerability Database are valuable resources in the field of cybersecurity,
providing a centralized repository of information about known security vulnerabilities in software, hardware, and systems. These databases serve various purposes and offer benefits but also have certain limitations. Vulnerability Database Uses Limitations Identification of Vulnerabilities Incompleteness Risk Assessment False Positives and Negatives Prioritization Dependency on Public Disclosure Security Audits and Compliance Lack of Context Industry Standard Tools Used For Vulnerabilities Assessment
1. Common Vulnerability Scoring System (CVSS): CVSS is a
standardized system for assessing the severity of security vulnerabilities. It assigns scores to vulnerabilities based on their impact, exploitability, and other factors, making it easier to prioritize remediation efforts.
2. ISO/IEC 27001: This is an international standard for information security
management systems (ISMS). It provides a framework for organizations to manage security vulnerabilities and assess their security controls.
3. NIST Cybersecurity Framework: Developed by the U.S. National
Institute of Standards and Technology (NIST), this framework provides guidelines for assessing, managing, and reducing cybersecurity risks. Tools used in Vulnerability Assessment Nessus: Nessus is a versatile vulnerability scanner. Recommendations include regularly scanning your network and systems with Nessus, and using the reports it generates to guide remediation efforts. OpenVAS: OpenVAS is a free and open-source vulnerability scanner that is particularly well-suited for smaller organizations. Recommendations include using OpenVAS for periodic vulnerability scans. Qualys: Qualys offers a comprehensive vulnerability management platform. Recommendations include leveraging Qualys for scanning, remediation, and policy enforcement. Acunetix: Acunetix is a web vulnerability scanner. Recommendations include using Acunetix for web application assessments and integrating it into the software development lifecycle. CVE A CVE (Common Vulnerabilities and Exposures) is a unique identifier for a known security vulnerability. It's used to track and communicate about vulnerabilities in software and hardware. Each CVE is a structured entry that includes a description of the vulnerability, affected products, references to patches or updates, and a severity score. CVEs are essential for managing and prioritizing vulnerabilities, conducting patch management, and improving overall cybersecurity. They are publicly accessible and maintained by various organizations, with MITRE being the primary authority. Threat Intelligence Definition: Threat intelligence is information about cybersecurity threats and vulnerabilities used to protect against potential attacks.
Example: An organization subscribes to a commercial threat intelligence
service that provides real-time data on emerging malware threats, enabling the organization to update its antivirus systems to block these threats before they can compromise its network. Types Of Threat Intelligence Why It is Important to update Vulnerabilities documentations Ensures accuracy. Enables timely response to incidents. Helps with legal and regulatory compliance. Improves the organization's security posture. Facilitates knowledge transfer. Allows for learning from past incidents. Supports effective communication during incidents. Aids in recovery and resilience. Helps with reputation management. Drives continuous improvement in security practices. 4.3 Risk Management Risk: Risk is like the possibility of something bad happening. It's a combination of the chance of a problem occurring (the threat) and how bad it could be (the impact). Think of it as a way to measure and prepare for potential troubles. Threat: A threat is something that could cause harm or trouble. It's like a danger or a bad thing that might happen. Threats can come from various sources, like hackers, viruses, or even natural disasters. Vulnerability: Vulnerability is a weakness or a gap that makes it easier for a threat to cause harm. It's like a hole in your armor that can be exploited by a threat. Vulnerabilities can be in software, systems, or even in how people use technology. Risk = Threat * Vulnerability Risk Management
Risk management is the process of identifying, assessing, and controlling
or mitigating risks to minimize the potential negative impact on an organization's objectives and operations. It involves a structured approach to understanding and dealing with uncertainties and potential threats. Risk Analysis Risk analysis is the process of assessing and evaluating potential risks, vulnerabilities, and threats to an organization's assets, operations, and objectives.
Types of Risk Analysis:
Risk Analysis Qualitative Analysis Quantitative Analysis Focuses on non-numeric data. Deals with numerical data. Involves qualities, descriptions, Involves measurements and and attributes. statistics. Used for subjective or complex Used for objective, data-driven topics. assessments. Techniques include content and Relies on statistical methods and thematic analysis. mathematical models. Risk Mitigation Strategies Risk Mitigation Strategies Risk Avoidance: This strategy involves completely avoiding activities or situations that could lead to a risk. For example, not engaging in high-risk investments or not using certain technologies that are known to be vulnerable. Risk Reduction: Involves taking actions to reduce the likelihood or impact of a risk. This can include implementing security measures, such as firewalls or encryption, to reduce the risk of data breaches. Risk Transfer: This strategy involves shifting the risk to another party. It's commonly used in insurance, where organizations transfer the financial risk to an insurance provider. Risk Acceptance: Sometimes, organizations may choose to accept certain risks if the cost of mitigation is higher than the potential impact. However, even in acceptance, monitoring and preparation may be necessary. Levels of Risk Low Risk: This is when the likelihood of a risk occurring is minimal, and the potential impact is not severe. Low-risk situations are generally manageable and may not require extensive resources for mitigation. Moderate Risk: Moderate risk indicates a higher likelihood of a risk occurring and a potentially significant impact if it does. These risks typically require active monitoring and some level of mitigation efforts. High Risk: High-risk situations have a significant likelihood of occurring and can result in severe consequences if not addressed. These risks demand immediate attention, extensive mitigation efforts, and a well-defined response plan. Risk Associated with Specific Data Public Data: • Minimal risk, as this data is intended for public consumption. • Risks mainly involve inaccuracies, unauthorized modifications, and potential reputational damage.
Internal Use Data:
• Low to moderate risk. • Risks include unauthorized access, data leaks, and potential internal misuse. Confidential Data: • Moderate to high risk. • Risks include data breaches, unauthorized access, theft, and potential legal and regulatory consequences. Sensitive Data: • High risk. • Risks include significant data breaches, compliance violations, and potential harm to individuals or organizations. Highly Sensitive Data: • Very high risk. • Risks involve catastrophic data breaches, legal and regulatory penalties, and severe damage to individuals' privacy and organizations' reputation. 4.4 Disaster Recovery & BCP Plan
Disaster recovery (DR) is a set of policies, procedures, and technologies
that an organization puts in place to recover its critical IT systems and data after a disruptive event. The goal of disaster recovery is to minimize downtime, data loss, and ensure business continuity in the face of various disasters, including natural disasters (e.g., earthquakes, floods), technical failures (e.g., hardware or software failures), human errors, and cybersecurity incidents (e.g., cyberattacks and data breaches). Types of Disaster Natural Disasters: Man-Made Disasters: Earthquakes: Sudden shaking of the Cyberattacks: Deliberate attacks on ground caused by the movement of computer systems, networks, or data. tectonic plates. Terrorist Attacks: Acts of violence and Floods: Overflow of water onto normally sabotage carried out by individuals or dry land, often due to heavy rain, groups with political or ideological storms, or the melting of snow and ice. motives. Hurricanes, Typhoons, Cyclones: Industrial Accidents: Mishaps in Violently rotating storms with strong industrial facilities, such as chemical winds and heavy rainfall. spills, nuclear accidents, and explosions.
of air that extend from a thunderstorm involving planes, trains, ships, or vehicles to the ground. that result in disasters. Key features of a Disaster Recovery Plan 1. RTO and RPO 2. Backup and Data Recovery 3. Alternate Sites 4. Documentation 5. Vendor and Third-Party Considerations 6. Security Measures 7. Incident Response Procedures 8. Continuous Monitoring and Updating 9. Regulatory Compliance 10. External Collaboration 11. Documentation Storage BCP(Business Continuity Plan)
It is a proactive process and strategy designed to ensure an organization's
critical business functions can continue to operate during and after a disaster or disruptive event. The primary focus of BCP is to maintain business operations, minimize downtime, and mitigate the impact of disruptions, whether they are caused by natural disasters, technology failures, human errors, or other unforeseen events. Key components of a Business Continuity Plan Risk Assessment: Identifying potential threats and vulnerabilities that could disrupt business operations. Business Impact Analysis (BIA): Evaluating the potential impact of disruptions on critical business functions, revenue, and reputation. Recovery Strategies: Developing strategies for how to continue essential business operations during a disruption. Communication Plan: Establishing effective communication protocols for alerting employees, stakeholders, and customers during a crisis. Alternate Facilities and Resources: Identifying backup locations, equipment, and resources needed to maintain operations if the primary site becomes unavailable.