1. What is vulnerability management?
Vulnerability management consists of technologies, tools, policies and procedures to identify, prioritize and fix security weaknesses across your organization. It’s a proactive process that helps your teams decrease the likelihood of a breach or cyberattack. With a risk-based approach, you can also align your cybersecurity risk management program with your organization’s operational goals and objectives.
Vulnerability management’s goal is to quickly and effectively decrease exposures and secure your attack surface — on-prem and in the cloud.
With the right vulnerability management solution, you can get comprehensive visibility into your constantly-changing attack surface to continuously monitor your environment and keep pace with evolving threats.
A mature program to manage security exposures like vulnerabilities is key to ensuring operational resilience by reducing the risk of a breach or cyberattack.
There are four key stages for vulnerability management:
- Identify assets and vulnerabilities across all your environments, on-prem and in the cloud
- Prioritize vulnerability remediation of critical exposures based on threat intelligence, your organization’s risk profile and which vulnerabilities attackers are most likely to exploit in the near term
- Remediate security issues
- Continuous monitoring, reporting and program improvements
By developing a risk-focused vulnerability management program, you can protectively know, expose and close security weaknesses that traditional vulnerability management tools miss.
And, not just for traditional IT systems, but also:
- Cloud systems and services
- Mobile devices
- Containers or serverless
- Web applications
- Operational technology (OT)
While every organization has a unique cyber threat environment, there four main types of vulnerabilities:
- Operating systems and applications
- Network
- Misconfigurations and process-based
- Human-related
Examples of a vulnerability:
- System, network or application misconfigurations
- Outdated or unpatched operating systems and software
- Open ports and unused services
- Ineffective or broken authentication
- SQL injection
- Cross-site scripting (XSS)
What are the most common vulnerabilities?
OWASP Foundation is actively updating its OWASP Top 10 vulnerability list. The previous list of common vulnerabilities includes:
- Broken access control
- Cryptographic failures
- Injection
- Insecure design
- Security misconfiguration
- Vulnerable and outdated components
- Identification and authentication failures
- Software and data integrity failures
- Security logging and monitoring failures
- Server-side request forgery
What does vulnerability management entail and what are the five steps of vulnerability management?
The vulnerability management lifecycle explained:
Step 1: Discover
Identify and map all assets across all computing environments, on-prem and in the cloud, and scan for vulnerabilities and other exposures.
Step 2: Assess
Understand asset criticality and risk, including vulnerabilities, misconfigurations and other security health indicators.
Step 3: Prioritize
Understand exposures in context to prioritize remediation efforts based on asset criticality, vulnerability severity, your environment and threat context.
Step 4: Remediate
Prioritize which exposures to address first based on business risk. Then use appropriate, industry best practices for remediation.
Step 5: Measure
Measure and benchmark exposure, internally and against peer organizations, so your teams can make better informed business and cyber risk decisions to drive risk reduction, compliance and program maturity.
What's the difference between vulnerability management and vulnerability assessment?
Vulnerability management and vulnerability assessment are different, but work together. The terms are often used interchangeably, but shouldn’t be.
Cybersecurity vulnerability management identifies assets and vulnerabilities across your attack surface. It helps teams plan strategies to mitigate security issues and prioritize and remediate vulnerabilities.
It’s not the same as a vulnerability scan, which has a set beginning and end date. Vulnerability analysis is a point-in-time snapshot of your attack surface. It’s part of your overall vulnerability management program and helps teams continuously identify and address cyber risks.
What is risk-based vulnerability management?
Risk-based vulnerability management provides comprehensive visibility into your attack surface so you can see which security issues pose the greatest risk.
When you know which critical vulnerabilities attackers may most likely exploit in the near term and potential impact, you can more effectively mitigate and remediate exposures to reduce risk.
AI and machine learning enhance risk-based vulnerability management practices, which should be about more than just finding vulnerabilities. The goal is to understand risk with threat context, including insight about business impact.
How is vulnerability management different from risk-based vulnerability management?
Traditional vulnerability management practices give you a high-level view of vulnerabilities and risks. They uncover threats a vulnerability could introduce. However, legacy processes don’t give you true insight into your threat landscape.
If your teams don't understand risk in context, they may waste time on vulnerabilities that aren't a threat. They can miss finding and fixing risky vulnerabilities more likely to negatively impact your organization.
What are the benefits of vulnerability management?
- Provides threat context for vulnerabilities
- Empowers teams to reduce the greatest amount of risk with least amount of effort
- Provides comprehensive visibility into all vulnerabilities across your entire attack surface
- Aligns cyber risk with business risk so you can make more informed business and cybersecurity decisions
- Facilitates benchmarking and reporting about program success
- Helps communicate cyber risk to key stakeholders in business context
- Reduces reactive security measures
- Eliminates blind spots created by legacy vulnerability management processes
- Enables teams to focus on the 3% of vulnerabilities that pose greatest organizational risk
What are common challenges for vulnerability management?
Too many vulnerabilities
- As you adopt more technologies and more technology types — traditional IT, IoT, IIoT, web apps, cloud infrastructure and services, virtual machines, and more — the volume of vulnerabilities and other security issues skyrocket.
- The risk-based solution: Prioritize vulnerabilities based on actual risk to your unique environment and business impact so you know which exposure to address first.
No threat context for prioritization
- Many vulnerability management tools find vulnerabilities but don't give context or have threat intelligence about exploit likelihood. Many rank too many vulnerabilities high or critical, even though they may never impact your business.
- The risk-based solution: Use AI, machine learning and other industry-trusted threat intelligence, like Tenable Research, to understand asset criticality ratings and threat context to prioritize exposure remediation.
Limited asset tracking and insight into all their risks
- As attack surfaces expand and increase in complexity, most security teams, especially those using disparate cybersecurity management tools, can't get full visibility into all assets and security exposures.
- The risk-based solution: Use automation and other risk-aware tools to see all assets — regardless of how quickly they spin up or how short-lived.
Patch management
- Patching is challenging. Some patches negatively impact systems and cause unexpected downtime and disruptions.
- The risk-based solution: With insight into exploit likelihood and business impact, you can make plans about which vulnerabilities to fix first and which to patch later.
Limited resources
- There are millions of unfilled cybersecurity positions, a problem compounded by the growing need for cloud security practitioners.
- The risk-based solution: Automation, AI and machine learning tools focused on risk and threat context can help you make actionable, impactful remediation decisions faster using fewer resources and expenses.
What are managed vulnerability management services?
Managed vulnerability management services are exposure management tasks organizations outsource to a third-party managed security services provider (MSSP) such as:
- Continuous vulnerability scanning
- Risk identification, prioritization and mitigation
- Remediation processes and guidance
- Metrics, documentation and reporting
Your organization may need out-sourced vulnerability management if:
- You have limited internal resources and budgets
- You're operating in complex environments, for example, a mix of traditional IT, OT and multi- or hybrid clouds.
- You struggle to keep up with the rapidly evolving threat landscape.