You are on page 1of 48

11/23/2020

Vulnerability Management Activities


Chapter 3

CompTIA CySA+ Cybersecurity Analyst 1


11/23/2020

Episode 3.01
Vulnerability Identification

CompTIA CySA+ Cybersecurity Analyst 2


11/23/2020

Regulatory Environments
• ISO/IEC 27001
• Standard for managing information systems
• Payment Card Industry Data Security Standard (PCI-DSS)
• Health Insurance Portability and Accountability Act (HIPAA)
• General Data Protection Regulation (GDPR)
• Corporate policy
• Data classification

CompTIA CySA+ Cybersecurity Analyst 3


11/23/2020

Vulnerability Identification
• Asset inventory
• All endpoints?
• Servers only?
• Inventory all assets to determine vulnerability identification considerations
• Asset criticality
• Necessary to determine mediation priorities

CompTIA CySA+ Cybersecurity Analyst 4


11/23/2020

Vulnerability Identification
• Active vs. passive scanning

CompTIA CySA+ Cybersecurity Analyst 5


11/23/2020

Vulnerability Identification
• Active vs. passive scanning
Passive Active
Listen to network traffic

CompTIA CySA+ Cybersecurity Analyst 6


11/23/2020

Vulnerability Identification
• Active vs. passive scanning
Passive Active
Send specially-crafted packets to
Listen to network traffic
determine what’s going on

CompTIA CySA+ Cybersecurity Analyst 7


11/23/2020

Vulnerability Identification
• Active vs. passive scanning
Passive Active
Send specially-crafted packets to
Listen to network traffic
determine what’s going on
Quieter, doesn’t affect network
traffic

CompTIA CySA+ Cybersecurity Analyst 8


11/23/2020

Vulnerability Identification
• Active vs. passive scanning
Passive Active
Send specially-crafted packets to
Listen to network traffic
determine what’s going on
Quieter, doesn’t affect network
Noisier, affects network traffic
traffic

CompTIA CySA+ Cybersecurity Analyst 9


11/23/2020

Vulnerability Identification
• Active vs. passive scanning
Passive Active
Send specially-crafted packets to
Listen to network traffic
determine what’s going on
Quieter, doesn’t affect network
Noisier, affects network traffic
traffic

Can be detrimental and cause


Safer
systems to slow down or crash

CompTIA CySA+ Cybersecurity Analyst 10


11/23/2020

Mapping/ Enumeration
• Common techniques
• ICMP echo request
• TCP SYN to port 443
• TCP ACK to port 80
• ICMP timestamp request
• Nmap is a great tool to use here

CompTIA CySA+ Cybersecurity Analyst 11


11/23/2020

Vulnerability Identification
• Vulnerability scanning
• Web application

CompTIA CySA+ Cybersecurity Analyst 12


11/23/2020

Episode 3.02
Scanning Parameters and Criteria

CompTIA CySA+ Cybersecurity Analyst 13


11/23/2020

Scanning Parameters and Criteria


• Risks associated with scanning activities
• May impact availability
• Regulatory requirements
• Work within regulatory environments
• Technical constraints
• Workflow
• Work with your available resources (personnel and technical)

CompTIA CySA+ Cybersecurity Analyst 14


11/23/2020

Scanning Parameters and Criteria


• Sensitivity levels
• Clearance and classified data
• Sensitive data (PHI, PII, payment cards, etc.)
• Are you authorized to view data?
• Segmentation
• VLANs in logical architecture
• Understand network architecture for appropriate scans

CompTIA CySA+ Cybersecurity Analyst 15


11/23/2020

Scanning Parameters and Criteria


• Vulnerability feed
• Up-to-date known vulnerability information
• Scope
• How many devices/ endpoints?

CompTIA CySA+ Cybersecurity Analyst 16


11/23/2020

Scanning Parameters and Criteria


• Credentialed vs. non-credentialed scan

CompTIA CySA+ Cybersecurity Analyst 17


11/23/2020

Scanning Parameters and Criteria


• Credentialed vs. non-credentialed scan
Credentialed Non-Credentialed
Insider (authorized)

CompTIA CySA+ Cybersecurity Analyst 18


11/23/2020

Scanning Parameters and Criteria


• Credentialed vs. non-credentialed scan
Credentialed Non-Credentialed
Insider (authorized) Outsider (not authorized)

CompTIA CySA+ Cybersecurity Analyst 19


11/23/2020

Scanning Parameters and Criteria


• Credentialed vs. non-credentialed scan
Credentialed Non-Credentialed
Insider (authorized) Outsider (not authorized)

Shows vulnerabilities of an Shows what an attacker can see


attacker after elevating privileges before elevating privileges

CompTIA CySA+ Cybersecurity Analyst 20


11/23/2020

Scanning Parameters and Criteria


• Server-based vs. agent-based scan

CompTIA CySA+ Cybersecurity Analyst 21


11/23/2020

Scanning Parameters and Criteria


• Server-based vs. agent-based scan
Server-Based Agent-Based
Easier to set up (central server
sends out traffic to scan targets)

CompTIA CySA+ Cybersecurity Analyst 22


11/23/2020

Scanning Parameters and Criteria


• Server-based vs. agent-based scan
Server-Based Agent-Based
Easier to set up (central server
sends out traffic to scan targets)

Increases traffic on network

CompTIA CySA+ Cybersecurity Analyst 23


11/23/2020

Scanning Parameters and Criteria


• Server-based vs. agent-based scan
Server-Based Agent-Based
Easier to set up (central server
sends out traffic to scan targets)

Increases traffic on network

Not as much access to internal


information

CompTIA CySA+ Cybersecurity Analyst 24


11/23/2020

Scanning Parameters and Criteria


• Server-based vs. agent-based scan
Server-Based Agent-Based
Easier to set up (central server Install software and run scans on
sends out traffic to scan targets) each endpoint

Increases traffic on network

Not as much access to internal


information

CompTIA CySA+ Cybersecurity Analyst 25


11/23/2020

Scanning Parameters and Criteria


• Server-based vs. agent-based scan
Server-Based Agent-Based
Easier to set up (central server Install software and run scans on
sends out traffic to scan targets) each endpoint

Increases traffic on network Much less traffic on network

Not as much access to internal


information

CompTIA CySA+ Cybersecurity Analyst 26


11/23/2020

Scanning Parameters and Criteria


• Internal vs. external scan
• Does scan execute from within corporate network?
• Or execute from outside the network via external node?
• Results vary
• Report results based on internal/external scan

CompTIA CySA+ Cybersecurity Analyst 27


11/23/2020

Episode 3.03
Scanning Special Considerations

CompTIA CySA+ Cybersecurity Analyst 28


11/23/2020

Special Scanning Considerations


• Types of data
• Scan for everything or just certain types of data?
• Understand the organization and regulations driving the scans

CompTIA CySA+ Cybersecurity Analyst 29


11/23/2020

Special Scanning Considerations


• Tools
• Updates and plug-ins help automate scans
• Nessus
• Nessus Attack Scripting Language (NASL)
• Automate aspects of scanning process
• Consistency in scans
• Recreate scans

CompTIA CySA+ Cybersecurity Analyst 30


11/23/2020

Special Scanning Considerations


• Security Control Automation Protocol (SCAP)
• Created by NIST
• Defines modules that dictate compliance requirements/settings

CompTIA CySA+ Cybersecurity Analyst 31


11/23/2020

Special Scanning Considerations


• Intrusion detection system (IDS)/intrusion prevention system (IPS)
• Firewall may reject scans

CompTIA CySA+ Cybersecurity Analyst 32


11/23/2020

Special Scanning Considerations


• Generating reports
• Templates/format
• Automated vs. manual distribution
• Possible executive presentation to client

CompTIA CySA+ Cybersecurity Analyst 33


11/23/2020

Episode 3.04
Validation

CompTIA CySA+ Cybersecurity Analyst 34


11/23/2020

Validation
• Determining whether data is true or not
• Four response types:
• True, false, negative, positive
• Four categories:
• True positive
• False positive
• True negative
• False negative

CompTIA CySA+ Cybersecurity Analyst 35


11/23/2020

Episode 3.05
Remediation and Mitigation

CompTIA CySA+ Cybersecurity Analyst 36


11/23/2020

Remediation/ Mitigation
• Configuration baseline
• Collection of all property settings of a device, OS, application, etc.
• Compare to current settings and determine changes
• Often implemented in audit process
• Find baselines from standards organizations

CompTIA CySA+ Cybersecurity Analyst 37


11/23/2020

Remediation/ Mitigation
• Identify vulnerabilities
• Due to configuration or old software
• Recommend patching software
• Especially security patches

CompTIA CySA+ Cybersecurity Analyst 38


11/23/2020

Remediation/ Mitigation
• Prioritizing
• Most crucial vulnerabilities first
• Highest probability of occurring
• Highest impact

CompTIA CySA+ Cybersecurity Analyst 39


11/23/2020

Remediation/ Mitigation
• Hardening
• Process of remediating
• Make a device less susceptible to attack

CompTIA CySA+ Cybersecurity Analyst 40


11/23/2020

Remediation/ Mitigation
• Compensating controls
• Helps mitigate vulnerability without directly addressing the cause
• Example: firewall with closed ports
• Ideally implement layers of compensating controls

CompTIA CySA+ Cybersecurity Analyst 41


11/23/2020

Remediation/ Mitigation
• Risk acceptance
• Document
• Have long-term solution to mitigate eventually

CompTIA CySA+ Cybersecurity Analyst 42


11/23/2020

Remediation/ Mitigation
• Verification of mitigation

CompTIA CySA+ Cybersecurity Analyst 43


11/23/2020

Episode 3.06
Inhibitors to Remediation

CompTIA CySA+ Cybersecurity Analyst 44


11/23/2020

Inhibitors to Remediation
• Memorandum of understanding (MOU)
• Authorizes/limits scanning activities

CompTIA CySA+ Cybersecurity Analyst 45


11/23/2020

Inhibitors to Remediation
• Service-level agreement (SLA)
• Dictates what each party does
• May limit remediation actions
• May limit scanning capabilities

CompTIA CySA+ Cybersecurity Analyst 46


11/23/2020

Inhibitors to Remediation
• Organizational governance
• Potential limits on remediation due to collateral impact

CompTIA CySA+ Cybersecurity Analyst 47


11/23/2020

Inhibitors to Remediation
• Business process interruption
• Degrading functionality
• Legacy systems
• Proprietary systems

CompTIA CySA+ Cybersecurity Analyst 48

You might also like