You are on page 1of 6

Vulnerability management

Why managing software vulnerabilities is business critical –


and how to do it efficiently and effectively

Ankit Singhal
1 Introduction
A number of factors are making vulnerability also having to verify that organisations are
management an increasingly pressing issue. In following a risk-based approach and managing
addition to industry good practice standards such as the vulnerabilities
NIST Cybersecurity Framework, ISO 27001 and COBIT, appropriately. But what exactly do ‘appropriately’ and ‘risk
which for years have required companies to identify based’ mean?
critical vulnerabilities
and implement timely remediation measures, As such, as a CISO and compliance officer you should
various industry regulations are now requiring address vulnerability management for IT
organisations processing sensitive data such as environments where sensitive data or data with
personal identifiable data (PII), payment cardholder enhanced regulatory requirements are processed in
data (PAN) and bank client idendifiable data (CID) to order to remain compliant and to identify and manage
implement risk-based vulnerability management. your attack surface.

Despite the growing awareness, recent cyber and This white paper aims to support an organisation to gain
ransomware attacks are proof that many organisations visibility on existing gaps and to manage vulnerabilities
are still failing to address known vulnerabilities with in line with industry good practice standards, as well as to
due care and urgency. In the majority of cyber-attacks, comply with financial market regulations such as PCI DSS,
it’s preciselythese vulnerabilities that are exploited to attack Swift, Finance Market Regulation in Switzerland (Finma),
corporate and government IT infrastructure. Lichtenstein (FMA), Singapore (MAS) and Europe (EBA/GL).

To fill this gap, regulatory bodies are now requiring


corporates that process sensitive data to address
vulnerability management. As a result, auditors are

Ankit Singhal
1.1 Vulnerability management scope
Vulnerability management involves far more than merely It’s also essential to establish a common understanding of
evaluating, implementing and running a vulnerability what vulnerability management means for the
scan- ning tool. Every organisation needs transparency organisa- tion and what scope it covers. When IT is
on the known vulnerabilities within its IT assets to outsourced, for example, the organisation still needs to
manage the risk of the resulting attack surface. This take care of vulner- abilities in the outsourced IT
requires a comprehen- sive set-up with diverse environment.
components: Vulnerability management might have different flavours
• IT governance needs to be in place and mature depending on the organisation’s IT footprint. For
enough to provide clarity on who’s responsible for example, if the organisation develops its own software
compliance of the organisation’s IT estate and to patch code or uses partners to develop bespoke software, the
a system within a defined timeframe. If – for whatever scope of vul- nerability management might be extended
reason – this doesn’t work or it takes longer than the
to cover more than just the known and published
defined timeframe to patch, compensatory
vulnerabilities for com- mercial off-the-shelf IT products.
remediation meas- ures must be applied, or the
Vulnerability manage- ment has to cover the entire
relevant management role must formally accept the
residual risk. technology stack, including:
• IT infrastructure: network appliances (switches, routers,
• IT and cyber risk management helps business and IT load balancers), smart devices (printers, scanners), IoT/
leaders understand the potential business impact OT and building control etc.
and take the right actions. When they accept a risk,
leaders need to understand the potential threat and • IT platforms: operating systems, databases and storage.
the busi- ness impact that comes with it. • IT applications: web servers, Java Runtime, middleware
• IT service management process integration is and standard tools such as web browsers and Acrobat
required to integrate vulnerability management in the Reader.
existing IT service management and IT security man- All this means that vulnerability management isn’t just an
agement process framework. The focus should be aspect of IT hygiene, but an essential part of IT risk and
on aligning vulnerability management with IT asset compliance management, and key to establishing and
and software life cycle management, monitoring and maintaining trust in IT services. A vulnerability scan verifies
event management, and incident management. This whether patches (or other mitigation measures) are
allows critical vulnerabilities to be handled in due time applied within the defined timeframe. To apply patches
and if necessary escalated as a security incident.
and other remediation measures, change and patch
• IT and security tool landscape integration enable management procedures need to be executed by the
vulnerabilities to be assigned to the appropriate peer relevant teams.
group, use to be made of orchestration and automa-
The assessment results in an overview of the application
tion to concentrate on the critical vulnerabilities for
landscape and its associated data processing,
the organisation in question, different viewpoints to be
consolidated, and the SOC team to be provided with providing you with a comprehensive picture of your
relevant information on the attack surface. applications, prioritised by operational importance and
dependencies (risk based approach). This approach
Given these complex and interlocking requirements, many
ensures prioritisation of your resources across the
organisations are struggling to bring vulnerability man-
organisation’s applications, so you can start by
agement to the next level – not just to identify vulnerabili-
addressing the highest risks in relation to data
ties, but also to agree where and within what timeframe
minimisation.
remediation measures will be applied and how to
handle exceptions where no patch is available or the
patch can’t be applied.

4 | Vulnerability management
Ankit Singhal
2 Terms and definitions

Term Definition

CI Configuration Item

CID Client Identifiable Data

CMDB Configuration Management Data Base

COSO Committee of Sponsoring Organisations of the Tre dway


Commission (www.coso.org) a

IP Intellectual Property

LOD Line of Defence in terms of IT governance according to COSO

PAN Primary Account Number of a debit/credit card

PII Personal Identifiable Information

SOAR Security Orchestration, Autom ation & Response

A n k i t5 S i n g h a| l
Vulnerability management
3 Methodology
Figure 1: The vulnerability management process

1. Prework: IT governance
Prework
Vulnerability Management
as a foundation to identify
Scope IT Governance what IT assets are in scope
framework Tooling & tool and to
integration Process Integration
have clearly defined roles and
Sourcing Options
responsibilities to establish
and maintain ‘compliant data
processing’.
Continuous Improvement
Process maturation 2. Process integration:
Risk appetite / Thresholds Vulnerability
Foster Automation
management is not a new
process, but
Reporting / Dashboarding Alert
Risk Assessment Scan
rather a different angle on IT
KPI/KRI Monitoring Scope monitoring, event management
and incident response. This
includes incident management for
handling a critical vulnerability.
Consequently, compliance
Vulnerability needs to be managed by
Management
Triage / assignment defining technical
Rescan Prioritize standards and systematically
Validate Business impact monitoring
Criticality / Severity
compliance with the IT standards.
Remediate
3. Continuous improvement:
Instead of aiming for the ‘perfect’
solution, start small and quick,
Change / patch and improve over time by
Compensating controls expanding scope and fostering
Risk acceptance
automation.

Tooling and tool integration are essential to get the best seamless integration into the IT service management (IT
value and benefit from vulnerability management. For ticketing) system and the IT asset register/CMDB,
optimum integration, consider combining vulnerability and use automation capabilities and playbooks rather
scanning tools with an orchestration solution for than designing workflows in many different tools.

3.1 IT governance and risk management as a foundation


The aim of vulnerability management is to identify • Control environment: oversight, structures for
known vulnerabilities that would harm the authorities, responsibilities and accountability.
organisation if exploited. Risk management helps to • Risk assessment: identifying, assessing and managing
identify the vulnerabilities relevant for the organisation risks according to the agreed risk appetite.
so that it can • Control activities: implementing and executing controls
make best use of the available resources and in a to comply with regulations and reduce risks to an
focused way. IT governance according to COSO is a acceptable level.
framework for balancing risk and controls to accomplish • Information and communication: internal/external
objectives. COSO therefore introduces the three lines communication on the objectives.
of defence along the following lines: • Monitoring activities: verifying controls are in place and
effective.

6 | Vulnerability management
Ankit Singhal
Figure 2: The three lines of defence in governance according to COSO

Sets organisation’s
Organisations board objectives

U N I T
Conto l Environm ent Framework used to

E N T I T L - L E V E L
manage risk and

FUNCTION
D I V I S I O N

B U S I N E S S
Risk Assessme nt control to accomplish
objectives
Con trol Activitie s

Informatio n & Commu nication

Monit oring Activi ties

1st Line of Defence 2nd Line of Defence 3rd Line of Defence


Financial Control

Security Organisational
structure to
Risk Management execute risk and
Management Internal Control Internal
control duties
Controls Measures Quality Audit

Inspection

Compliance

For vulnerability management this means:


• 1st line of defence: • 2nd line of defence (LOD2). A combination of IT
• Management control (LOD1 BU). The security (defines policy framework and
business unit responsible needs to identify data requirements), IT and cyber risk (defines risk metric
categories processed along the business and methodology) and compliance (helps IT security
process, identify applicable laws and to translate regulatory, legal and contractual terms
regulations to comply with, and bear overall into practical requirements for the organisation).
responsibility for compliance.
The business unit needs to identify whether • 3rd line of defence (LOD3). The internal and external
and which market services process bank audit, which verifies compliance based on evidence
client data, PCI cardholder data or SWIFT provided and reports deviation from internal and
transactions. external regulations and standards.
• Control measure for IT (LOD1 IT). Within IT, a
dedicated team needs to define the applicable
internal control measures for each technology in
scope in order to specify the technical
standards to comply with the regulatory
requirements.
IT architecture or IT quality assurance defines the
set of standard IT products to be used in the IT
estate to manage the life cycle and to ensure
security patches are applied within a defined
timeframe.

A n k i t7 S i n g h a| l Vulnerability management

You might also like