NopSec.com uses cookies to make interactions with the Company’s Websites easy and meaningful. When you visit one of the Company’s Websites, NopSec.com’s servers send a cookie to your computer. Standing alone, cookies do not personally identify you; they merely recognize your Web browser. Unless you choose to identify yourself to NopSec.com, either by responding to a promotional offer, opening an account, or filling out a Web form (such as a “Contact Us” or a “Free Trial” Web form), you remain anonymous to the Company. Please go to our privacy statement for details.

Acknowledge

Creating a Vulnerability Management Program – Cybersecurity Risk: Why You Need Both Vulnerability and Threat Assessments

Img_Threat Feeds via Security Cameras

In this blog, we’ll add to our cybersecurity considerations the concept of threats and threat intelligence. So far, we’ve looked at assets and their vulnerabilities. While these are essential building blocks in constructing a smart cybersecurity program, adding the threat element to the equation is key to any well-run, efficient cybersecurity program.

It’s not hard to understand why if you take a high-level view of the matter. What a cybersecurity team is striving for is understanding and managing the risks their organization faces. If you pick it apart, you can see that risk is the result of vulnerabilities and threats. An unlocked house may be vulnerable, but it faces a higher risk of being robbed if it’s located in the middle of a high-crime urban setting than it does at the end of a dirt road where the closest neighbor is 10 miles away. 

To be sure, no organization can take the kind of comfort the owners of the isolated rural house might enjoy. Cybercriminals don’t have to worry about distances between themselves and their victims. At the same time, a SOC would go insane if it tried to plug up all vulnerabilities everywhere all at once because of some unknown potential threats. 

The answer, then, is to combine the knowledge a team has about its own vulnerabilities and threats that may take advantage of those vulnerabilities. That’s how risk is assessed. But risk is not classified into a simple yes or no answer. There are low risks, high risks, and everything in between. The tools to be used need to be capable of helping teams quantify that risk so they know how to prioritize potential remediations. 

In this entry, we’ll take a look at how vulnerability and threat can be determined through the right methods and tools.

Reviewing Vulnerability and Threat Assessment Techniques

We looked closely at vulnerability in previous blogs, but a quick summary here can help us keep in mind what vulnerability assessment consists of. The first consideration, of course, is being fully cognizant of your attack surface. That means getting a comprehensive, up-to-the-minute inventory of your assets. The list of them is just the start. You also need to know the status of their security programs, operating systems, firmware updates, patching, and the like. And, operationally, you need to understand the context for each asset’s use: who accesses it, who has access that potentially shouldn’t, the business use of the asset, its connection to other assets, etc.

Vulnerability assessing essentially takes this assumed knowledge you have of your assets and pushes it to the next level. In our house analogy, it’s a bit like having someone who installs security systems look over your house from the burglar’s perspective. Sure, you have double-bolted doors that you always lock, but what about those basement windows? They may look narrow, but a determined burglar could easily smash them and slip inside. Better install a sensor and wire it to your alarm system.

We talked about the automated and manual methods that can test vulnerability. Vulnerability scanners look over your entire infrastructure and create updates for your team to act upon. Organizations further up the security ladder have vulnerability scanners from more than one vendor to help ensure accurate, complete readings.

But even so, vulnerabilities may be hidden. That’s where penetration testing comes in. People whose sole job is to find the weak spots in an infrastructure are hired to poke and prod and find the holes in your defenses. Because it can be costly and is only a snapshot in time, automated solutions or hybrid models (people augmented with automated tools) are being used more and more.

The next step is to combine the knowledge of your vulnerabilities with the actual threats you face.

Threat Intelligence: Tools Plus Human Assistance

Running a modern-day cybersecurity department means moving from a purely reactive state to one that anticipates the attacks that may be launched against you. To do so, you need to have a sense of your opponent:

  • Who is behind the attacks?
  • Where are they coming from?
  • What new techniques might the attackers be using?
  • Are the attackers trying to reach us through our partners or supply chain?

These are challenging questions to answer. Organizations need to move through different levels of maturity to provide the best, most complete answers. Those that do are able to process and integrate a significant amount of knowledge – not just about potential attacks that have been identified on the “clear” (surface) web, but also in the less-visible dark web and deep web where the threat actors gather and collaborate on ways to succeed.

Threat intelligence tools gather data on existing and emerging threats to disseminate this knowledge to security teams. Collecting raw data from a wide range of sources (like public intelligence, first and third parties, social media, etc.), threat intelligence solutions use machine learning algorithms to compile, consolidate, and analyze threat data to deliver three types of insights:

  • Strategic: high level, non-technical insights on broader threat trends.
  • Tactical: intelligence on tactics, techniques, and methods used by cyber attackers.
  • Operational: detailed technical insight into specific attacks and campaigns – and how to counteract them.

This, obviously, leads to a great deal of data for security teams to sift through. Threat intelligence tools are often paired with other cybersecurity solutions, like vulnerability prioritization tools and other vulnerability management platforms. This enables cybersecurity teams to get out from under the data overload and act on the insights that apply to their individual organization.  

The market for threat intelligence products has primarily been focused on large enterprises, although it is expanding to mid-sized organizations as well. These threat intelligence tools tend to be more restricted than the enterprise counterparts. The rule of thumb for any company considering purchasing threat intelligence tools is to acquire only what your organization is ready to use without becoming overwhelmed.

The Levels of Threat Intelligence Maturity

Once you have this technology in place, your organization can then proceed to move through the level of threat intelligence maturity. Understanding these levels gives your organization a road map to follow to maximize the return on your threat intelligence investment. 

There are roughly five levels of threat intelligence maturity, and it takes time to move from one to the other. Even though you can’t jump from level one to level five overnight, it’s best to understand what that process looks like.

Level One: Reactive

Here, the organization is responding to threats as they emerge without a sense of what’s next. The organization is striving to establish the fundamentals of its cybersecurity program, having a sense of its attack surface and using basic protections such as an antivirus program to build some defenses.

Level Two: Basic Risk Understanding

As we mentioned earlier, risk is a combination of vulnerabilities and threats. While the organization is getting a grasp of its vulnerabilities, it also is getting a sense of threats by incorporating Indicators of Compromise (IoC) and Indicators of Attack (IoA). Added up, these two give insights into what threats are in play and what the attackers’ intent seems to be.

It’s a good idea at this phase to collaborate with others who similarly are trying to understand what’s under threat. There are newsletters that share this information, as well as information sharing and analysis centers (ISACS). With this information, a cybersecurity team can begin to prioritize alerts, digest actionable advisories, and deploy the right patches to address current common vulnerabilities and exposures (CVEs).

Level Three: Initial Anticipatory Status

At this level, the organization is starting to get ahead of the daily reactive state and staying ahead of threats. It sees threats coming by constantly monitoring emerging threat indicators, such as targeted campaigns, exploit disclosures, and indications and warnings. On the vulnerability side, the organization is moving to a more advanced security stack with next-generation endpoint security and a Security Information Event Management (SIEM) platform.

Security and business leaders are cooperating, so each side understands the other’s needs, with the security team thus able to respond to cyberthreats according to the context of business goals and objectives.

Level Four: Mature Internal State

This organization has gone far beyond its initial reactive state and has become fully engaged in risk planning and prevention, with both a thorough internal vulnerabilities testing program and robust intelligence platforms such as those focused on Security Orchestration and automated Response (SOAR). The business context understanding has also become more developed in terms of planning for attacks. For example, the organization has segregated its networks so that different activities and operations are separated — isolating incoming threats to limited areas.

Level Five: Mature External State

The final piece of the puzzle is to determine the threats directed by cybercriminals to partners. Increasingly, supply-chain software providers and business partners are being used as a backdoor to an organization’s valued information or vulnerabilities. By extending that threat intelligence beyond an organization’s own infrastructure, the company has reached the top level of maturity.

And, as we have noted previously, cybersecurity is not an activity that is ever complete. New threats emerge continually, and the attack surface of growing organizations only gets larger. Patching is a continual effort and employing new tools in response to new threats is inevitable.

That isn’t meant to sound discouraging, just realistic. The sooner your organization starts moving up the ladder of maturity, the more secure you will become. But the movement upward never comes to a complete stop. 

Nopsec Tools for Managing Vulnerabilities and Threats

NopSec has created a set of tools designed for risk-based vulnerability management (RBVM) – that is, the risk that is derived by looking at the combination of vulnerabilities and threats. Tools include:

  • IT Asset Prioritization: This is to ensure that risk is adequately accounted for by importing asset criticality values from your CMDB or by letting NopSec’s machine learning algorithms automatically calculate the risk for you.
  • RBVM Core: Ingesting data from scanners and correlating that with threat intelligence, exploit, NVD, and open-source intelligence feeds provides an accurate assessment of vulnerability risk and SLA assignment.
  • RBVM Container: This tool helps minimize your attack surface by ingesting container configuration and vulnerability scan data to prioritize fixes in your digital artifacts before they are run as images.
  • RBVM Config: Leveraging scanner assessment results to compare configuration policy violations against standards like CIS Benchmarks, this tool helps you prioritize remediation actions.
  • AppSec AVC: By connecting your DAST/SAST scanners and CMDB, you can effectively manage the risk of your application stack.

At NopSec, we know how much there is to think about when you’re trying to lead your security team from the initial stages of protection to the more advanced levels. See how other leading cybersecurity teams are succeeding by reading the 2022 State of Vulnerability Management Report.

 

FAQ

Question #1: What is the difference between a vulnerability assessment and a vulnerability scan?

Answer: A vulnerability scan is an automated process that scans your existing environment for any known vulnerabilities. A vulnerability assessment typically includes a vulnerability scan, but combines automated tools like vulnerability scanners with human intelligence and expertise using techniques such as pentesting for a more complete view into your organization’s risk.  

Question #2: What does a threat intelligence tool do?

Answer: Threat intelligence tools collect, consolidate, and analyze threat data from a wide range of sources. These sources can include internal and external data, public or open source data, social media intel, and more. 

Question #3: How do threat intelligence tools work?

Answer: Threat intelligence tools collect data from a wide range of sources and utilize machine learning algorithms to produce insights on strategic, tactical, and operational levels. 

 

If you haven’t read the previous installments of this series you can do so here:

Next: Creating a Vulnerability Management Program – Vulnerability Remediation: More Complex than You Might Imagine

Schedule a Product Demo Today!

See how NopSec's security insights and cyber threat exposure management platform can organize your security chaos.