OWASP Vulnerability Management Guide (OVMG) - June 1, 2020
10
2.2.4
Compare and analyze aging
data by the severity of
vulnerabilities and their
share:
There are two aspects of vulnerability aging: the date of publishing a
vulnerability (reflected in CVE number) and the time of discovery. Aging
vulnerability data analysis will impact the priority for remediation work.
2.2.4.1
-enterprise-wide
Think about enterprise elements that have the oldest vulnerabilities.
2.2.4.2
-among all other vulnerable
assets
An asset could be more susceptible to exploitation if aged vulnerabilities
prevail. On the discovery side, if your report shows that the vulnerability was
discovered 180 days ago, it can mean that the specific business process did
not get fully adopted or lacks quality control.
2.2.4.3
-by functional groups
Aggregating this data by functional groups, namely which are responsible for
remediation of asset groups, would be an accountability reference in your
report.
2.2.4.4
-by type of environment
For example: a public infrastructure vs. private infrastructure, production vs.
testing. Define what contrasts are essential to your organization.
2.2.4.5
-by type of system
For example, public servers, internal servers, network endpoints,
workstations, IoT systems, SCADA systems. You can go more granular to
distinguish DNS servers from email servers, e.g., or firewall interface from
other network devices. You can identify vulnerability by the type of operating
system.
2.2.4.6
-by CVE numbering authority
Look at your data and assess whether there is any disproportion among
specific vulnerabilities.
2.2.4.7
-by type of vulnerability
Please see 2.1.5 and cross-reference the test results among functional
groups. By doing that, you would be able to map certain types of risks that
should be mitigated or accepted organizationally.
2.2.5
Draw out trends by count
and percentage utilizing KPI
that matter to your enterprise
risks and compliance
As you repeat the OVMG tricycle, you
’d be able to observe changes that put
everything in perspective. Note, a downward trend may mean that we are
doing a good job remediating vulnerabilities or that we
don’t detect them
correctly
. If that’s a concern, consult with 1.4 Confirm findings.
2.2.6
Determine exploitability of
vulnerable assets by
severity; specify count,
percentage, decrease or
increase
Use a reputable source for exploitation and
don’t default to one source only,
such as a KB reference. Some software companies may be less transparent
than others.
End Goal: you should create (and later revise) metrics for vulnerability reports. These metrics should be consistent and
make sense for the audience of the reports (management and teams assigned to do remediation work).
2.3
Audit Trail
Dostları ilə paylaş: