2 cissp ® Official Study Guide Eighth Edition


Vulnerability Assessments



Download 19,3 Mb.
Pdf ko'rish
bet677/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   673   674   675   676   677   678   679   680   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Vulnerability Assessments 
A vulnerability assessment will often include results from vulnerability scans, but the 
assessment will do more. For example, an annual vulnerability assessment may analyze 
all of the vulnerability scan reports from the past year to determine if the organization 
is addressing vulnerabilities. If the same vulnerability is repeated on every vulnerability 
scan report, a logical question to ask is, “Why hasn’t this been mitigated?” There may 
be a valid reason and management chose to accept the risk, or it may be that the vulner-
ability scans are being performed but action is never taken to mitigate the discovered 
vulnerabilities. 
Vulnerability assessments are often done as part of a risk analysis or risk assessment to 
identify the vulnerabilities at a point in time. Additionally, vulnerability assessments can 
look at other areas to determine risks. For example, a vulnerability assessment can look at 
how sensitive information is marked, handled, stored, and destroyed throughout its lifetime 
to address potential vulnerabilities. 
The term 
vulnerability assessment
is sometimes used to indicate a risk 
assessment. In this context, a vulnerability assessment would include the 
same elements as a risk assessment, described in Chapter 2, “Personnel 
Security and Risk Management Concepts.” This includes identifying the 
value of assets, identifying vulnerabilities and threats, and performing a 
risk analysis to determine the overall risk.


728
Chapter 16 

Managing Security Operations
Chapter 15, “Security Assessment and Testing,” covers penetration tests. Many penetra-
tion tests start with a vulnerability assessment.
Common Vulnerabilities and Exposures 
Vulnerabilities are commonly referred to using the Common Vulnerability and Exposures 
(CVE) dictionary. The CVE dictionary provides a standard convention used to identify 
vulnerabilities. MITRE maintains the CVE database, and you can view it here:
www.cve
.mitre.org
 . 
MITRE looks like an acronym, but it isn’t. The founders do have a history 
as research engineers at the Massachusetts’s Institute of Technology (MIT) 
and the name reminds people of that history. However, MITRE is not a part 
of MIT. MITRE receives funding from the U.S. government to maintain the 
CVE database.
Patch management and vulnerability management tools commonly use the CVE diction-
ary as a standard when scanning for specifi c vulnerabilities. As an example, the WannaCry 
ransomware, mentioned earlier, took advantage of vulnerability in unpatched Windows 
systems, and Microsoft released Microsoft Security Bulletin MS17-010 with updates to pre-
vent the attack. The same vulnerability is identifi ed as CVE-2017-0143. 
The CVE database makes it easier for companies that create patch management and vul-
nerability management tools. They don’t have to expend any resources to manage the nam-
ing and defi nition of vulnerabilities but can instead focus on methods used to check systems 
for the vulnerabilities.
Summary 
Several basic security principles are at the core of security operations in any environment. 
These include need-to-know, least privilege, separation of duties and responsibilities, job 
rotation, and mandatory vacations. Combined, these practices help prevent security inci-
dents from occurring, and limit the scope of incidents that do occur. Administrators and 
operators require special privileges to perform their jobs following these security principles. 
In addition to implementing the principles, it’s important to monitor privileged activities to 
ensure that privileged entities do not abuse their access. 
With resource protection, media and other assets that contain data are protected 
throughout their lifecycle. Media includes anything that can hold data, such as tapes, inter-
nal drives, portable drives (USB, FireWire, and eSATA), CDs and DVDs, mobile devices, 
memory cards, and printouts. Media holding sensitive information should be marked, 
handled, stored, and destroyed using methods that are acceptable within the organiza-
tion. Asset management extends beyond media to any asset considered valuable to an 


Exam Essentials 
729
organization—physical assets such as computers and software assets such as purchased 
applications and software keys.
Virtual assets include virtual machines, virtual desktop infrastructure (VDI), software-
defined networks (SDNs), and virtual storage area networks (VSANs). A hypervisor is the 
software component that manages the virtual components. The hypervisor adds an additional 
attack surface, so it’s important to ensure that it is deployed in a secure state and kept up-to-
date with patches. Additionally, each virtual component needs to be updated separately.
Cloud-based assets include any resources stored in the cloud. When negotiating with 
cloud service providers, you must understand who is responsible for maintenance and secu-
rity. In general, the cloud service provider has the most responsibility with software as a 
service (SaaS) resources, less responsibility with platform as a service (PaaS) offerings, and 
the least responsibility with infrastructure as a service (IaaS) offerings. Many organizations 
use service-level agreements (SLAs) when contracting cloud-based services. The SLA stipu-
lates performance expectations and often includes penalties if the vendor doesn’t meet these 
expectations.
Change and configuration management are two additional controls that help reduce out-
ages. Configuration management ensures that systems are deployed in a consistent manner 
that is known to be secure. Imaging is a common configuration management technique 
that ensures that systems start with a known baseline. Change management helps reduce 
unintended outages from unauthorized changes and can also help prevent changes from 
weakening security.
Patch and vulnerability management procedures work together to keep systems pro-
tected against known vulnerabilities. Patch management keeps systems up-to-date with 
relevant patches. Vulnerability management includes vulnerability scans to check for a wide 
variety of known vulnerabilities (including unpatched systems) and includes vulnerability 
assessments done as part of a risk assessment.
Exam Essentials

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   673   674   675   676   677   678   679   680   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish