SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
CYBER RISK
REDUCTION SERIES
01.01

SOFTWARE BASED
VULNERABILITITES
Overview
Organizations
continuously face risk
rooted in an increasing
and evolving set of threat
vectors. These threat
vectors aggregate to
create an overall attack
surface area. Reducing the underlying vulnerabilities results in a
reduced attack surface area. This reduction limits adversaries’
ability to exploit vulnerabilities and impact what your
organization has identified as valuable.
ClearArmor
ClearArmor™ Corporation
519 Easton Rd.
Riegelsville, PA 18077
info@cleararmor.com
http://www.cleararmor.com
+1-(610) 816-0101
Step 1 – Accept that no risk reduction is sustainable possible without a structured
CyberSecurity program. That Program must be based on a recognized standard.
The most accepted standard is the NIST CyberSecurity Framework (CSF).
Step 1- Structure and Standards are foundational to CyberSecurit
Step 2 – A structured CyberSecurity program requires process, technology, and
governance. ClearArmor CyberSecurity Resource Planning (CSRP) is the only
solution that truly aligns organizations to the NIST CSF. This is achieved by
ClearArmor’s Momentum Methodology (M2) and the Intelligent CyberSecurity
Platform (ICSP).
Step 2 - Process, Technology, and Governance are foundational to CyberSecurity
Step 3 – Assign Ownership to all NIST CSF Functions, Categories, and Sub-
Categories. These are the ‘Things’ that organizations must do to ensure
‘CyberSecurity’. Ownership requires a Responsible Role (Responsible for Doing)
and an Accountable Rile (Responsible for Auditing). By assigning ownership,
organizations are able to comply with guidance provide by the NIST CSF.
Step 3- Assignment of Accountable and Responsible Roles are foundational to CyberSecurity
Step 4 – Policy - establish your organizations software patching, upgrade policy.
A subset of this will include maximum durations for remediations to reach
production, testing guidance, and methods to distribute software patches.
Step 4 – Creation of clearly defined policy is foundational to CyberSecurity
2 Copyright © 2018 Clear Armor Corporation. All Rights Reserved
Step 5 – Discovery your entire network. This includes, but is not limited to, all
hardware, software, configuration information, used ports, utilization, etc. This
requires technology and process that are complete. Only the ClearArmor
Discovery, Classification, Indentification (DCI) process achieves a level of insight
into your organizations networked assets, software, hardware, utilization that is
instrumental to a significant number of NIST CSF sub-categories.
Step 5 – Discovery is foundational to CyberSecurit
Step 6 – Categorization is critical to achieving focused efforts. Quantities of
active vulnerabilities in an organization can be staggering. Lack of prioritization
of efforts increases risk and the likelihood of a successful exploit. In the
ClearArmor ICSP, categorization occurs at three levels.
 Level 1 – Automated Categorization based on device type (Network
Devices, Storage Device, Workstation device, Server Device)
 Level 2 – White Listing – Devices are initially not listed. Through automations
or manual methods, all endpoints are identified as ‘White Listed’, ‘Limited
Duration White Listed’, or ‘Black Listed’.
 Level 3 – Landscape (Examples: Production, QA, Test, Dev1, Dev2, Patch)
 Level 4 – System Membership (Example: HRIS, ERP, AD, eMail, BI, etc)
Last, ClearArmor provides organizations with a workflow that allows organizations
to categorize Risk Imperatives – to – Business Functions – to – Systems – to
Endpoints Based on this ability, it is possible to focus remediations that directly
relate to business risk imperatives, business functions, systems, or landscapes.
Step 6- Categorization is foundational to CyberSecurity
Step 7 – Precision Identification of Vulnerabilities is achieved through our
 advanced automated software discovery and identification. This goes
beyond typical methods that only go as far are reading registry
information. The ClearArmor discovery process includes all executables,
services, dll’s, and other types of files to gain greater understanding of
what is installed where. All software, all version information, all distribution
across the organization. At this stage a baseline of the preliminary
vulnerability information is achieved, allowing for progress measurement.
 Consumption of our Proprietary IT-Pedia data, the de facto source for
understanding critical information such as associated NIST Identified
vulnerabilities, end of support, end of sales, end of life, and a multitude of
other information. If a new device, software package, vulnerability, or
other details are identified in the wild, we bring that information down into
your installation of the ICSP.
Step 7- Identification of vulnerabilities is a critical element of all CyberSecurity Programs
3 Copyright © 2018 Clear Armor Corporation. All Rights Reserved
Step 8 – Review the discovered vulnerabilities in any number of ways, by
distribution across the organization, by severity, by location, by type of devices,
by category of device, etc. Every organization will prioritize their remediation
targets differently. There is no one right way. At first this will seem to be
overwhelming, once your organization has adopted its patching and
vulnerability remediation process, and has begin to remediate issues, the noise
and information will begin to calm.
Step 8- Assessing active vulnerabilities is a critical element of all CyberSecurity Programs
Step 9 – Target the vulnerabilities to remediate, following your organizations
policy. This may change after initial work efforts are underway. More specifically,
the organization may focus on mitigating the top ‘X’ % of impacted software
packages. In many cases an initial focus may eliminate a large percentage of
existing issues. After this first pass, the organization may go through a series of
passes aimed at high importance systems.
Additionally, the data available to your organization is significant at this point. It
provides you with the ability to visualize the problem, target the solution, and
catalytically enable your patching solutions to successfully operate.
Step 9- Focused efforts are a key to cost effectively reducing risk
Step 10 – As your endpoints are patched or software is upgrades, the discovery
process will automatically pick up changes through the organization. Daily
review off changes to your current vulnerabilities provide the ability to
continuously remediate and assess success.
Step 10 – Vulnerability remediation is a recurring process of a structured CyberSecurity Program
ClearArmor CSRP is CyberSecurity
See your Active Vulnerabilities
4 Copyright © 2018 Clear Armor Corporation. All Rights Reserved
Assign CyberSecurity Ownership Across Your Organization
See Detailed Information on All Active Vulnerabilities
See Detailed Information on the affected Endpoints
Understand the Number of distinct Version affected by the Vulnerability and the Distribution across your organization
5 Copyright © 2018 Clear Armor Corporation. All Rights Reserved
CyberSecurity Resource Planning
CSRP = Methodology + Technology
A structured approach to CyberSecurity

Contenu connexe

Tendances

The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygieneThiagu Haldurai
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Bossrbrockway
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Skybox Security
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM SuccessAlienVault
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 
Software Vulnerability management
Software Vulnerability management Software Vulnerability management
Software Vulnerability management Kishor Datta Gupta
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And RiskChandrashekhar B
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleEnterpriseGRC Solutions, Inc.
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability AssesmentDedi Dwianto
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment PresentationLionel Medina
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management Argyle Executive Forum
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsBSides Delhi
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Managementjpubal
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management ProgramBeyondTrust
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Skybox Security
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationExigent Technologies LLC
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveyEdgar Alejandro Villegas
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 

Tendances (20)

The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygiene
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Software Vulnerability management
Software Vulnerability management Software Vulnerability management
Software Vulnerability management
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security Controls
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 

Similaire à Software Vulnerabilities Risk Remediation

ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIESClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIESBruce Hafner
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystepAllan Crowe PCIP
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultSOCVault
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperTawnia Beckwith
 
Bit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printBit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printjames morris
 
How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)Scott Sutherland
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingInvincea, Inc.
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementAnton Chuvakin
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksIvanti
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured WorldJennifer Mary
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report exampleIhor Uzhvenko
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 

Similaire à Software Vulnerabilities Risk Remediation (20)

ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIESClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
Lastline Case Study
Lastline Case StudyLastline Case Study
Lastline Case Study
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
 
Bit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printBit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_print
 
Managing Compliance
Managing ComplianceManaging Compliance
Managing Compliance
 
How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability Management
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 

Dernier

Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 

Dernier (20)

VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 

Software Vulnerabilities Risk Remediation

  • 1. CYBER RISK REDUCTION SERIES 01.01  SOFTWARE BASED VULNERABILITITES Overview Organizations continuously face risk rooted in an increasing and evolving set of threat vectors. These threat vectors aggregate to create an overall attack surface area. Reducing the underlying vulnerabilities results in a reduced attack surface area. This reduction limits adversaries’ ability to exploit vulnerabilities and impact what your organization has identified as valuable. ClearArmor ClearArmor™ Corporation 519 Easton Rd. Riegelsville, PA 18077 info@cleararmor.com http://www.cleararmor.com +1-(610) 816-0101 Step 1 – Accept that no risk reduction is sustainable possible without a structured CyberSecurity program. That Program must be based on a recognized standard. The most accepted standard is the NIST CyberSecurity Framework (CSF). Step 1- Structure and Standards are foundational to CyberSecurit Step 2 – A structured CyberSecurity program requires process, technology, and governance. ClearArmor CyberSecurity Resource Planning (CSRP) is the only solution that truly aligns organizations to the NIST CSF. This is achieved by ClearArmor’s Momentum Methodology (M2) and the Intelligent CyberSecurity Platform (ICSP). Step 2 - Process, Technology, and Governance are foundational to CyberSecurity Step 3 – Assign Ownership to all NIST CSF Functions, Categories, and Sub- Categories. These are the ‘Things’ that organizations must do to ensure ‘CyberSecurity’. Ownership requires a Responsible Role (Responsible for Doing) and an Accountable Rile (Responsible for Auditing). By assigning ownership, organizations are able to comply with guidance provide by the NIST CSF. Step 3- Assignment of Accountable and Responsible Roles are foundational to CyberSecurity Step 4 – Policy - establish your organizations software patching, upgrade policy. A subset of this will include maximum durations for remediations to reach production, testing guidance, and methods to distribute software patches. Step 4 – Creation of clearly defined policy is foundational to CyberSecurity
  • 2. 2 Copyright © 2018 Clear Armor Corporation. All Rights Reserved Step 5 – Discovery your entire network. This includes, but is not limited to, all hardware, software, configuration information, used ports, utilization, etc. This requires technology and process that are complete. Only the ClearArmor Discovery, Classification, Indentification (DCI) process achieves a level of insight into your organizations networked assets, software, hardware, utilization that is instrumental to a significant number of NIST CSF sub-categories. Step 5 – Discovery is foundational to CyberSecurit Step 6 – Categorization is critical to achieving focused efforts. Quantities of active vulnerabilities in an organization can be staggering. Lack of prioritization of efforts increases risk and the likelihood of a successful exploit. In the ClearArmor ICSP, categorization occurs at three levels.  Level 1 – Automated Categorization based on device type (Network Devices, Storage Device, Workstation device, Server Device)  Level 2 – White Listing – Devices are initially not listed. Through automations or manual methods, all endpoints are identified as ‘White Listed’, ‘Limited Duration White Listed’, or ‘Black Listed’.  Level 3 – Landscape (Examples: Production, QA, Test, Dev1, Dev2, Patch)  Level 4 – System Membership (Example: HRIS, ERP, AD, eMail, BI, etc) Last, ClearArmor provides organizations with a workflow that allows organizations to categorize Risk Imperatives – to – Business Functions – to – Systems – to Endpoints Based on this ability, it is possible to focus remediations that directly relate to business risk imperatives, business functions, systems, or landscapes. Step 6- Categorization is foundational to CyberSecurity Step 7 – Precision Identification of Vulnerabilities is achieved through our  advanced automated software discovery and identification. This goes beyond typical methods that only go as far are reading registry information. The ClearArmor discovery process includes all executables, services, dll’s, and other types of files to gain greater understanding of what is installed where. All software, all version information, all distribution across the organization. At this stage a baseline of the preliminary vulnerability information is achieved, allowing for progress measurement.  Consumption of our Proprietary IT-Pedia data, the de facto source for understanding critical information such as associated NIST Identified vulnerabilities, end of support, end of sales, end of life, and a multitude of other information. If a new device, software package, vulnerability, or other details are identified in the wild, we bring that information down into your installation of the ICSP. Step 7- Identification of vulnerabilities is a critical element of all CyberSecurity Programs
  • 3. 3 Copyright © 2018 Clear Armor Corporation. All Rights Reserved Step 8 – Review the discovered vulnerabilities in any number of ways, by distribution across the organization, by severity, by location, by type of devices, by category of device, etc. Every organization will prioritize their remediation targets differently. There is no one right way. At first this will seem to be overwhelming, once your organization has adopted its patching and vulnerability remediation process, and has begin to remediate issues, the noise and information will begin to calm. Step 8- Assessing active vulnerabilities is a critical element of all CyberSecurity Programs Step 9 – Target the vulnerabilities to remediate, following your organizations policy. This may change after initial work efforts are underway. More specifically, the organization may focus on mitigating the top ‘X’ % of impacted software packages. In many cases an initial focus may eliminate a large percentage of existing issues. After this first pass, the organization may go through a series of passes aimed at high importance systems. Additionally, the data available to your organization is significant at this point. It provides you with the ability to visualize the problem, target the solution, and catalytically enable your patching solutions to successfully operate. Step 9- Focused efforts are a key to cost effectively reducing risk Step 10 – As your endpoints are patched or software is upgrades, the discovery process will automatically pick up changes through the organization. Daily review off changes to your current vulnerabilities provide the ability to continuously remediate and assess success. Step 10 – Vulnerability remediation is a recurring process of a structured CyberSecurity Program ClearArmor CSRP is CyberSecurity See your Active Vulnerabilities
  • 4. 4 Copyright © 2018 Clear Armor Corporation. All Rights Reserved Assign CyberSecurity Ownership Across Your Organization See Detailed Information on All Active Vulnerabilities See Detailed Information on the affected Endpoints Understand the Number of distinct Version affected by the Vulnerability and the Distribution across your organization
  • 5. 5 Copyright © 2018 Clear Armor Corporation. All Rights Reserved CyberSecurity Resource Planning CSRP = Methodology + Technology A structured approach to CyberSecurity