Are you confident that you have an effective vulnerability management strategy? Last year, we discovered more than 26,500 vulnerabilities, as opposed to over 25,000 in 2022 and 19,000 in 2021. The threat landscape continues to grow and diversify. A product in your IT landscape that was safe yesterday could become your biggest risk tomorrow. With limited resources in an ever-expanding digital world, the challenge is not only in finding new vulnerabilities, but in discerning which ones to prioritize.
Imagine you are in charge of defending a medieval city with the enemy lurking in the woods. The city walls have many cracks and breaches. Which ones should you mend first? The answer is not to simply start at one end and work towards the other end, because that leaves the rest of the city vulnerable. Instead, you first need to find and fix the weakest points in your wall – where an attack would hurt the most.
The same strategy applies to your vulnerability management. In a modern organization, a scan often reveals hundreds of thousands of weaknesses that an attacker could exploit. Like the city wall, you need to prioritize the vulnerabilities that pose the highest risk. How? By adding context to each weak point. Instead of relying on raw data, focus on contextualized vulnerability data with threat intelligence as your guide. This will transform reactive chaos into a proactive strategy.
Of the 26,500 vulnerabilities detected in 2023, only 1,114 are known to be exploited. It is not the quantity of vulnerabilities that should alarm us, but the potential damage they can cause.
Managing vulnerabilities may sound straightforward, yet many organizations still have significant cracks in their walls. Why is it so difficult? Several factors make this challenge complex. First, the volume can be overwhelming as new vulnerabilities emerge every day. Due to this huge volume, prioritization is essential. There are several frameworks and score systems to help you with this. Patching itself can also be complex. When is the right time to take a server down for maintenance?
Another common challenge is lack of visibility, often caused by dark spots and undocumented systems. After all, you cannot protect what you don’t see. Simultaneously, IT environments are becoming increasingly complex, with more assets and more dark spots. Due to this expanding attack surface, threat intelligence (keeping up with the latest threats) has become a full-time job. Lastly, organizational culture can be an obstacle as well. Do you have the right processes? Who will coordinate the patch work? And so on.
Unfortunately, many organizations fall into the trap of the following misconceptions:
Continuous asset discovery and vulnerability scanning is the baseline in vulnerability management. Scan your entire environment, not just parts of it, and repeat this weekly. Visibility is key to avoid dark spots. Once you achieve this visibility, prioritize remediation with a risk-based approach. Adopt a holistic view, using all known factors to make an informed evaluation of the risk and vulnerability of an asset, supported by threat intelligence.
The factors to use are both internal and external. For external, we start with the CVSS score. But this alone is not enough. The type, exploitability and age are also important. The most vital is if the vulnerability is known to be exploited at the moment by any threat actors. These all tell us about the external treat. For internal factors we look at the assets. Is it critical for the business, does it have sensitive data on it? Where it is located in the network also plays a part.
When all these factors are combined, a risk score can be calculated for the vulnerability and the asset it is on. This risk score is dynamic as the threats are changing rapidly. By applying this to all devices and vulnerabilities, we can rank the biggest risks and focus our efforts where they matter most. For example, perhaps it is not CVSS 9.0 that requires our immediate attention, as that vulnerability is on a device that is locked into the network and is not accessible to an adversary. Instead, a server with a CVSS 6.7 vulnerability can be more interesting because that vulnerability is on a web server that can be easily exploited from the Internet.
Unaddressed vulnerabilities can have severe consequences when someone manages to breach your city walls. Therefore, it is crucial to create awareness on all levels and ensure that everyone is on board – from system owners and users all the way up to the board. Recognize that a threat always targets the entire organization, and an intrusion affects the whole business. Be an advocate for change and obtain a high-level overview of risks in your organization. Ultimately, understanding these risks facilitates strategic decisions to enhance your security posture.