CIOReview | | 9 JUNE 2022Vulnerability Management fulfills this critical role as the process of identifying, evaluating, addressing and reporting security issues in systems and the software deployedand advancements have provided clearer knowledge of the environment and deeper insights into understanding where security issues exist. This will continue to evolve as a staple in securing a company's IT assets. Identification: Vulnerability identification has expanded to include investigating for misconfigurations, poor processes in access control, lack of system maintenance for known threat vectors and insecure coding practices. Innovation in exposure detection continues to deliver new tools and solutions to enable more robust examination and monitoring for security flaws. Identification not only detects irregularities at the specific instance level, but also explores the extent of potential impact and provides steps to resolve exposure. Prioritization:Not all things are created equal, including security issues. Determining the threat and risk from exposures requires acute understanding of the environment, controls deployed and knowledge of attack vectors that can be used for potential exploitation of a weakness against these controls at each level in the security stack. This complex analysis determines the level of severity and prioritization for remediation to deter possible impact to the business.Remediation:Remediation of vulnerabilities typically requires actions of the solution owner. This unanticipated work for the technologist can come at any time based on potential exposure, typically against planned schedules and often new to the technologist's thinking. The art of Vulnerability Management lies in working with the solution owner in resolving issues in a timely manner through clearly communicating the details of the security finding and the associated risk. This often requires collaboration across the enterprise, helping technologists overcome obstacles, training in secure methods, analyzing trends, recognizing and resolving systemic issues, while tracking and reporting resolution to identified findings. This stage of Vulnerability Management is where you see key elements of the company culture in action. Automation:Vulnerability Management efforts often commensurate with the size of the company's technology footprint. For large companies, this may require a dedicated team to aggregate data from multiple sources and correlate finding details with asset management as well as ownership information in a continuous repeatable process. The sensitive nature of the discoveries would need to have strong controls and available on demand, presented in a consumable way to notify, monitor and track remediation efforts. The futureCompanies must evolve to stay ahead in today's global environment. Security and technology must be integrated with the business to adapt to the rapid pace. This involves being vigilant in updating solutions critical to organizations' operations and mission as well as eliminating solutions with dated/immature security controls to reduce organizations' security footprint from potential exposure.Availability and accessibility of cloud processing allow for solutions to be deployed faster, which creates additional challenges for Vulnerability Management. The ephemeral nature of cloud technology can offer a level of obfuscation from threat actors, but does not remove a solution's weaknesses. This transitory nature also challenges traditional tracking methods for Vulnerability Management. Innovation is providing capabilities for detection of insecure code/configuration and preventing security flaws prior to deployment. As technology changes, ensuring adaptive security controls to protect any environment is crucial. Vulnerability Management will continue to search for weaknesses not detected and for innovative ways to automate mitigation along with providing insight into where education, practices and hardening of controls need to improve.
<
Page 8 |
Page 10 >