I

advertisement
©2003 By Information Systems Audit and Control Association
www.isaca.org
F E AT U R E
Optimizing an Organization’s Security
Effectiveness by Using Vulnerability
Management to Support the Audit Function
By Eva Bunker, CISSP
I
t is difficult to control what one cannot define, apply a
process to or measure. Now more than ever, this applies to
network vulnerabilities. Today’s environment is made up
of interconnected, collaborative enterprises that are increasingly
dispersed, complex and constantly changing. In addition,
approximately 300 new vulnerabilities emerge each month,
according to the CERT® Coordination Center at Carnegie
Mellon University.
Ongoing vulnerability management extends the traditional
role of vulnerability assessments to help today’s enterprises
effectively mitigate the growing set of security challenges.
Today’s environment requires a process that establishes a
continuous framework for linking strategic goals to tactical
execution through performance measurement. This common
framework should be applied across the enterprise to close the
information gap among audit team executives, security teams
(if they exist) and information technology (IT) operations,
which results in everyone working together in an ongoing,
proactive fashion. An integrated vulnerability management
program also results in greater visibility, measurability and
control for the processes of discovery and remediation of
vulnerabilities across an extended enterprise.
Audit groups in particular should realize many benefits
from a strong vulnerability management program, including
the ability to:
• Provide more meaningful reports to management
• Achieve a more complete risk analysis across the extended
enterprise on a regular basis, while requiring fewer resources
• Establish timely control checks that test processes on a continual basis
Vulnerability management facilitates frequent assessments
and the rapid delivery of assessment results. It also enables the
organization to capitalize on research efforts every day through
a streamlined process. Defining a remediation process allows
those efforts to be optimized. Lastly, progress tracking is
accessible to measure current and historical efforts from corporate and team performance perspectives.
The foundation of an optimized vulnerability management
program consists of:
• A clear plan to set expectations and drive the process
• A clearly defined “accountability map” to document roles
and responsibilities as well as streamline information
distribution
• A central information system to facilitate vulnerability
management across the enterprise by categorically storing
28
the results of assessments, cataloging information system
(IS) assets, and applying accountability map rules and
measurements
Vulnerability management facilitates the rapid delivery of
assessment results and enables research efforts to be streamlined. Remediation efforts are optimized. Progress tracking is
accessible to measure up-to-date and historical efforts.
Vulnerability Management Plan
For a vulnerability management plan to be effective, one
first must have approval from upper management. Without
management support, the perceived ability to enforce
vulnerability management policies is diminished severely.
Traditionally, vulnerability assessment has been viewed as a
technical problem that the chief executive officer (CEO) would
never understand. By providing a plan with measurable results,
as well as a visible means of tracking performance and linking
it to business risk, upper management buy-in becomes attainable. This process transforms vulnerability assessments from
a technical issue into a business issue.
Planning for a vulnerability management program is similar
to planning for any process or program. A plan should
articulate clearly what the organization intends to accomplish.
Proper planning consists of four essential steps:
• Step 1: The organization should focus on specific goals that
define acceptable vulnerability levels and workable remediation processes.
• Step 2: After stating the goal, the organization should establish priorities and take the necessary steps to attain those
goals. These steps should include determining how often
assessments are to be performed and how remediation efforts
are validated. The frequency of assessments should be determined by weighing acceptable risk levels against the frequency of change and criticality of devices. In addition,
assessment frequency rates may vary between different
groups or networks within the same organization. For
example, mission-critical servers may need to be assessed
weekly or monthly, while desktops in particular divisions
receive quarterly testing.
• Step 3: The next step is to assign roles and responsibilities,
identifying who is responsible for which actions and what
drivers will ensure milestones are achieved.
• Step 4: Finally, the organization should set a timeline for
accomplishing the milestones and goals.
INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 4, 2003
Successful plans are not created in isolation. This is true
especially in vulnerability management. For many organizations, developing a vulnerability management plan may be the
first time information about network security is shared across
multiple layers of the enterprise. The plan should smooth the
transition into this process and show how it will move the
organization to a more secure future. A well-thought-out plan
brings clarity to efforts, sets realistic management expectations
and enables better return on investment (ROI).
Key Components of Vulnerability Management
If the vulnerability management plan and accountability
map are at the center of this vulnerability management “universe,” four main bodies will orbit them (figure 2):
1. Ongoing assessments
2. Remediation program
3. Research integration
4. Regular progress tracking
Figure 2—Vulnerability Management Universe
The Accountability Map
Every good process and plan has a clear statement of roles
and responsibilities. An accountability map provides vulnerability management programs with this critical component.
An accountability map formalizes the basic flow of responsibility where it exists, and defines it when there are gaps. The
level of required granularity varies within organizations. While
accountability maps require significant preparation to create,
one can expect a correlation between the level of detail and the
benefits realized. Vulnerability assessment results flow through
this accountability map, enabling rapid distribution of the testing results and visibility into responsibility at a detailed level
of the remediation process. An effective, well-utilized accountability map will collapse the time from vulnerability discovery
to vulnerability remediation, reducing an organization’s
security exposure.
For example, consider a global corporation with a London
headquarters and major business units in Berlin, Johannesburg,
New York and Oslo. Each business unit has multiple branch
offices under its direction. All of the main and branch locations
have networks, and three locations have data centers. The data
centers are staffed fully and have several layers of responsibility, from the chief information officer (CIO) to the IT director
to team leaders (figure 1).
Figure 1—Sample Business Structure
The accountability map drives information dispersal, from
disseminating assessment results to streamlining new research
and measuring control points. Throughout this process, the
map infuses accountability into an organization, highlighting
areas of excellence and lapses in processes.
While a plan often contains an outline of an accountability
map, it is important that the accountability map be a separate,
detailed and continually maintained entity.
These four components generate the information that powers the process framework created by the plan and accountability
map. Assessments measure current posture from a vulnerability
perspective and report the findings. The remediation program
provides structure and a record of remediation efforts.
Research integration streamlines the discovery of new
vulnerabilities, maximizing efforts while minimizing the use
of resources. Finally, progress tracking measures security
posture with a historical backdrop, from team performance
and corporate performance perspectives.
Ongoing Assessments
Ongoing assessments feed a steady stream of critical information to the vulnerability management system. The organization should schedule assessments systematically and periodically. When assessments are predictable, all parties involved
will become more comfortable and familiar with the process.
To be complete, assessments should cover the external network
perimeter and the internal network. Once the system is in place
and accepted, random assessments also will provide a useful
“spot check” mechanism as needed.
Three main benefits result from ongoing assessments.
Assessments serve to:
• Highlight methodically the issues that need addressing
• Instruct how to repair vulnerabilities
• Supply the information that will be used to provide metrics
to measure the effectiveness of the processes
INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 4, 2003
29
Remediation Program
A remediation program establishes consistent processes that
determine how the organization will remediate vulnerabilities.
Processes for prioritizing and resolving vulnerabilities should
be formalized. Specific remediation goals may vary based on
the criticality of systems or networks, and policies; therefore,
they should reflect business and technical considerations. For
example, some organizations rely on a web presence for their
revenue stream. For such organizations, their web site may
have the highest priority. Other enterprises’ network architectures may have critical points that bear most of the traffic,
elevating their technical importance to the overall network
function.
A remediation program, especially when tracked through a
central repository, gives added measurability to the control
process. The program answers the question of whether an
enterprise’s remediation goals are being met. When framed in
the accountability map, the program enables individual, team,
division and organizationwide efforts to be analyzed for their
effectiveness in reaching the goal of securing the enterprise.
Optimized Research Integration
Even with 300 new vulnerabilities a month, optimized
research integration enables near-immediate response to new
vulnerability issues. However, two key functions need to be
integrated—pulling new vulnerability information into the centralized research team and pushing filtered information to
appropriate recipients per the accountability map. Information
can be pulled by an in-house research team or aggregated by
an outsourced research team. Internally, the information generally is gathered from such locations as vendor notices, security
groups, news groups and bug-tracking sites. The process
should catalog the information according to the type of systems affected, compare findings against the current inventory
of systems and send targeted notices to those affected. The
more accurate and detailed the current inventory, the more targeted the information recipients receive. This enables rapid fixtime with minimal distractions from other duties.
Consider a situation with 100 network administrators, all
receiving a general security warning that may affect only 40 of
them. Now consider the time required for each administrator to
determine the meaning of the message and to evaluate whether
he/she is affected. In comparison, with an optimized research
integration approach, security alerts to the recipients are
prescreened. Given the same scenario, 40 security warnings
would be issued. Ideally, each warning would focus
precisely on which systems need to be addressed.
Central Information System
The central information system provides historical information. With this information, the organization should be able to
measure variance in vulnerabilities, ability to remediate, recurrence of issues, as well as other trends in the organization’s
security and processes. And, with the accountability map as the
frame, all these points can be analyzed from a corporate
performance level to the levels of the business unit, division,
specific network and team performance. Limitations here are
driven only by the granularity of the accountability map.
Vulnerability Management in Action
Put in motion, a vulnerability management program provides an ongoing framework to link goals to execution, thus
fostering continual improvement. Security gains a more tangible feel, as all participants can see the measurable effects of
the program. Applying the process at all levels with a clear
accountability map engenders a personal stake for the participants. A standardized system also allows for knowledge
sharing and encourages a participatory approach to managing
vulnerabilities. The closed-loop nature of the vulnerability
management program enables a system that self-feeds positive
momentum toward continual improvement to better secure an
enterprise’s information assets.
Eva Bunker, CISSP
is the cofounder and CIO of Critical Watch, a Dallas, TX,
USA-based provider of Internet security solutions for
Fortune 2000 companies. She is responsible for the research,
design and development of current and future product offerings.
Her background combines experience in Internet technology
product development and business operations. Bunker has
served as an expert speaker on network security and also is a
member of the Dallas Infragard and Dallas Chapter of ISSA.
Progress Tracking
Progress tracking is one of the most powerful benefits of
implementing vulnerability management as a closed-loop
system. Results from vulnerability assessments become the
baseline against which improvements and regressions can be
measured. The combination of goals set in the plan and set for
remediation management serves as a benchmark to determine
how effectively the organization is moving toward its security
goals.
30
INFORMATION SYSTEMS CONTROL JOURNAL, VOLUME 4, 2003
Download