Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
10 best practices for vulnerability management according to CISOs
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

1. Culture

Achieving a successful vulnerability management program starts with establishing a cybersecurity-minded culture across the organization. Many CISOs admitted to facing historical cultural problems, with one summing it up well. “Our cybersecurity culture was pretty laissez-faire until we got hit with Log4J and then a ransomware attack,” he told CSO. “These events were an awakening for the CEO and board. That’s when they hired me, adjusted the budget, and committed to doing what needed to be done.” Improving vulnerability management was a top priority in this cultural transition.

2. Documentation

Most CISOs agreed that all phases of vulnerability management should be well documented, assessed, and reviewed. This is an important admission that there is no quick fix to longstanding vulnerability management woes.Rather, organizations must dig into each phase of the vulnerability management lifecycle, look for inefficiencies, devise strategies for improvement, and define the right metrics to measure progress. CISOs also understand that there is no endgame here, but having a dependable record encourages continuous iterative improvement in all phases, all the time.

3. Establish processes

Most of the CISOs I spoke with borrowed heavily from existing frameworks but customized them to their business, industry, and organizational needs. Once instituted, standard vulnerability management processes can be rolled out across an enterprise and monitored for continuous improvement.One CISO mentioned that her organization has taken this a step further, following an acquisition, the security team has a canned program that will transform the acquired company’s vulnerability management program to fit its established model, complete with metrics to gauge progress.

4. Define what security data is necessary

To be clear, this isn’t a technology inventory exercise, at least not at first. CISOs assess what data they have and compare this to what data they need. Armed with this knowledge, they can then assign staffers to find technologies to fill the gaps.

5. Embed integration into vulnerability management

Once again, this is an academic rather than a technology project. It starts by looking into who needs what data and establishing where it comes from. Once individuals receive the right data, what do they do with it? Assuming all of this goes well, do data analytics trigger automated or manual actions? After mapping all the “goes into” and “goes out of” components, CISOs often bring in vendor partners for a look-see. The goal? Get them onboard with the necessary connectors, APIs, and data formats to turn design into reality.

6. Determine the right metrics for prioritization

This directly addresses the question posed to me in 2003. It’s also where vulnerability management meets exposure management, and it’s all about context. What is the business value of a vulnerable asset? Is a vulnerable asset on the attack path? Is there a compensating control in place? Has the compensating control been tested recently?I know this seems like an obvious step, but the CISOs I spoke with have codified (or plan on codifying) this and more inputs into a customized risk-scoring system that anchors the whole enchilada.

7. Create SLA discipline

The prioritization hierarchy is married to strict service-level agreements (SLA) across security, IT, software development, and third-party risk management teams. Exceptions are rare. Many organizations also have formal review processes when teams miss SLA deadlines. Again, continuous improvement is required here.

8. Develop an emergency patching program

Events like Log4Shell and SolarWinds were wake-up calls, as many CISOs learned how unprepared their organizations were for this type of emergency event. This realization caused CISOs to create, staff, and test incident response plans designed specifically for these types of incidents.As one CISO said, “While I was proud of how we responded to past events, several team members were burnt out for weeks, and we had a spike in attrition. Rather than rely on heroes, we needed a systematic program we could count on. I hope there’s no ‘next time,’ but if there is, we’re better prepared.”

9. Align goals, metrics, and compensation across diverse teams

Vulnerability management depends upon a cross-functional team with strong communication, consistent metrics, and common goals, this is the people part.It starts with the commitment to a cybersecurity culture discussed above, but CISOs I spoke with also worked with CIOs, line of business managers, and human resources folks to create the right workflows, automations, reports, messaging, and even employee compensation benefits to motivate cooperation across disparate groups and individuals. Security becomes far more effective when CISOs regularly team up with CIOs to uncover bottlenecks and review progress.

10.Reinforce VM with continuous efficacy testing.

Years ago, I created an awkward acronym, SOPV, which stood for security observability, prioritization, and validation. The acronym never caught on, but the CISOs I spoke with have accepted (or are accepting) the notion of continuous security validation testing.Of course, verification is one of the phases of the vulnerability management lifecycle, so what’s changed? Many firms have moved from periodic penetration testing to continuous security testing with new tools or managed services. MITRE calls this a threat-informed defense. In this way, organizations not only verify vulnerability remediation, but they also test controls efficacy and provide a blueprint for detection rules engineering.CISOs had many other war stories and recommendations, but these 10 were fairly common regardless of organizational size, location, or industry. I’ll conclude by reporting on one other commonality: to use a frequent cybersecurity analogy, CISOs realize that strong vulnerability management is a non-linear journey, not a destination.In other words, you are never finished with anything, but rather always looking to improve every step and individual task along the way. There is always a lot of work to be done, but that’s the reality when you’re protecting a modern enterprise.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3853759/10-best-practices-for-vulnerability-management-according-to-cisos.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link