Chris Hughes (Capitol Technology University, University of Maryland, Nikki Robinson (Capitol Technology University)
Effective Vulnerability Management
Managing Risk in the Vulnerable Digital Ecosystem
Chris Hughes (Capitol Technology University, University of Maryland, Nikki Robinson (Capitol Technology University)
Effective Vulnerability Management
Managing Risk in the Vulnerable Digital Ecosystem
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
SUPPORT ORGANIZATIONAL SUCCESS BY MINIMIZING IT RISK IN THE CLOUD ERA Modern businesses employ dozens of third-party, cloud-based tools to get work done. Technology managers need to be well versed in the holistic practice of knowing their systems, their interconnections, and the resulting risk exposure. Armed with that knowledge, it becomes possible to plan and prioritize limited budgets to mobilize a cost-effective vulnerability management program. From two leading minds in cybersecurity, Effective Vulnerability Management explores the multifaceted approach that today's organizations must…mehr
Andere Kunden interessierten sich auch für
- Richard Stiennon (USA University of MichiganSecurity Yearbook 202456,99 €
- Charles J. BrooksPractical Industrial Cybersecurity42,99 €
- Mike Chapple (University of Notre Dame)CC Certified in Cybersecurity Study Guide35,99 €
- Rick HowardCybersecurity First Principles: A Reboot of Strategy and Tactics28,99 €
- Ed Adams (Security Innovation)See Yourself in Cyber25,99 €
- Adam ShostackThreats22,99 €
- Kenneth Bok (UK Imperial College LondonDecentralizing Finance25,99 €
-
-
-
SUPPORT ORGANIZATIONAL SUCCESS BY MINIMIZING IT RISK IN THE CLOUD ERA Modern businesses employ dozens of third-party, cloud-based tools to get work done. Technology managers need to be well versed in the holistic practice of knowing their systems, their interconnections, and the resulting risk exposure. Armed with that knowledge, it becomes possible to plan and prioritize limited budgets to mobilize a cost-effective vulnerability management program. From two leading minds in cybersecurity, Effective Vulnerability Management explores the multifaceted approach that today's organizations must take to effectively mitigate risk introduced by complex software ecosystems. With this book, readers will learn why it isn't enough to simply "apply a patch" to fix known software flaws. True vulnerability management requires consistently monitoring systems and vulnerability databases. It also requires addressing the human element, identifying and addressing psychological factors that interact with software ecosystems to create emergent vulnerabilities. Authors Chris Hughes and Nikki Robinson provide a comprehensive discussion of these issues and their solutions. It is essential to dedicate time and resources to preventing attacks and exploitations, yet it can be challenging to justify these expenditures, and indeed many outdated and disengaged vulnerability management practices offer inadequate protection. Effective Vulnerability Management shows the way toward more efficient, more effective strategies that respond to today's unique threats.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: John Wiley & Sons Inc
- Seitenzahl: 288
- Erscheinungstermin: 22. April 2024
- Englisch
- Abmessung: 228mm x 150mm x 18mm
- Gewicht: 432g
- ISBN-13: 9781394221202
- ISBN-10: 1394221207
- Artikelnr.: 69082154
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: John Wiley & Sons Inc
- Seitenzahl: 288
- Erscheinungstermin: 22. April 2024
- Englisch
- Abmessung: 228mm x 150mm x 18mm
- Gewicht: 432g
- ISBN-13: 9781394221202
- ISBN-10: 1394221207
- Artikelnr.: 69082154
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
CHRIS HUGHES, M.S., MBA, currently serves as the Co-Founder and President at Aquia and has 20 years of IT/Cybersecurity experience in the public and private sectors. He is also an adjunct professor for M.S. Cybersecurity programs. Chris co-hosts the Resilient Cyber Podcast and also serves as a Cyber Innovation Fellow at CISA. NIKKI ROBINSON, DSc, PhD, is a Security Architect and Professor of Practice at Capitol Technology University. She holds a DSc in Cybersecurity and a PhD in Human Factors.
Foreword xvii
Introduction xix
1 Asset Management 1
Physical and Mobile Asset Management 3
Consumer IoT Assets 4
Software Assets 5
Cloud Asset Management 6
Multicloud Environments 7
Hybrid Cloud Environments 7
Third-Party Software and Open Source Software (OSS) 9
Third-Party Software (and Risk) 10
Accounting for Open Source Software 11
On-Premises and Cloud Asset Inventories 11
On-Premises Data Centers 12
Tooling 13
Asset Management Tools 13
Vulnerability Scanning Tools 14
Cloud Inventory Management Tools 15
Ephemeral Assets 16
Sources of Truth 17
Asset Management Risk 18
Log4j 18
Missing and Unaccounted-for Assets 19
Unknown Unknowns 20
Patch Management 21
Recommendations for Asset Management 22
Asset Manager Responsibilities 22
Asset Discovery 23
Getting the Right Tooling 24
Digital Transformation 25
Establishing and Decommissioning Standard Operating Procedures 26
Summary 27
2 Patch Management 29
Foundations of Patch Management 29
Manual Patch Management 30
Risks of Manual Patching 31
Manual Patching Tooling 32
Automated Patch Management 34
Benefits of Automated vs Manual Patching 35
Combination of Manual and Automated Patching 36
Risks of Automated Patching 37
Patch Management for Development Environments 38
Open Source Patching 38
Not All Software Is Equal 39
Managing OSS Patches Internally 39
Responsibilities of Infrastructure vs Operations Teams 40
Who Owns Patch Management? 41
Separation of Duties 42
Tools and Reporting 43
Patching Outdated Systems 43
End-of-Life Software 44
Unpatched Open Source Software 45
Residual Risk 46
Common Attacks for Unpatched Systems 47
Prioritizing Patching Activities 48
Risk Management and Patching 49
Building a Patch Management Program 50
People 50
Process 51
Technology 51
Summary 52
3 Secure Configuration 53
Regulations, Frameworks, and Laws 53
NSA and CISA Top Ten Cybersecurity Misconfigurations 54
Default Configurations of Software and Applications 55
Improper Separation of User/Administrator Privilege 57
Insufficient Internal Network Monitoring 57
Lack of Network Segmentation 58
Poor Patch Management 58
Bypass of System Access Controls 60
Weak or Misconfigured Multifactor Authentication Methods 60
Lack of Phishing-Resistant MFA 61
Insufficient Access Control Lists on Network Shares and Services 61
Poor Credential Hygiene 61
Unrestricted Code Execution 62
Mitigations 62
Default Configurations of Software Applications 63
Improper Separation of User/Administration Privilege 64
Insufficient Network Monitoring 64
Poor Patch Management 64
Wrapping up the CIS Misconfigurations Guidance 65
CIS Benchmarks 65
DISA Security Technical Implementation Guides 66
Summary 68
4 Continuous Vulnerability Management 69
CIS Control 7-Continuous Vulnerability Management 70
Establish and Maintain a Vulnerability Management Process 70
Establish and Maintain a Remediation Process 71
Perform Automated Operating System Patch Management 71
Perform Automated Application Patch Management 72
Perform Automated Vulnerability Scans of Internal Enterprise Assets 73
Perform Automated Vulnerability Scans of Externally Exposed Enterprise
Assets 73
Remediate Detected Vulnerabilities 74
Continuous Monitoring Practices 74
Summary 77
5 Vulnerability Scoring and Software Identification 79
Common Vulnerability Scoring System 79
CVSS 4.0 at a Glance 80
Base Metrics 84
Exploitability Metrics 84
Threat Metrics 86
Environmental Metrics 88
Supplemental Metrics 89
Qualitative Severity Rating Scale 91
Vector String 92
Exploit Prediction Scoring System 92
EPSS 3.0-Prioritizing Through Prediction 92
Epss 3.0 94
Moving Forward 95
Stakeholder-Specific Vulnerability Categorization 97
CISA SSVC Guide 99
Decision Tree Example 106
Software Identification Formats 107
Common Platform Enumeration 108
Package URL 110
Software Identification Tags 110
Common Weaknesses and Enumerations 112
Summary 114
6 Vulnerability and Exploit Database Management 115
National Vulnerability Database (NVD) 115
Sonatype Open Source Software Index 118
Open Source Vulnerabilities 119
GitHub Advisory Database 120
Exploit Databases 121
Exploit-DB 122
Metasploit 122
GitHub 122
Summary 123
7 Vulnerability Chaining 125
Vulnerability Chaining Attacks 125
Exploit Chains 127
Daisy Chains 128
Vendor-Released Chains 129
Microsoft Active Directory 129
VMware vRealize Products 130
iPhone Exploit Chain 130
Vulnerability Chaining and Scoring 131
Common Vulnerability Scoring System 132
EPSS 132
Gaps in the Industry 133
Vulnerability Chaining Blindness 134
Terminology 135
Usage in Vulnerability Management Programs 136
The Human Aspect of Vulnerability Chaining 138
Phishing 138
Business Email Compromise 139
Social Engineering 140
Integration into VMPs 141
Leadership Principles 142
Security Practitioner Integration 142
IT and Development Usage 143
Summary 144
8 Vulnerability Threat Intelligence 145
Why Is Threat Intel Important to VMPs? 145
Where to Start 146
Technical Threat Intelligence 146
Tactical Threat Intelligence 147
Strategic Threat Intelligence 148
Operational Threat Intelligence 149
Threat Hunting 150
Integrating Threat Intel into VMPs 151
People 151
Process 152
Technology 153
Summary 154
9 Cloud, DevSecOps, and Software Supply Chain Security 155
Cloud Service Models and Shared Responsibility 156
Hybrid and Multicloud Environments 158
Containers 159
Kubernetes 165
Serverless 169
DevSecOps 170
Open Source Software 174
Software-as-a-Service 182
Systemic Risks 183
Summary 186
10 The Human Element in Vulnerability Management 187
Human Factors Engineering 189
Human Factors Security Engineering 191
Context Switching 191
Vulnerability Dashboards 193
Vulnerability Reports 194
Cognition and Metacognition 196
Vulnerability Cognition 197
The Art of Decision-.Making 197
Decision Fatigue 198
Alert Fatigue 199
Volume of Vulnerabilities Released 199
Required Patches and Configurations 200
Vulnerability Management Fatigue 201
Mental Workload 202
Integration of Human Factors into a VMP 202
Start Small 203
Consider a Consultant 204
Summary 205
11 Secure-by-Design 207
Secure-by-Design/Default 208
Secure-by-Design 209
Secure-by-Default 210
Software Product Security Principles 211
Principle 1: Take Ownership of Customer Security Outcomes 211
Principle 2: Embrace Radical Transparency and Accountability 214
Principle 3: Lead from the Top 216
Secure-by-Design Tactics 217
Secure-by-Default Tactics 218
Hardening vs Loosening Guides 218
Recommendations for Customers 219
Threat Modeling 220
Secure Software Development 222
SSDF Details 223
Prepare the Organization (PO) 223
Protect Software (PS) 225
Produce Well-Secured Software (PW) 226
Respond to Vulnerabilities (RV) 227
Security Chaos Engineering and Resilience 229
Summary 231
12 Vulnerability Management Maturity Model 233
Step 1: Asset Management 234
Step 2: Secure Configuration 236
Step 3: Continuous Monitoring 238
Step 4: Automated Vulnerability Management 240
Step 5: Integrating Human Factors 242
Step 6: Vulnerability Threat Intelligence 244
Summary 245
Acknowledgments 247
About the Authors 249
About the Technical Editor 251
Index 253
Introduction xix
1 Asset Management 1
Physical and Mobile Asset Management 3
Consumer IoT Assets 4
Software Assets 5
Cloud Asset Management 6
Multicloud Environments 7
Hybrid Cloud Environments 7
Third-Party Software and Open Source Software (OSS) 9
Third-Party Software (and Risk) 10
Accounting for Open Source Software 11
On-Premises and Cloud Asset Inventories 11
On-Premises Data Centers 12
Tooling 13
Asset Management Tools 13
Vulnerability Scanning Tools 14
Cloud Inventory Management Tools 15
Ephemeral Assets 16
Sources of Truth 17
Asset Management Risk 18
Log4j 18
Missing and Unaccounted-for Assets 19
Unknown Unknowns 20
Patch Management 21
Recommendations for Asset Management 22
Asset Manager Responsibilities 22
Asset Discovery 23
Getting the Right Tooling 24
Digital Transformation 25
Establishing and Decommissioning Standard Operating Procedures 26
Summary 27
2 Patch Management 29
Foundations of Patch Management 29
Manual Patch Management 30
Risks of Manual Patching 31
Manual Patching Tooling 32
Automated Patch Management 34
Benefits of Automated vs Manual Patching 35
Combination of Manual and Automated Patching 36
Risks of Automated Patching 37
Patch Management for Development Environments 38
Open Source Patching 38
Not All Software Is Equal 39
Managing OSS Patches Internally 39
Responsibilities of Infrastructure vs Operations Teams 40
Who Owns Patch Management? 41
Separation of Duties 42
Tools and Reporting 43
Patching Outdated Systems 43
End-of-Life Software 44
Unpatched Open Source Software 45
Residual Risk 46
Common Attacks for Unpatched Systems 47
Prioritizing Patching Activities 48
Risk Management and Patching 49
Building a Patch Management Program 50
People 50
Process 51
Technology 51
Summary 52
3 Secure Configuration 53
Regulations, Frameworks, and Laws 53
NSA and CISA Top Ten Cybersecurity Misconfigurations 54
Default Configurations of Software and Applications 55
Improper Separation of User/Administrator Privilege 57
Insufficient Internal Network Monitoring 57
Lack of Network Segmentation 58
Poor Patch Management 58
Bypass of System Access Controls 60
Weak or Misconfigured Multifactor Authentication Methods 60
Lack of Phishing-Resistant MFA 61
Insufficient Access Control Lists on Network Shares and Services 61
Poor Credential Hygiene 61
Unrestricted Code Execution 62
Mitigations 62
Default Configurations of Software Applications 63
Improper Separation of User/Administration Privilege 64
Insufficient Network Monitoring 64
Poor Patch Management 64
Wrapping up the CIS Misconfigurations Guidance 65
CIS Benchmarks 65
DISA Security Technical Implementation Guides 66
Summary 68
4 Continuous Vulnerability Management 69
CIS Control 7-Continuous Vulnerability Management 70
Establish and Maintain a Vulnerability Management Process 70
Establish and Maintain a Remediation Process 71
Perform Automated Operating System Patch Management 71
Perform Automated Application Patch Management 72
Perform Automated Vulnerability Scans of Internal Enterprise Assets 73
Perform Automated Vulnerability Scans of Externally Exposed Enterprise
Assets 73
Remediate Detected Vulnerabilities 74
Continuous Monitoring Practices 74
Summary 77
5 Vulnerability Scoring and Software Identification 79
Common Vulnerability Scoring System 79
CVSS 4.0 at a Glance 80
Base Metrics 84
Exploitability Metrics 84
Threat Metrics 86
Environmental Metrics 88
Supplemental Metrics 89
Qualitative Severity Rating Scale 91
Vector String 92
Exploit Prediction Scoring System 92
EPSS 3.0-Prioritizing Through Prediction 92
Epss 3.0 94
Moving Forward 95
Stakeholder-Specific Vulnerability Categorization 97
CISA SSVC Guide 99
Decision Tree Example 106
Software Identification Formats 107
Common Platform Enumeration 108
Package URL 110
Software Identification Tags 110
Common Weaknesses and Enumerations 112
Summary 114
6 Vulnerability and Exploit Database Management 115
National Vulnerability Database (NVD) 115
Sonatype Open Source Software Index 118
Open Source Vulnerabilities 119
GitHub Advisory Database 120
Exploit Databases 121
Exploit-DB 122
Metasploit 122
GitHub 122
Summary 123
7 Vulnerability Chaining 125
Vulnerability Chaining Attacks 125
Exploit Chains 127
Daisy Chains 128
Vendor-Released Chains 129
Microsoft Active Directory 129
VMware vRealize Products 130
iPhone Exploit Chain 130
Vulnerability Chaining and Scoring 131
Common Vulnerability Scoring System 132
EPSS 132
Gaps in the Industry 133
Vulnerability Chaining Blindness 134
Terminology 135
Usage in Vulnerability Management Programs 136
The Human Aspect of Vulnerability Chaining 138
Phishing 138
Business Email Compromise 139
Social Engineering 140
Integration into VMPs 141
Leadership Principles 142
Security Practitioner Integration 142
IT and Development Usage 143
Summary 144
8 Vulnerability Threat Intelligence 145
Why Is Threat Intel Important to VMPs? 145
Where to Start 146
Technical Threat Intelligence 146
Tactical Threat Intelligence 147
Strategic Threat Intelligence 148
Operational Threat Intelligence 149
Threat Hunting 150
Integrating Threat Intel into VMPs 151
People 151
Process 152
Technology 153
Summary 154
9 Cloud, DevSecOps, and Software Supply Chain Security 155
Cloud Service Models and Shared Responsibility 156
Hybrid and Multicloud Environments 158
Containers 159
Kubernetes 165
Serverless 169
DevSecOps 170
Open Source Software 174
Software-as-a-Service 182
Systemic Risks 183
Summary 186
10 The Human Element in Vulnerability Management 187
Human Factors Engineering 189
Human Factors Security Engineering 191
Context Switching 191
Vulnerability Dashboards 193
Vulnerability Reports 194
Cognition and Metacognition 196
Vulnerability Cognition 197
The Art of Decision-.Making 197
Decision Fatigue 198
Alert Fatigue 199
Volume of Vulnerabilities Released 199
Required Patches and Configurations 200
Vulnerability Management Fatigue 201
Mental Workload 202
Integration of Human Factors into a VMP 202
Start Small 203
Consider a Consultant 204
Summary 205
11 Secure-by-Design 207
Secure-by-Design/Default 208
Secure-by-Design 209
Secure-by-Default 210
Software Product Security Principles 211
Principle 1: Take Ownership of Customer Security Outcomes 211
Principle 2: Embrace Radical Transparency and Accountability 214
Principle 3: Lead from the Top 216
Secure-by-Design Tactics 217
Secure-by-Default Tactics 218
Hardening vs Loosening Guides 218
Recommendations for Customers 219
Threat Modeling 220
Secure Software Development 222
SSDF Details 223
Prepare the Organization (PO) 223
Protect Software (PS) 225
Produce Well-Secured Software (PW) 226
Respond to Vulnerabilities (RV) 227
Security Chaos Engineering and Resilience 229
Summary 231
12 Vulnerability Management Maturity Model 233
Step 1: Asset Management 234
Step 2: Secure Configuration 236
Step 3: Continuous Monitoring 238
Step 4: Automated Vulnerability Management 240
Step 5: Integrating Human Factors 242
Step 6: Vulnerability Threat Intelligence 244
Summary 245
Acknowledgments 247
About the Authors 249
About the Technical Editor 251
Index 253
Foreword xvii
Introduction xix
1 Asset Management 1
Physical and Mobile Asset Management 3
Consumer IoT Assets 4
Software Assets 5
Cloud Asset Management 6
Multicloud Environments 7
Hybrid Cloud Environments 7
Third-Party Software and Open Source Software (OSS) 9
Third-Party Software (and Risk) 10
Accounting for Open Source Software 11
On-Premises and Cloud Asset Inventories 11
On-Premises Data Centers 12
Tooling 13
Asset Management Tools 13
Vulnerability Scanning Tools 14
Cloud Inventory Management Tools 15
Ephemeral Assets 16
Sources of Truth 17
Asset Management Risk 18
Log4j 18
Missing and Unaccounted-for Assets 19
Unknown Unknowns 20
Patch Management 21
Recommendations for Asset Management 22
Asset Manager Responsibilities 22
Asset Discovery 23
Getting the Right Tooling 24
Digital Transformation 25
Establishing and Decommissioning Standard Operating Procedures 26
Summary 27
2 Patch Management 29
Foundations of Patch Management 29
Manual Patch Management 30
Risks of Manual Patching 31
Manual Patching Tooling 32
Automated Patch Management 34
Benefits of Automated vs Manual Patching 35
Combination of Manual and Automated Patching 36
Risks of Automated Patching 37
Patch Management for Development Environments 38
Open Source Patching 38
Not All Software Is Equal 39
Managing OSS Patches Internally 39
Responsibilities of Infrastructure vs Operations Teams 40
Who Owns Patch Management? 41
Separation of Duties 42
Tools and Reporting 43
Patching Outdated Systems 43
End-of-Life Software 44
Unpatched Open Source Software 45
Residual Risk 46
Common Attacks for Unpatched Systems 47
Prioritizing Patching Activities 48
Risk Management and Patching 49
Building a Patch Management Program 50
People 50
Process 51
Technology 51
Summary 52
3 Secure Configuration 53
Regulations, Frameworks, and Laws 53
NSA and CISA Top Ten Cybersecurity Misconfigurations 54
Default Configurations of Software and Applications 55
Improper Separation of User/Administrator Privilege 57
Insufficient Internal Network Monitoring 57
Lack of Network Segmentation 58
Poor Patch Management 58
Bypass of System Access Controls 60
Weak or Misconfigured Multifactor Authentication Methods 60
Lack of Phishing-Resistant MFA 61
Insufficient Access Control Lists on Network Shares and Services 61
Poor Credential Hygiene 61
Unrestricted Code Execution 62
Mitigations 62
Default Configurations of Software Applications 63
Improper Separation of User/Administration Privilege 64
Insufficient Network Monitoring 64
Poor Patch Management 64
Wrapping up the CIS Misconfigurations Guidance 65
CIS Benchmarks 65
DISA Security Technical Implementation Guides 66
Summary 68
4 Continuous Vulnerability Management 69
CIS Control 7-Continuous Vulnerability Management 70
Establish and Maintain a Vulnerability Management Process 70
Establish and Maintain a Remediation Process 71
Perform Automated Operating System Patch Management 71
Perform Automated Application Patch Management 72
Perform Automated Vulnerability Scans of Internal Enterprise Assets 73
Perform Automated Vulnerability Scans of Externally Exposed Enterprise
Assets 73
Remediate Detected Vulnerabilities 74
Continuous Monitoring Practices 74
Summary 77
5 Vulnerability Scoring and Software Identification 79
Common Vulnerability Scoring System 79
CVSS 4.0 at a Glance 80
Base Metrics 84
Exploitability Metrics 84
Threat Metrics 86
Environmental Metrics 88
Supplemental Metrics 89
Qualitative Severity Rating Scale 91
Vector String 92
Exploit Prediction Scoring System 92
EPSS 3.0-Prioritizing Through Prediction 92
Epss 3.0 94
Moving Forward 95
Stakeholder-Specific Vulnerability Categorization 97
CISA SSVC Guide 99
Decision Tree Example 106
Software Identification Formats 107
Common Platform Enumeration 108
Package URL 110
Software Identification Tags 110
Common Weaknesses and Enumerations 112
Summary 114
6 Vulnerability and Exploit Database Management 115
National Vulnerability Database (NVD) 115
Sonatype Open Source Software Index 118
Open Source Vulnerabilities 119
GitHub Advisory Database 120
Exploit Databases 121
Exploit-DB 122
Metasploit 122
GitHub 122
Summary 123
7 Vulnerability Chaining 125
Vulnerability Chaining Attacks 125
Exploit Chains 127
Daisy Chains 128
Vendor-Released Chains 129
Microsoft Active Directory 129
VMware vRealize Products 130
iPhone Exploit Chain 130
Vulnerability Chaining and Scoring 131
Common Vulnerability Scoring System 132
EPSS 132
Gaps in the Industry 133
Vulnerability Chaining Blindness 134
Terminology 135
Usage in Vulnerability Management Programs 136
The Human Aspect of Vulnerability Chaining 138
Phishing 138
Business Email Compromise 139
Social Engineering 140
Integration into VMPs 141
Leadership Principles 142
Security Practitioner Integration 142
IT and Development Usage 143
Summary 144
8 Vulnerability Threat Intelligence 145
Why Is Threat Intel Important to VMPs? 145
Where to Start 146
Technical Threat Intelligence 146
Tactical Threat Intelligence 147
Strategic Threat Intelligence 148
Operational Threat Intelligence 149
Threat Hunting 150
Integrating Threat Intel into VMPs 151
People 151
Process 152
Technology 153
Summary 154
9 Cloud, DevSecOps, and Software Supply Chain Security 155
Cloud Service Models and Shared Responsibility 156
Hybrid and Multicloud Environments 158
Containers 159
Kubernetes 165
Serverless 169
DevSecOps 170
Open Source Software 174
Software-as-a-Service 182
Systemic Risks 183
Summary 186
10 The Human Element in Vulnerability Management 187
Human Factors Engineering 189
Human Factors Security Engineering 191
Context Switching 191
Vulnerability Dashboards 193
Vulnerability Reports 194
Cognition and Metacognition 196
Vulnerability Cognition 197
The Art of Decision-.Making 197
Decision Fatigue 198
Alert Fatigue 199
Volume of Vulnerabilities Released 199
Required Patches and Configurations 200
Vulnerability Management Fatigue 201
Mental Workload 202
Integration of Human Factors into a VMP 202
Start Small 203
Consider a Consultant 204
Summary 205
11 Secure-by-Design 207
Secure-by-Design/Default 208
Secure-by-Design 209
Secure-by-Default 210
Software Product Security Principles 211
Principle 1: Take Ownership of Customer Security Outcomes 211
Principle 2: Embrace Radical Transparency and Accountability 214
Principle 3: Lead from the Top 216
Secure-by-Design Tactics 217
Secure-by-Default Tactics 218
Hardening vs Loosening Guides 218
Recommendations for Customers 219
Threat Modeling 220
Secure Software Development 222
SSDF Details 223
Prepare the Organization (PO) 223
Protect Software (PS) 225
Produce Well-Secured Software (PW) 226
Respond to Vulnerabilities (RV) 227
Security Chaos Engineering and Resilience 229
Summary 231
12 Vulnerability Management Maturity Model 233
Step 1: Asset Management 234
Step 2: Secure Configuration 236
Step 3: Continuous Monitoring 238
Step 4: Automated Vulnerability Management 240
Step 5: Integrating Human Factors 242
Step 6: Vulnerability Threat Intelligence 244
Summary 245
Acknowledgments 247
About the Authors 249
About the Technical Editor 251
Index 253
Introduction xix
1 Asset Management 1
Physical and Mobile Asset Management 3
Consumer IoT Assets 4
Software Assets 5
Cloud Asset Management 6
Multicloud Environments 7
Hybrid Cloud Environments 7
Third-Party Software and Open Source Software (OSS) 9
Third-Party Software (and Risk) 10
Accounting for Open Source Software 11
On-Premises and Cloud Asset Inventories 11
On-Premises Data Centers 12
Tooling 13
Asset Management Tools 13
Vulnerability Scanning Tools 14
Cloud Inventory Management Tools 15
Ephemeral Assets 16
Sources of Truth 17
Asset Management Risk 18
Log4j 18
Missing and Unaccounted-for Assets 19
Unknown Unknowns 20
Patch Management 21
Recommendations for Asset Management 22
Asset Manager Responsibilities 22
Asset Discovery 23
Getting the Right Tooling 24
Digital Transformation 25
Establishing and Decommissioning Standard Operating Procedures 26
Summary 27
2 Patch Management 29
Foundations of Patch Management 29
Manual Patch Management 30
Risks of Manual Patching 31
Manual Patching Tooling 32
Automated Patch Management 34
Benefits of Automated vs Manual Patching 35
Combination of Manual and Automated Patching 36
Risks of Automated Patching 37
Patch Management for Development Environments 38
Open Source Patching 38
Not All Software Is Equal 39
Managing OSS Patches Internally 39
Responsibilities of Infrastructure vs Operations Teams 40
Who Owns Patch Management? 41
Separation of Duties 42
Tools and Reporting 43
Patching Outdated Systems 43
End-of-Life Software 44
Unpatched Open Source Software 45
Residual Risk 46
Common Attacks for Unpatched Systems 47
Prioritizing Patching Activities 48
Risk Management and Patching 49
Building a Patch Management Program 50
People 50
Process 51
Technology 51
Summary 52
3 Secure Configuration 53
Regulations, Frameworks, and Laws 53
NSA and CISA Top Ten Cybersecurity Misconfigurations 54
Default Configurations of Software and Applications 55
Improper Separation of User/Administrator Privilege 57
Insufficient Internal Network Monitoring 57
Lack of Network Segmentation 58
Poor Patch Management 58
Bypass of System Access Controls 60
Weak or Misconfigured Multifactor Authentication Methods 60
Lack of Phishing-Resistant MFA 61
Insufficient Access Control Lists on Network Shares and Services 61
Poor Credential Hygiene 61
Unrestricted Code Execution 62
Mitigations 62
Default Configurations of Software Applications 63
Improper Separation of User/Administration Privilege 64
Insufficient Network Monitoring 64
Poor Patch Management 64
Wrapping up the CIS Misconfigurations Guidance 65
CIS Benchmarks 65
DISA Security Technical Implementation Guides 66
Summary 68
4 Continuous Vulnerability Management 69
CIS Control 7-Continuous Vulnerability Management 70
Establish and Maintain a Vulnerability Management Process 70
Establish and Maintain a Remediation Process 71
Perform Automated Operating System Patch Management 71
Perform Automated Application Patch Management 72
Perform Automated Vulnerability Scans of Internal Enterprise Assets 73
Perform Automated Vulnerability Scans of Externally Exposed Enterprise
Assets 73
Remediate Detected Vulnerabilities 74
Continuous Monitoring Practices 74
Summary 77
5 Vulnerability Scoring and Software Identification 79
Common Vulnerability Scoring System 79
CVSS 4.0 at a Glance 80
Base Metrics 84
Exploitability Metrics 84
Threat Metrics 86
Environmental Metrics 88
Supplemental Metrics 89
Qualitative Severity Rating Scale 91
Vector String 92
Exploit Prediction Scoring System 92
EPSS 3.0-Prioritizing Through Prediction 92
Epss 3.0 94
Moving Forward 95
Stakeholder-Specific Vulnerability Categorization 97
CISA SSVC Guide 99
Decision Tree Example 106
Software Identification Formats 107
Common Platform Enumeration 108
Package URL 110
Software Identification Tags 110
Common Weaknesses and Enumerations 112
Summary 114
6 Vulnerability and Exploit Database Management 115
National Vulnerability Database (NVD) 115
Sonatype Open Source Software Index 118
Open Source Vulnerabilities 119
GitHub Advisory Database 120
Exploit Databases 121
Exploit-DB 122
Metasploit 122
GitHub 122
Summary 123
7 Vulnerability Chaining 125
Vulnerability Chaining Attacks 125
Exploit Chains 127
Daisy Chains 128
Vendor-Released Chains 129
Microsoft Active Directory 129
VMware vRealize Products 130
iPhone Exploit Chain 130
Vulnerability Chaining and Scoring 131
Common Vulnerability Scoring System 132
EPSS 132
Gaps in the Industry 133
Vulnerability Chaining Blindness 134
Terminology 135
Usage in Vulnerability Management Programs 136
The Human Aspect of Vulnerability Chaining 138
Phishing 138
Business Email Compromise 139
Social Engineering 140
Integration into VMPs 141
Leadership Principles 142
Security Practitioner Integration 142
IT and Development Usage 143
Summary 144
8 Vulnerability Threat Intelligence 145
Why Is Threat Intel Important to VMPs? 145
Where to Start 146
Technical Threat Intelligence 146
Tactical Threat Intelligence 147
Strategic Threat Intelligence 148
Operational Threat Intelligence 149
Threat Hunting 150
Integrating Threat Intel into VMPs 151
People 151
Process 152
Technology 153
Summary 154
9 Cloud, DevSecOps, and Software Supply Chain Security 155
Cloud Service Models and Shared Responsibility 156
Hybrid and Multicloud Environments 158
Containers 159
Kubernetes 165
Serverless 169
DevSecOps 170
Open Source Software 174
Software-as-a-Service 182
Systemic Risks 183
Summary 186
10 The Human Element in Vulnerability Management 187
Human Factors Engineering 189
Human Factors Security Engineering 191
Context Switching 191
Vulnerability Dashboards 193
Vulnerability Reports 194
Cognition and Metacognition 196
Vulnerability Cognition 197
The Art of Decision-.Making 197
Decision Fatigue 198
Alert Fatigue 199
Volume of Vulnerabilities Released 199
Required Patches and Configurations 200
Vulnerability Management Fatigue 201
Mental Workload 202
Integration of Human Factors into a VMP 202
Start Small 203
Consider a Consultant 204
Summary 205
11 Secure-by-Design 207
Secure-by-Design/Default 208
Secure-by-Design 209
Secure-by-Default 210
Software Product Security Principles 211
Principle 1: Take Ownership of Customer Security Outcomes 211
Principle 2: Embrace Radical Transparency and Accountability 214
Principle 3: Lead from the Top 216
Secure-by-Design Tactics 217
Secure-by-Default Tactics 218
Hardening vs Loosening Guides 218
Recommendations for Customers 219
Threat Modeling 220
Secure Software Development 222
SSDF Details 223
Prepare the Organization (PO) 223
Protect Software (PS) 225
Produce Well-Secured Software (PW) 226
Respond to Vulnerabilities (RV) 227
Security Chaos Engineering and Resilience 229
Summary 231
12 Vulnerability Management Maturity Model 233
Step 1: Asset Management 234
Step 2: Secure Configuration 236
Step 3: Continuous Monitoring 238
Step 4: Automated Vulnerability Management 240
Step 5: Integrating Human Factors 242
Step 6: Vulnerability Threat Intelligence 244
Summary 245
Acknowledgments 247
About the Authors 249
About the Technical Editor 251
Index 253