Sunday, December 1, 2019

Vulnerability Assessment

Vulnerability Assessment

Vulnerability Assessment or VA is nothing but a testing a system or application to find the weakness/ flaw/ gap/ loop hole or vulnerability point through which a cyber attack can be possible. 

The assessment shows the gaps, so that the security team can fix the gap in time. Through this vulnerability assessment the severity of the vulnerability can be identified such as Critical, High, Moderate or low.

There are four stages of Vulnerability Assessment. 

  • Collection of Assets/ Asset Discovery / Map all the end point
  • Run Vulnerability Assessment through specific licensed tools to the target host.
  • After identification, classification of the vulnerability based on criticality and priority level.
  • Prepare a detailed report with remediation plan.

Besides the above stages there can a fifth stage like continuous monitoring with a regular scan. A regular vulnerability assessment helps organizations to identify and fix their flaws and can improve the organization security posture. 

An application level assessment helps in determining vulnerabilities within web applications that are hosted within or outside organization premise. Applications can be accessed through Dynamic Analysis (DAST), static analysis (SAST), Interactive analysis (IAST) and software composition analysis (SCA).

The Severity score can be calculated through CVSS (Common Vulnerability Scoring System) which represents a qualitative risk analysis and provides numerical (0-10) scoring system such as 

9.0-10.0- critical 
7.0-8.9- High
4.0-6.9- Moderate
0.1-3.9- Low

So below are factors are those taken in to consideration while generating the CVSS score:
  • Attack Vector
  • Attack Complexity
  • Privilege Level
  • Confidentiality
  • Integrity
  • Availability
Vulnerabilities are represented by CVE Score (Common Vulnerability Exposure) which is a database of all common vulnerabilities identified across globe. 

For example:

CVE-2019-1255  

CVE: Prefix
2019: Year of discovery
1255: code

Description: A denial of service vulnerability exists in Microsoft defender improperly handles files.

All CVEs can be found and further referred at below portal. 

https://cve.mitre.org/

Benefits
  • It prevents organizations from cyber attack such as virus/malware attacks, data breach, DDoS attack, SQL injection, XSS attack, Code injection etc.
  • Take remediation action to any loopholes and gaps.
  • Meet cyber security compliance and regulatory requirement.
There are many types of Vulnerability assessment carried out across globe with different automated tools.

  • Network Based Scan
  • Host based Scan
  • Wireless network Scan
  • Database Scan
  • Application Scan
  • Container Scan
  • Credentialed and non-credentialed Scan
  • External Scan / Internal Scan

Tools available in the market are
  • Netsparker
  • OpenVAS
  • Acunetix
  • Aircrack
  • Nessus
  • Qualys
  • Solarwind network vulnerability scanner
  • Nikto
  • Wireshark
  • Intruder
  • Rapid7

It is known that around 60% of data breach happens due to unpatched vulnerabilities. It improves operational efficiency as well as it will establish a faster mechanism to mitigate exploits. 


Image Source: (https://www.manageengine.com/vulnerability-management/images/vulnerability-assessment-steps.jpg)


For more details you can follow below reference links.

https://www.beyondtrust.com/resources/glossary/vulnerability-assessment

https://www.imperva.com/learn/application-security/vulnerability-assessment/


If you like this post, please comment and share it.

-DR

No comments:

Post a Comment

Network Scanning Tools

Network Scanning through Nmap and Nessus Network scanning is a process used to troubleshoot active devices on a network for vulnerabilities....