Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf ·...

34
www.cloudsec.com | #cloudsec Find and Fix the Vulnerabilities Posing the Greatest Risk to Your Business Robert Healey | Tenable APAC

Transcript of Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf ·...

Page 1: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

www.cloudsec.com | #cloudsec

Find and Fix the Vulnerabilities Posing the Greatest Risk

to Your Business

Robert Healey | Tenable APAC

Page 2: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

2

Be on a mission that doesn’t suck

Page 3: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study
Page 4: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study
Page 5: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

5

Today’s Big Problem

Page 6: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

6

Measuring and Managing the Cyber Risks to Business Operations Report, an independent study conducted by Ponemon Institute, Dec 2018.

Page 7: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

7

Page 8: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

The Problem (Summary)

8

ANYONE

Armed with the RIGHT TOOLS

And the knowledge of how to use them

Can QUICKLY and EASILY penetrate ANY TARGET

Page 9: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

9

Solve the Right Problem

Page 10: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

● Locate a vulnerable system (eg Shodan.io)

● Attack target device with Malware (eg WannaCry)

● Take control, steal or encrypt data, cause chaos, etc

How do Attackers Attack?

10

Page 11: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

Computer program written to use (exploit)

a Vulnerablity

What is Malware & Ransomware?

11

Page 12: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

Software bug or weak point that can be exploited

What is a Vulnerability ?

12

• Operating System, • Hypervisor, • Application, • Database, • Javascript, • etc etc

Page 13: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

Which Problem do You Want to Solve?

3 vulnerabilities

300 Malware families

30,000,000Malware executable instances

Page 14: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

Eliminate the Vulnerablities

Solve the Right Problem

14

Ignore the Malware, Ransomware, Virus, Endpoint attack, etc etc etc

• Note - still need to Focus & Prioritise !

Page 15: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

15

“Oh Really?”

Page 16: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.

Through 2021, the single most impactful enterprise activity to

improve security will be mitigating vulnerabilities

Page 17: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

17

How do we do this?

Page 18: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

Cyber Exposure

The discipline for managing and measuringcybersecurity risk in the digital era

BUSINESS CONTEXT& TRANSLATION

DATA SCIENCE DRIVEN INSIGHTS

BUSINESS KRIs & KPIs

Page 19: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

The Four Key Questions

How are we reducing

exposure over time?

Where are we exposed?

What should we focus on first?

How do we compare to our peers?

Page 20: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

The Attack Surface is Expanding

Page 21: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

Vulnerability Assessment

If I can discover it, I can remediate it

TRADITIONAL ASSETS

AD-HOCSCANNING

BASICVISIBILITY

Page 22: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

Innovating in Vulnerability Assessment

ActiveScanning

Passive Scanning

On-Host Scanning

FIRST IN FIRST IN

Page 23: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

Innovating in Vulnerability Assessment

Live Results

MEDIUM OpenSSH < 5.7 Multiple Vulnerabilites SSH 6 SCAN EDIT

CRITICA

LSamba 3.5/3.6x < 3.6.25 / 4.0.x < 4.0.25 / 4.1.x <

4.1.17

Samba 1 SCAN EDIT

CRITICA

LSamba 3.x < 3.525 / 3.0.x < 4.0.25 / 4.1 Samba 6 SCAN EDIT

HIGH Apache 2.3<2.2.1 Multiple Vulnerabilities Web Servers 6 SCAN EDIT

HIGH Apache 2.3<2.2.20 Multiple Vulnerabilities Web Servers 5 SCAN EDIT

HIGH Apache 2.3<2.2.21 mod_porxy_aip Dos Web Servers 6 SCAN EDIT

HIGH Samba 3.0/3.6x < 3.0.25 / 3.0.x < 3.0.25 / 3.1.x <

3.1.17

Samba 7 SCAN EDIT

MEDIUM TLS Export-Grande Key Exchange Detection Generic 3 SCAN EDIT

LOW Recursive DNS Server Detection DNS Servers 6 SCAN EDIT

LOW Apache 4.5/3.6x < 3.6.25 / 4.0.x < 4.0.25 / 4.1.x <

4.1.17

Web Servers 12 SCAN EDIT

LOW Apache 3.5/3.6x < 3.6.25 / 4.0.x < 4.0.25 / 4.1.x <

4.1.17

We Servers 4 SCAN EDIT

MEDIUM OpenSSH < 5.7 Multiple Vulnerabilites SSH 6 SCAN EDITCRITICA

LSamba 3.x < 3.525 / 3.0.x < 4.0.25 / 4.1 Samba 8 SCAN EDIT

HIGH Apache 2.3<2.2.20 Multiple Vulnerabilities Web Servers 2 SCAN EDIT

HIGH Samba 3.0/3.6x < 3.0.25 / 3.0.x < 3.0.25 / 3.1.x <

3.1.17

Samba 3 SCAN EDIT

LOW Recursive DNS Server Detection DNS Servers 4 SCAN EDIT

CRITICA

LSamba 3.5/3.6x < 3.6.25 / 4.0.x < 4.0.25 / 4.1.x <

4.1.17

Samba 2 SCAN EDIT

Now available in

Page 24: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

Vulnerability Management

An intelligent way to prioritize and remediate exposures

TRADITIONAL &MODERN ASSETS

PREDICTIVEPRIORITIZATION

AUTOMATED ASSESSMENT

Page 25: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

Non-Traditional Assets

Innovating in Vulnerability Management

APPLICATIONS SOURCE CODE

IOT MOBILE

CONTAINERS

SERVERLESS

Page 26: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

Critical Infrastructure

Industrial Security

ENERGY TRANSPORTATION

MANUFACTURING UTILITIES

Page 27: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

16500+VULNERABILITIES DISCLOSED IN 2018

59%Of vulnerabilities disclosed in 2018

were rated critical or high.

Over 9,500+ Vulnerabilities

15%Of vulnerabilities disclosed in 2018 were CVSS 9+

2,500 Vulnerabilities

7%Of vulnerabilities disclosed had

publicly available exploits

Over 1,100 Vulnerabilities

Page 28: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

28

97%Reduction in vulnerabilities

to be remediated

PREDICTIVEPRIORITIZATION

Innovation in Vulnerability Management

Page 29: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

The 3% of

vulnerabilities you

need to focus on first.

Predictive Prioritization

Focus First On What Matters Most

Leverages machine learning and threat

intelligence to reprioritize

vulnerabilities based on real world risk

VULNERABILITY PRIORITY RATING

VPR +Prioritize assets

based on indicators of

business value and criticality

ASSET CRITICALITY RATING

ACR

Page 30: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

* Gartner, A Guide to Choosing a Vulnerability Assessment Solution, Prateek Bhajanka, Mitchell Schneider, Craig Lawson, April 3, 2019.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.

“BY 2022, ORGANIZATIONS THAT USE THE RISK-BASED

VULNERABILITY MANAGEMENT METHOD WILL SUFFER 80%

FEWER BREACHES.*”

Page 31: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

31

“Can you actually fix anything?”

Page 32: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

32

/

Clo

ud

CMDB and Ticketing Secu

rity

An

alyt

ics

Identity and Access ManagementMobile Device Management

Network Access Control

Technology Ecosystem

Page 33: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

Tenable & Trend Micro

33

Scan & locate

vulnerabilities

Export Vuln Data via API Program Tipping Point

IPS with Vuln Protection

rules

“Virtual Patching”

Page 34: Find and Fix the Vulnerabilities Posing the Greatest Risk ... Tenable_Robert Healey.pdf · Measuring and Managing the Cyber Risks to Business Operations Report, an independent study

#cloudsec www.cloudsec.com

THANK YOURobert Healey | Tenable APAC