RSAC 2015 - Vulnerability Management Nirvana

36
#RSAC SESSION ID: Kymberlee Price Michael Roytman Vulnerability Management Nirvana: A Study in Predicting Exploitability TECH-F01 Senior Data Scientist Risk I/O @MRoytman Senior Director of Operations Bugcrowd @Kym_Possible David F. Severski Mgr., Information Security Program Seattle Children’s Hospital @DSeverski

Transcript of RSAC 2015 - Vulnerability Management Nirvana

Page 1: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

SESSION ID:

Kymberlee Price Michael Roytman

Vulnerability Management Nirvana:A Study in Predicting Exploitability

TECH-F01

Senior Data ScientistRisk I/O@MRoytman

Senior Director of OperationsBugcrowd@Kym_Possible

David F. SeverskiMgr., Information Security ProgramSeattle Children’s Hospital@DSeverski

Page 2: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

2

Why Prioritization Matters You have 150 vulnerabilities open with

CVSS 6.8 and above

Your inbound new vulnerabilities average 15 dev tasks per week, from both internal and external sources

What do you fix first?

Page 3: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

3

Historical Research: Prioritizing Product Vulnerabilities Sources of vulnerabilities

Internal Security Research Group External Security Researchers Third Party Libraries/OSS Disclosures

Developers would prioritize on CVSS v2 Base Score Limitations in CVSS became apparent

Page 4: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

4

Historical Research: Prioritizing Product Vulnerabilities Applied custom criteria for extended CVSS fields Weighted extended CVSS fields to adjust base CVSS Defined priority bands with SLA for remediation Automated the priority calculations – the only manual requirement

was for the CVSS score to be entered when the bug was logged, which was part of existing SOPs

Page 5: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

5

Our Path towards Nirvana Using CVSS for prioritization today Alternative prioritization models Our research Comparative data & results Conclusions & How to Apply

Page 6: RSAC 2015 - Vulnerability Management Nirvana

#RSACCURRENT VULNERABILITY PRIORITIZATION MODELS

Page 7: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

7

CVSSv2: The Tool We Have

Maintained and regularly updated

Open industry standard

Modular – base, temporal, and environmental components Objective… mostly

The Common Vulnerability Scoring System (CVSS) provides an open framework for communicating the characteristics and impacts of IT vulnerabilities.

False negatives Base score is non-predictive single point in time measure Few companies use update Temporal or Environmental scores No indication of historical attack patterns Misused as prioritization tool, designed to convey vulnerability

characteristics

Page 8: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

8

CVSSv3: The Tool We Need?

Changes Authentication to Privileges Required Removes “medium” option for Access Complexity Adds new dimensions to measure User Interaction and Scope

User Interaction used to be considered part of Attack Complexity Scope documentation is confusing

Components run within a scope that authorizes the actions they can perform and the resources they can access. An example of an authorization scope is the user list and the privileges granted to users of an operating system. A separate authorization scope could be contained within a database application that runs on the operating system. If a successful exploit only impacts resources within the scope of the vulnerable component, then Scope is Unchanged. If a successful exploit impacts resources outside the scope of the vulnerable component, then Scope is Changed.

Page 9: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

9

CVSSv3: The Tool We Need?

Still a non-predictive single point in time measure Temporal & Environmental fields now impact Base Score

Base score is worst possible outcome – completing temporal and environmental fields only has potential to lower base score

Framework transition pain Retooling your systems for new format No standardization to compare v2 vulns to v3 vulns

Still designed for communication of vulnerability characteristics

Page 10: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

10

Exploit Index: Is This Nirvana? Exploitability Index (Microsoft, 2008)

Intended to provide customers with more granularity to improve risk assessment and patch prioritization

Determining exploitability is heavily dependent on human researchers, creating scale and skill limitations

July 2013, 5 years after Exploit Index launch:

“While no exploit surfaced for a vulnerability within 30 days of security bulletin release, it does not mean that the vulnerability could not have been exploited researchers or attackers may just have been prioritizing other vulnerabilities instead” 2

Page 11: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

11

What Else Is There?

Indicators of Badness Exploit Presence in Metasploit Exploit Presence in Canvas Known Public vs Private Exploits Attack Vectors

That’s a lot of threat intelligence feeds to monitor and investigate in real time on every vulnerability you’ve got logged.

Page 12: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

12

One Model to Rule Them All

Page 13: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

13

One Model to Rule Them All Time Series Data

Release Date First Exploit Released Weaponized Exploit Released (Metasploit) Average Patch Time (Qualys Half-Life)

Attack Data Attacks Detected Successful Attacks Detected Impactful Breaches Detected

Categorical Data Complexity Access Vector Impact

Page 14: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

NIRVANA RESEARCH

Page 15: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

15

Historical Research: Predicting Exploitability – Big Data Time

50,000,000 Live Vulnerabilities

1,500,000 Assets

2,000 Organizations

Page 16: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

16

Historical Research: Predicting Exploitability – Big Data Time

150,000,000 Breaches

Page 17: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

17

Baseline ALLTHETHINGS!!

Probability (You Will Be Breached On A Particular Open Vulnerability)?

6%

Page 18: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

18

Probability a Vulnerability Having CVSS > X Has Observed Breaches

0

1

2

3

4

5

6

7

8

9

10

0 2 4 6 8 10 12

Breach Probability (%)

CV

SS

Bas

e

Page 19: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

19

Probability a Vulnerability Having Property X Has Observed Breaches

CVSS 10

EDB

MSP

EDB+MSP

0 5 10 15 20 25 30 35 40

Breach Probability (%)

Page 20: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

20

VulnPryer: A Survival Strategy for Vulnerability ManagementTriaging and answering the question – “What should enterprise defenders fix first?”

Page 21: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

21

Design Requirements

Use commonly accessible data Customizable for our threat scenarios Easy to produce Must adjust to changing information

Page 22: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

22

We Have the Data…We Can Rebuild It

National Vulnerability Database

Network Security Posture Analysis

Commercial Vulnerability Feeds

Internal Asset Valuations

Sources of Data

Page 23: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

23

VulnPryer Flow

CVSS Base Normalize Base Score Metasploit factor Add EDB factor

Add Private Exploit factor

Remove Network factor

Remove Availability and Integrity Only

factor

Adjusted CVSS Score

Page 24: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

24

Automate ALLTHETHINGS!!

Daily Generation of Vulnerability

Reference Library

• AWS Data Pipeline• Risk Based Security VulnDB• VulnPryer

Network Analysis with Customized

Severities

• RedSeal• Combine Asset Values with Actual

Network Configuration

Internal Reporting and Prioritization

• Internal Dashboards• Tableau and R for PresentationFix this

before that

Page 25: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

25

A Few Individual Results

Mean adjustment: -1.7 (24% decrease) Maximum increase: 3.3 (112% increase) Maximum decrease: 5.6 (99% decrease) CVE-2014-0160 (Heartbleed) rescored from 5.0 to 8.3 4% of vulnerabilities reduced to CVSS 0 Approximately 18% reduction in network based risk scores

Page 26: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

26

Results Over Our Specific Population

Vulnpryer-adjusted CVSS Base CVSS

Page 27: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

27

Results: Comparison with Risk I/O RiskMeter

Page 28: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

28

Nirvana Research: Results

0 1 2 3 4 5 6 7 8 9 100

5

10

15

20

25

30

35

40

Positive Predictive Value as a Function of Score Cutoff

CVSS BaseCVSS Temporal Risk Meter

Score

Pos

itive

Pre

dict

ive

Val

ue

Page 29: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

29

Future Directions towards Nirvana

There’s always another layer… Performance Optimization Reporting

Alerting on Changes to Scores Sample Reporting Templates (Tableau and/or R)

More Flexible Formula Changes Generalize the Pythonic Framework for Other Use Cases Analysis of Nirvana model in product security environment

Page 30: RSAC 2015 - Vulnerability Management Nirvana

#RSACCONCLUSIONS & HOW TO APPLY

Page 31: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

31

Conclusions Base CVSS as sole criteria has serious known limitations Readily available tools and data sources can be used to help you

focus on what matters to you and your organization It is both possible and practical to stay abreast of changing

vulnerability risk to drive timely resource allocation decisions

Page 32: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

32

Searching for Nirvana at Home Easy to get started, just add

Database of vulnerability features Your vulnerabilities A little bit of code

Code provided for you! VulnPryer in both Python and R versions Fully functional example automatic deployment via Chef and AWS

Page 33: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

SESSION ID:

Kymberlee Price Michael Roytman

QUESTIONS

TECH-F01

Senior Data ScientistRisk I/O@MRoytman

Senior Director of OperationsBugcrowd@Kym_Possible

David F. SeverskiInformation Security Program Mgr.Seattle Children’s Hospital@DSeverski

Page 34: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

REFERENCES

Page 35: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

35

References – Tools and Code VulnPryer

Python Code – https://github.com/SCH-CISM/VulnPryer R Version – https://github.com/SCH-CISM/vulnpryr AWS Automation Code – https://github.com/SCH-CISM/sch-vulnpryer-orchestration

Vendors RedSeal – Network Security Posture Analysis Risk Based Security – Vulnerability Database Risk I/O – Prioritization as a service

Tools Tableau Chart.io

Page 36: RSAC 2015 - Vulnerability Management Nirvana

#RSAC

36

References – Additional Reading

1 Immunity, Inc. White Paper: A Bounds Check on the Microsoft Exploitability Index http://download.microsoft.com/download/3/E/B/3EBDB81C-DF2F-470B-8A64-981DC8D9265C/A%20Bounds%20Check%20on%20the%20Microsoft%20Exploitability%20Index%20-%20final.pdf

2Exploitability/Priority Index Rating Systems (Approaches, Value, and Limitations) https://www.riskbasedsecurity.com/reports/RBS-ExploitabilityRatings-2013.pdf