280 likes | 298 Views
Ryan Bragg. Channel Sales Engineer. Predictive Vulnerability Prioritization. Focusing on What Matters First. Questions. The massive WannaCry outbreak caused an estimated $1 billion in damage costs in just its first four days , according to Stu Sjouwerman , CEO at KnowBe4.
E N D
Ryan Bragg Channel Sales Engineer Predictive Vulnerability Prioritization Focusing on What Matters First
The massive WannaCry outbreak caused an estimated $1 billion in damage costs in just its first four days, according to Stu Sjouwerman, CEO at KnowBe4. CSO Online:https://www.csoonline.com/article/3197582/ransomware-damages-rise-15x-in-2-years-to-hit-5-billion-in-2017.html Source: Bank Info Security Website
Creating a Cyber Exposure Gap Cyber Exposure Gap
Process Barriers Ponemon Institute, Dec 2018
Not Asking the Right Questions ? ? ? ? How are we reducing exposure over time? How do we compare? Where are we exposed? Where should we prioritize based on risk?
Volume & Prioritization Barriers
Vulnerability Trends Gartner Market Guide for Vulnerability Assessment, Craig Lawson, PrateekBhajanka, June 19, 2018
The Severity Problem 60% 12% 7% 17,000 • Vulnerabilities Disclosed in 2018 of vulnerabilities had an exploit available of vulnerabilities disclosed in 2017 were CVSS 9+ of vulnerabilities discovered in environments are CVSS 7+
CVSSv3 COMPOUNDS PRIORITIZATION CHALLENGE Vulnerability Intelligence ReportTenable Research
CVSS — Shortcomings “CVSS is designed to identify the technical severity of a vulnerability. What people seem to want to know, instead, is the risk a vulnerability or flaw poses to them, or how quickly they should respond to a vulnerability.”TOWARDS IMPROVING CVSSSOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITYDecember 2018
TOP 10 VULNERABILITIES USED BY CYBERCRIMINALS IN 2018 Of the top 10 Only 4 have a CVSS Score > 9.0 March 19,2019
Attacks on New Vulnerabilities Attackers have an average of 7 day head start from Time to Exploit Availability against the Time to Assess Source: Tenable Research Report – “Quantifying the Attackers First Move Advantage”
What Should We Do?
Threat Intelligence Insight into which vulnerabilities are actively being exploited by both targeted and opportunistic threat actors. Vulnerability Rating The criticality, ease of exploit and attack vectors associated with the flaw. Research Insights Data science based analysis of over 109,000 vulnerabilities to differentiate between the real and theoretical risks vulnerabilities pose 97% Predictive PrioritizationReducing the Burden- Dramatically Reduction in vulnerabilities to be remediated with the same impact to the attack surface PRIORITIZATION PREDICTIVE
A Data Science Approach:Understanding the Model 150 different aspects in 7 feature groups • Past threat pattern • CVSS • NVD • Past hostility • Vulnerable software • Exploit code • Past threat source • Forecast probability of exploit in near term future • Updated daily
Some of What is in the Model • Distinct days with cyber exploits • Days since last cyber exploit • Total cyber exploit events • Days since first cyber exploit • Days since last cyber attack • CVE Age • No. Words in NVD Description • Days Since NVD Last Modified • Number of References • CVSS v3 Base Score • CVSS v3 Exploitability Score • CVSS v3 Impact Score • Total Affected Software • CWE • Days since last ExploitDB entry • Days since first ExploitDB entry • Days since last Metasploit entry • Total ExploitDB entries • Total Metasploit entries 21
Terminology • Predictive Prioritization: The process of re-prioritizing vulnerabilities based on the probability that they will be leveraged in an attack. • Vulnerability Priority Rating (VPR): The output of the Predictive Prioritization process. VPR is the number that indicates the remediation priority (0 through 10, with 10 being the highest severity) of an individual vulnerability.
Prioritization Is Critical Critical Critical High High Medium Risk-Driven Scoring Medium Low Low CVSSv3 Vulnerability Priority Rating (risk-based)
We Find the Needles 3% Vulnerability Priority Rating
VPR INSIGHT - 70 DAYS PRIOR TO CVSS SCORE VPR CVSS Linux Kernel Flaw
Top Five Vulnerabilities in 2018 Extracted from the Recorded Future Report “Top Ten Vulnerabilities of 2018” 03/19/19