Spotting Vulnerabilities – Is Vulnerability Scanning Antiquated?
Just how helpful is vulnerability scanning today?This blog was originally featured as an article in Hospitality Upgrade.
|By: Brand Barney|
However, without ongoing vulnerability assessment (VA), the probability of exploits and compromise for a company rises dramatically.
SEE ALSO: Vulnerability Scanners 101: What, Why, and How to Comply
Move beyond the it-can’t-happen-to-me feeling of security and look at the facts: an average of 19 new vulnerabilities are reported per day, according to the National Vulnerability Database.
Most hackers don’t care who you are. They care about your vulnerabilities.
If you look at headlines recently published in the media, it’s easy to see not all attacks are targeted to a specific business.For example, vulnerabilities like Ghost, Poodle and Heartbleed actually attacked systems based on specific vulnerabilities.
Many large, popular retailers and companies may not have lost as much sensitive data if they and their third party vendors had been practicing regular VA scanning to discover vulnerabilities within their networks and sites.
Vulnerability scanning, in fact, is one of the only crucial things that can help companies keep up-to-date on emerging vulnerabilities.
SEE ALSO: Perimeter Scan Vs. External Vulnerability Scan
In order to systematically shrink a company’s risk window and prevent a data breach, critical vulnerabilities must be continuously identified, prioritized and remediated across a significant portion of the network.
SEE ALSO: How Long are Businesses Vulnerable Before a Breach?
Here are a few examples of vulnerabilities that your organization’s VA tools should catch (and that your IT team should repair immediately):
- SQL Injection: This attack takes place when an attacker jumps on insecure web application coding and begins to query an organization’s backend database with fervor. The reality is, these issues are quite easy to resolve, yet still widely rampant. Running scans frequently can help to identify this vulnerability quickly.
- Heartbleed: While the media sensation of Heartbleed has finally died down, it was a heavy hitter that existed within OpenSSL 1.0.1 and 1.0.2-beta. Running VA scans would have immediately caught this vulnerability once it had been published.
Why don’t organizations scan more often?Due to what was once perceived as a complicated, disruptive process to daily business functions, it’s no secret that VA has caused some huge management headaches over the years.
On top of that, most organizations treat vulnerability management as an occasional and isolated spot check process, largely focused on addressing immediate issues. When a company views VA as a random point-in-time, it is not only a detriment to the industry, but also a practice ineffective at minimizing risks.
Industry best practice is to scan quarterly (at the very minimum) and include a system to speedily remediate discovered weaknesses.
SEE ALSO: Top 5 Security Vulnerabilities Every Business Should Know
Encourage a top-down approachIt can be challenging for IT departments to gain management support when it comes to enforcing security-related policies and procedures. After all, change can be difficult to implement from middle management up through an organization.
But VA activities must have acceptance from the highest executive levels of an organization in order to be effective. It’s critical that management understands the importance of the assessment to the organization as a whole, and give IT the approval to perform scanning activities.
Keep in mind: The time it takes an IT team to repair and recover from vulnerability exploitation usually has far greater impact on a business than the shorter amount of time it takes to get the organization up to speed on a VA solution.
Once a company has buy-in across the board, it’s important to encourage awareness and training among team members. Typical VA awareness training within a company should include:
- Company-specific goals for utilizing the technology
- An explanation of how a vulnerability scanning appliance operates
- Which departments and systems will be in the assessment scope
- How false positives can be reported to the IT team
- How reports can be used to show details around vulnerabilities
- Where patches can be found and details around the severity levels
Need an approved scanning vendor? Check out our external vulnerability scanner!
Long live vulnerability scanningAs long as hackers and their malware are out there, vulnerability scanning will continue to be a necessary part of everyday security operations. With this simple approach, security holes can be repaired before they become problematic, and companies can proactively fend off attacks before they occur and do serious damage.
Brand Barney (CISSP, HCISPP, QSA) is a Security Analyst at SecurityMetrics, has over 10 years of data security experience, and will totally geek out if you mention Doctor Who. Brand loves to play jazz piano and daydreams about being as great as Dave Brubeck or Thelonious Monk. Connect with him on Twitter or check out his other blog posts.