Vulnerability Response -1
dhruvsn
·
Sep 13, 2020
·
article
So, this series of articles will be about Vulnerability Response. Will start from very basics. So let’s begin the learning.
First and foremost:
_**Security Operations** is a collection of associated security activities that help to maintain the ongoing security posture of an organisation, consisting of the **monitoring**, **maintenance** and **management** of the security aspect of the **IT estate**, **people** and its **process**._
It is important to understand security is not just about **preventive** measures but it is also about **detective**(understanding of something bad has happened) and **corrective**(process to limit the damage done)
So, now the question arises **IS GOODSECURITY HARD???**
**Ans:NOT AT ALL**
Good security is not hard it is most often misunderstood. A very key factor Security Operations is **TIME.** Let me give you a statistic:
It takes 200 days to detect a security breach and 70 days to contain it.
Yaa that’s true!!!
This is an alarming stats. So let’s look at the factors causing it:
* Little (or no) detection tool set to discover security breaches.
* Vital Information not reaching right people
* No understanding of effect of a breach(what the hell is affected and what’s the cost)
* Poor decision making
* No clearly defined process to deal with this
* No -post review process to ascertain response efficiency and benefits gained.
**SO, WHAT IS THE SOLUTION:**
We require predefined **processes**, executed by dedicated and capable **people** using powerful integrated **product** suites.
Now let me introduce ServiceNow Secuirty Operations Suite:
ServiceNow® Security Operations helps organizations connect security and IT teams, respond faster and more efficiently to threats, and get a definitive view of their security posture. It connects the workflow and systems management capabilities of the Now Platform
with security data from leading vendors to give your teams a single platform for response that can be shared between security and IT. With orchestration, automation, and better visibility, teams can respond more efficiently, reducing business risk.
The solution leverages the ServiceNow® Configuration Management Database (CMDB) to map threats, security incidents, and vulnerabilities to business services and IT infrastructure. This mapping enables prioritization and risk scoring based on business impact, ensuring your security teams are focused on what is most critical to your business. In addition, visual business service maps show the dependencies of affected systems to minimize change requests and downtime. Because Security Operations is part of the greater Now Platform, this CMDB is maintained by the entire organization, not just security.
The Now Platform delivers additional enterprise capabilities that teams can leverage right away, such as built-in service level agreement (SLA) thresholds, skills-based routing, notifications, advanced workflows, and live collaboration. Security Operations also isolates security events from the rest of the system, ensuring that sensitive security data remains confidential.
**Security Incident Response application**
Security Incident Response simplifies identification of critical incidents and provides workflow and automation tools to speed up remediation. Data from your existing security tools or Security Information and Event Manager (SIEM) are imported via APIs or email alerts to automatically create prioritized security incidents. Customize security workflow templates to automate tasks and ensure company best practices are followed. Easily view and track response tasks that run in parallel. The system will remind assignees if their tasks aren’t completed on-time per SLA thresholds, or it can escalate tasks if necessary. This ensures no tasks or decisions are accidentally missed. Security analysts can communicate with stakeholders from within the Now Platform via conference calls or Connect chat to keep everyone in the loop.
To speed up response and allow your security team to spend more time hunting complex threats, Security Incident Response automates basic tasks, including approval requests, malware scans, or threat enrichment when used with the Threat Intelligence application. Orchestration packs for integrated security products facilitate common actions, such as firewall block requests, from within Security Operations. A security knowledge base (KB) adds additional information, and relevant KB articles are automatically associated with incidents for reference.
All activities in an incident lifecycle, from analysis and investigation to containment and remediation, are tracked in the platform. Once an incident is closed, assessments are distributed across the team and a time-stamped post-incident review is automatically created as a historical audit record.
**Vulnerability Response application**
The Vulnerability Response application in Security Operations prioritizes vulnerable assets and adds context to help determine if business-critical systems are at risk. By leveraging the CMDB, it can also easily identify dependencies across systems and quickly assess the business impact of changes or downtime. Vulnerability Response provides a comprehensive view of all vulnerabilities affecting a given service as well as the current state of all vulnerabilities affecting the organization.
Response teams can also leverage the workflow and automation tools in the Now Platform to remediate vulnerabilities faster. When critical vulnerabilities are found, a workflow can automatically initiate an emergency patch approval request. Once approved, orchestration tools can apply the patch and trigger an additional vulnerability scan to ensure the issue has been resolved.
For non-urgent patches, simply click a button to create a change request and send the relevant information to IT. This results in a coordinated remediation strategy for vulnerabilities across services and assets that can address the most critical items quickly. Security Incident Response simplifies identification of critical incidents and provides workflow and automation tools to speed up remediation. DATA SHEET 3 © Copyright 2018 ServiceNow, Inc. All rights reserved. ServiceNow, the ServiceNow logo, and other ServiceNow marks are trademarks and /or registered trademarks of ServiceNow, Inc., in the United States and/or other countries. Other company and product names may be trademarks of the respective companies with which they are associated. SN-DS-Security-Operations-062018 servicenow.com
**Configuration Compliance application**
Improperly configured software puts organizations at risk of compromise. Configuration Compliance prioritizes and remediates vulnerable misconfigured assets from third-party security configuration assessment scan data. It leverages the CMDB to determine which items are most critical. Workflows and automation enable quick action against individual assets or groups for bulk changes.
Easily coordinate with IT in a single platform to address changes and updates. In addition, Configuration Compliance data can be fed into the continuous monitoring feature of ServiceNow® Governance, Risk, and Compliance to further mitigate risk.
**Threat Intelligence application**
Security Operations includes a threat intelligence application to help incident responders find Indicators of Compromise (IoC) and hunt for low-lying attacks and threats. It automatically searches threat feeds for relevant information when an IoC is connected to a security incident and can send IoCs to third-party sources for additional analysis. The results are reported directly in the security incident record for the analyst to review, saving valuable time. ServiceNow supports multiple threat feeds, as well as STIX and TAXII, to incorporate threat intelligence data from a variety of sources.
**Trusted Security Circles application**
Share threat intelligence data with industry peers, suppliers, or a global circle of ServiceNow customers with Trusted Security Circles. Send an anonymous query containing security observables to other users and receive a sightings count automatically. With this data, security analysts can determine whether suspicious activity may be part of a larger attack.
Users can set sightings count thresholds to automatically create a security incident if the observable count limit is exceeded. Participating in Trusted Security Circles can serve as an early warning of attacks targeted at common groups.
**Performance Analytics for Security Operations**
Create advanced real-time dashboards and reports with the addition of Performance Analytics. It includes built-in key performance indicators (KPIs) and allows creation of additional custom KPIs to track the metrics that are most important to your organization. Use historical data to find bottlenecks, refine response processes, and identify tasks for automation. Get improved visibility and confidence in your security posture with trusted data.
So, its the end of our introduction part. From next article we will only focus on vulnerability response. it was important to understand this before starting deep dives in VR.
https://dhruvsn.wordpress.com/2020/09/13/vulnerability-response-1/
Dhruv Gupta